SHARE
Facebook X Pinterest WhatsApp

Retailers’ Interest in Managed Security Services Rises

Retailers’ Interest in Managed Security Services Rises Does Your Business Offer Wireless Access? More than half of those polled are vulnerable to some form of potential security threat targeting wireless networks. guests: 4%, employees: 29%, both: 48%, neither: 19% For Guest Access Do You Enforce Security Policies? The good news is that the majority have […]

Written By
thumbnail
Michael Vizard
Michael Vizard
Feb 5, 2014
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Retailers’ Interest in Managed Security Services Rises

Does Your Business Offer Wireless Access?Does Your Business Offer Wireless Access?

More than half of those polled are vulnerable to some form of potential security threat targeting wireless networks. guests: 4%, employees: 29%, both: 48%, neither: 19%

For Guest Access Do You Enforce Security Policies?For Guest Access Do You Enforce Security Policies?

The good news is that the majority have some security policies in place for guests accessing wireless networks. yes: 84%, no: 15%

Do You Have a Policy for Changing Passwords?Do You Have a Policy for Changing Passwords?

When it comes to proactively managing password policies, security starts to break down. yes: 60%, no: 40%

Is Your Business Currently PCI DSS-Compliant?Is Your Business Currently PCI DSS-Compliant?

Too many organizations rely on the base level of security specified by PCI DSS. yes: 64%, no: 22%, don’t know: 14%

Are You Familiar With WiFi Location-Based Analytics Products?Are You Familiar With WiFi Location-Based Analytics Products?

Leveraging WiFi location-based analytics to discover compromised systems is where the battle is being won and lost. yes: 59%, no: 41%

Likelihood of Deploying WiFi Location-Based Analytics Products?Likelihood of Deploying WiFi Location-Based Analytics Products?

Awareness of security analytics tools is up sharply., won’t use because of customer privacy concerns: 25%, currently use or plan to use: 75%

Who Manages Your Business Network Security?Who Manages Your Business Network Security?

Almost 3 in 10 are thinking about opting for managed security services, but a much smaller percentage is actually using MSSPs. manage security locally: 53%, manage locally but thinking of moving to an MSSP: 29%, currently use an MSSP: 18%

Are You Interested in Products That Converge Physical and IT Security?Are You Interested in Products That Converge Physical and IT Security?

The need to control costs is starting to drive the convergence of physical and IT security. yes: 80%, no: 20%

Do You Have a Data Disposal Policy for PII?Do You Have a Data Disposal Policy for PII?

Having a policy for personal identifiable information (PII) is one thing; enforcing it is another. yes: 59%, no: 29%, don’t know: 12%

Do You Know Your State’s Security Breach Notification Laws?Do You Know Your State’s Security Breach Notification Laws?

There’s not much consistency across states when it comes to security breach notification requirements. yes: 45%, no: 55%

Do You Have a Policy to Meet Your State’s Security Breach Requirements?Do You Have a Policy to Meet Your State’s Security Breach Requirements?

A large percentage of retailers do, but many also operate across multiple state lines., yes: 60%, no: 40%

Recommended for you...

Syncro & CyberDrain Launch MSP Microsoft Security Assessment
Luis Millares
Dec 2, 2025
1Password vs Bitwarden: 2026 Password Manager for MSPs
Luis Millares
Dec 2, 2025
CyberArk Introduces TLS Tools to Help Teams Manage Renewal Surge
Luis Millares
Nov 20, 2025
OPSWAT’s New Facility Builds on Domestic Cyber Supply Chain
Jordan Smith
Nov 20, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.