1 / 23

Microsoft Collaboration Survey Research Results

Microsoft Collaboration Survey Research Results. Survey of Business and Technology Decision-Makers. Survey Methodology. Executive Summary. Executive Summary: Collaboration Tools.

louvain
Download Presentation

Microsoft Collaboration Survey Research Results

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Microsoft Collaboration Survey Research Results Survey of Business and Technology Decision-Makers

  2. Survey Methodology

  3. Executive Summary

  4. Executive Summary: Collaboration Tools • Email and phone are the most popular collaboration tools among BDMs and TDMs, although TDMs are more likely to use a whole range of tools • The vast majority of both BDMs, 78%, and TDMs, 85%, report their organizations use at least one publicly available collaboration tool • Organizations that use publicly available tools use them frequently and it is not limited to one tool more than others • If they say they use that a publicly available tool to collaborate, more than likely they are using it often • Many types of proprietary information is communicated with publicly available tools, with product plans or technical data being sent most frequently • And the vast majority of information is contained in standard Microsoft Office documents such as Word, Excel, PPT, etc.

  5. Executive Summary: Maintaining Security • While most think publicly available tools are secure, only about a third are sure and almost as many feel they are insecure • Interestingly, TDMs are more likely to feel strongly that they are secure compared to BDMs • Additionally, TDMs especially are concerned about the use of publicly available tools to send confidential information • Nearly all report that their organizations have and frequently implement policies to control confidential information, and these policies are most commonly designed by legal departments and CIOs, with the security office, managers and engineers playing secondary roles • It is unusual for a companies’ proprietary information to be used inappropriately by a third party and when it happens, few report significant financial impact • Additionally, one in three report that the proprietary protection policies of their companies impact the productivity of technical teams

  6. Detailed FindingsCollaboration Tools

  7. Email and phone are the most popular collaboration tools among BDMs and TDMs, although TDMs are more likely to use a whole range of tools Q4. From the following list, what types of communications tools does your department (BDM) (company, TDM) use to collaborate among its business partners, vendors and suppliers? Q5. And which one of these tools would you say your department (BDM) (company, TDM)uses most often to collaborate among its business partners, vendors and suppliers? (ONLY LIST OF TOOLS CHOSEN IN Q4) % Used most % Use at all TDM BDM 53% 72% 40% 26% 1% - 1% - 1% - 3% 1% - - - -

  8. The vast majority of both BDMs, 78%, and TDMs, 85%, report their organizations use at least one publicly available collaboration tool Q6. Now I am going to read to you another list of collaboration tools. Please tell if your department (BDM) (company, TDM)has ever used any of these communications tools to collaborate among its business partners, vendors and suppliers? (ACCEPT ALL RESPONSES) % Use at all BDMs at companies with fewer than 500-1000 employees are more likely to report use of public email accounts, 37%, than are those at larger companies, 20%

  9. Organizations that use publicly available tools use them frequently…. Q7. How often would you say your department (BDM) (company, TDM)collaborates with its business partners, vendors, and suppliers using these types of tools (READ LIST FROM Q6)? % Total use publicly available tools often 94% 89% BDMs at companies with revenue over $250 million are more likely to report frequent use of public tools, 79%, than are those at companies with less revenue, 54% Base: BDM=78, TDM=85

  10. And it is not limited to one tool more than others; If they say they use that tool to collaborate, more than likely they are using it often Q7. How often would you say your department (BDM) (company, TDM)collaborates with its business partners, vendors, and suppliers using these types of tools (READ LIST FROM Q6)? % Frequently/Occasionally

  11. Many types of proprietary information is communicated with publicly available tools, with product plans or technical data being sent most frequently Q8. From the following list of examples, please tell me if your department (BDM) (company, TDM)has ever communicated any of the following types of information using these forms of collaboration tools (READ LIST FROM Q6)? (ACCEPT ALL RESPONSES) Base: BDM=78, TDM=85

  12. And the vast majority of information is contained in standard Microsoft Office documents such as Word, Excel, PPT, etc. Q9. IF SAID YES TO ANY OF THE CHOICES IN Q8, ASK: When your department (BDM) (company, TDM)communicated this information using these collaboration tools, was the information contained within standard office based documents such as Word, Excel, PowerPoint, etc? Base: BDM=67, TDM=75

  13. Detailed FindingsMaintaining Security

  14. While most think publicly available tools are secure, only about a third are sure and almost as many feel they are insecure; Interestingly, TDMs are more likely to feel strongly that they are secure compared to BDMs Q10. Thinking about the list of collaboration tools we have been talking about these last couple of questions (READ LIST FROM Q6), do you consider these tools to be secure? Total Think Secure Total Think Not Secure 22% 78% 28% 72% BDMs who rank above the director/manager level, 62%, are less likely than lower ranking BDMs, 87%, to believe public tools are secure Base: BDM=78, TDM=85

  15. TDMs especially are concerned about the use of publicly available tools to send confidential information Q11. How concerned are you about people within your department (BDM) (company, TDM)using these types of collaboration tools (READ LIST FROM Q6), to communicate confidential or sensitive information outside of the company? % Total Unconcerned about publicly available tools % Total Concerned about publicly available tools 43% 58% 27% 72% BDMs who rank above the director/manager level, 73%, are more likely to be concerned than lower ranking BDMs, 50% TDMs at companies with revenue above $250 million are more likely to be concerned, 86%, than those at companies with less revenue, 66% Base: BDM=78, TDM=85

  16. Nearly all report that their organizations have and frequently implement policies to control confidential information Q12. To the best of your knowledge, does your company have a specific policy about controlling the distribution of confidential or sensitive information to third parties such as designers, foundries, test, packaging, contract manufacturers, etc.? Q13. IF YES: In your estimation, how often would you say this policy is actually implemented? % Total Yes % Implemented Every time/Frequently 91% 95% Base=91 93% 87% Base=93

  17. And these policies are most commonly designed by legal departments and CIOs, with the security office, managers and engineers playing secondary roles Q14. Please tell me how involved you believe each of the following individuals or departments are with the development of your company’s proprietary information disclosure policies regarding third parties. (READ AND ROTATE LIST) Legal Department CIO Security Office Project Managers Lead Engineer Design Engineer

  18. It is unusual for a companies’ proprietary information to be used inappropriately by a third party and when it happens, few report significant financial impact Q16. IF YES: How would you characterize the financial impact this incident or incidents had on your company? Q15. To the best of your knowledge, has any of your company’s proprietary information ever been inappropriately used by a trading partner or third party such as a contract manufacturer, foundry, design house, etc.? % Severe/significant financial impact 13% Base=16 36% Base=11

  19. One in three report that the proprietary protection policies of their companies impact the productivity of technical teams Q17. How would you characterize the impact of proprietary protection processes on the productivity of your design engineers, design managers, production managers and other valuable technical teams? % Total Impacted % Total Not impacted 65% 30% 30% 63%

  20. Majorities believe that all of these potential functions would be or currently are valuable to their company, but overwhelmingly so for “being able to manage user access rights to sensitive documents” Q18. Please tell me how valuable you believe each of the following functions would be or currently are to your company. % Total Valuable 88% The ability to manage user access rights to sensitive documents such as product plans, contracts, etc. 92% The ability to encrypt email and/or IM messaging traffic between your company and suppliers 68% 74% The ability to view whether suppliers, partners and internal employees are online or “present” for conversations, either phone, IM or email 71% 77%

  21. Appendix

  22. Business Decision-Makers Profile

  23. Technology Decision-Makers Profile

More Related