SHORT SURVEY ON DATA LEAKAGE PROTECTION ISSUES

We are conducting a short survey on data leakage protection issues and we invite you to participate in this survey that we estimate will take about 3-4 minutes to complete.

From among those who complete this survey, we will randomly draw the name of one individual who will receive an Apple iPod Nano or an Amazon.com gift certificate of equivalent value.
      
Thank you for considering our request to complete this survey.  If you have any questions, please contact us at (253) 630-5839 or at info@ostermanresearch.com.


Please provide the following contact information; it will be used only to identify who has responded to this survey.

Name

Title

Organization

Email Address


Country in which you work

  1. How many employees and email users are there in your organization?

employees
email users

IF FEWER THAN 1,000 EMAIL USERS, PLEASE STOP NOW.


  1. Are you a decision maker and/or influencer about email and related technologies in your organization?

Yes
No

IF NO, PLEASE STOP NOW.


  1. On a typical day, how many emails does the typical user in your organization send?

emails sent


  1. Has your organization deployed any sort of data leakage protection (DLP) system to protect sensitive or confidential information from being sent in email?  If so, what is that system?

Yes
No
 System - please specify:


  1. How concerned are you about the potential for sensitive or confidential information to be mistakenly sent via email in violation of federal or state regulations, or simply in violation of your organization’s best practices for protecting sensitive content?

Not concerned at all
Not too concerned
Somewhat concerned
Concerned
Very concerned


  1. How do you think you will answer this question in 12 months?

Not concerned at all
Not too concerned
Somewhat concerned
Concerned
Very concerned


Now, we are going to ask you about a client-side DLP solution that can offer a number of capabilities in the context of sending email.  We are not talking a comprehensive solution that focuses on every venue for data loss, such as Webmail, USB sticks, etc., but simply one that focuses on your corporate email system.

  1. On a scale of 1 to 5, where 1 is “not desirable at all” and 5 is “very desirable”, how desirable are each of the following?

1 2 3 4 5
When a user sends confidential or sensitive information in an email or email attachment, a message pops up warning the user their content might contain sensitive information, but it still allows the content to be sent
When a user sends confidential or sensitive information in an email or email attachment, a message pops up warning the user their content might contain sensitive information, but it prevents the content from being sent
When a user sends confidential or sensitive information in an email or email attachment, content in the email and/or attachment that is considered sensitive is automatically redacted (i.e., things like a credit card number, sensitive word, customer name, etc. is blacked out or removed so that the recipient of the email cannot read it
If the email and/or attachment contains sensitive or confidential information, it will automatically be encrypted prior to being sent
Meta tags are automatically added to emails and attachments for purposes of retention, security, etc.
A DLP system that scans only email, not attachments
A DLP system that scans emails plus attachments
A DLP system that removes potentially offending attachments prior to their being sent
A DLP system that identifies and highlights all of the potentially offending content and presents it to the sender
A system that simply tells the sender that there is offending content without pointing out the offending or otherwise sensitive information
If an email attachment contains sensitive or confidential information, it will automatically be removed prior to being sent

Often, server-based DLP solutions provide feedback to the user on sensitive information only after the message is sent.  A client-based DLP solution, on the other hand, can provide immediate feedback to the user and make suggestions on content that may be too sensitive to distribute.  In addition, a client-based solution could provide immediate feedback to the user when it might be appropriate to redact certain sensitive information from email or attachments.  Given these features, please answer the following three questions comparing server-based and client-based DLP solutions.

  1. If the client-based and server-based solution were priced identically in terms of their total cost of ownership, which would you prefer?

Client-based solution
Server-based solution
Not sure
We would have no preference for one over the other


  1. If the client-based solution was a bit less expensive in terms of its total cost of ownership, which would you prefer?

Client-based solution
Server-based solution
Not sure
We would have no preference for one over the other


  1. If the client-based solution was significantly less expensive in terms of its total cost of ownership, which would you prefer?

Client-based solution
Server-based solution
Not sure
We would have no preference for one over the other


  1. Which of the following comes closest to your view?

We have no interest in a client-side DLP solution
We already have a server/gateway-based solution and so have no interest in a client-side solution
We’re not sure which we would prefer


  1. Let’s say you could deploy a client-side DLP solution that would provide all of the capabilities shown above.  On a scale of 1 to 5, how likely would you be to deploy the solution for your users at the following initial price points, where 1 is “no way” and 5 is “we would definitely deploy it”?

1 2 3 4 5
$50 per user
$40 per user
$30 per user
$20 per user
$10 per user
$5 per user

  1. If you needed to deploy a client-side DLP solution, which of the following would you prefer?

A solution that provided protection only for a desktop/thick client
A solution that provided protection for desktop clients and Web access (e.g., OWA or another enterprise Webmail client)
A solution that provided protection for desktop clients, Web access and mobile clients

  1. What percentage of your users are on each of the following versions of Outlook and what do you think these percentages will be in 12 months?

Today

In 12 Months

Outlook 2010 % %
Outlook 2007 % %
Outlook 2003 % %
Earlier versions of Outlook % %
Other % %

  1. What percentage of your users are on each of the following versions of Exchange and what do you think these percentages will be in 12 months?

Today

In 12 Months

Exchange 2010 % %
Exchange 2007 % %
Exchange 2003 % %
Exchange 2000 % %
Earlier versions of Exchange % %

  1. Would you be willing to be contacted by the sponsor of this survey?

Yes
No

 

©2009 Osterman Research, Inc.
All rights reserved.