Mary Meeker’s 2015 Internet Trend Report

0
Mary Meeker’s 2015 Internet Trend Report

Mary Meeker’s 2015 Internet Trend Report via KPCB

Global Internet User + Smartphone Subscription Growth = Good, But Growth Rate Continues to Slow

  • Internet User Growth = Solid, But Slowing
    @ 2.8B, +8% in 2014 vs. +10% in 2013, +11% in 2012
    Net New User Additions = ~Flat @ ~200MM in 2014 / 2013 / 2012
    China Users = +7%, USA = +2%, India = +33%, Japan = Flat, Brazil = +4%
  • Smartphone Subscription Growth = Strong, But Slowing
    @ 2.1B, +23% in 2014 vs. +27% in 2013, +65% in 2012
    Net New Sub Additions = ~Flat @ ~370MM+ in 2014 / 2013
    China Subs = +21%, USA = +9%, India = +55%, Japan = +5%, Brazil = +28

…Incremental Internet + Smartphone Users = Harder to Garner Owing to Dependence on Developing Markets

Developing Markets Tend to Have Lower GDP per Capita / Spending Power / Infrastructure

Why There Is No Bitcoin ETF In The U.S. Yet

Digital Payment SystemShould you invest in cryptocurrencies? As with all investments, it depends on many factors. At the Morningstar Investment Conference on Thursday, Matthew Hougan of Bitwise, Tyrone Ross, Jr. of Onramp Invest and Annemarie Tierney of Liquid Advisors joined Morningstar's Ben Johnson to talk about portfolio allocations to cryptocurrencies. Q2 2021 hedge fund letters, conferences and Read More

$44K = Average GDP Per Capita…

In 5 Countries with >50MM Population & ~ / >50% Smartphone Sub Penetration…

USA / Japan / Germany / UK / France

$13K = Average GDP Per Capita…

In 16 Countries* with >50MM Population & ~ / < 50% Smartphone Sub Penetration…

China / India / Brazil / Indonesia / Russia / Mexico / Philippines / Thailand / Italy / Turkey / Nigeria / Vietnam / Egypt / Iran / Pakistan / Myanmar

Internet trend Mary Meeker
Mary Meeker

Global Internet Usage (Data Traffic) Growth Strong = +21% Y/Y Aided by Mobile + Video

Consumer Internet Traffic, Global = +21% in 2014 vs. +24% in 2013, +31% in 2012

Consumer Internet Video Traffic, Global = 64% of consumer traffic in 2014 vs. 62% in 2013, 57% in 2012

Mobile Data Traffic, Global = +69% in 2014 vs. +81% in 2013, +70% in 2012

Mobile Video Traffic, Global = 55% of mobile traffic vs. 52% in 2013, 50% in 2012

Internet trend Mary Meeker
Mary Meeker

Mary Meeker – Cyber Attacks = Growing in Size / Complexity / Risk

Cyber Attacks = Growing Bigger / Faster…

  • Insider Misuse = Significant Cause of Breaches
    >20% of breaches come directly from insiders with malicious intent. In most breaches, attackers have foothold within internal networks & spread / steal data through privilege abuse / credential misuse.
  • Mobile Devices = Increasingly Used to Harvest Data
    Adware grew 136% to 410,000 apps between 2013 and first three quarters of 2014, giving attackers access to personal information such as contacts, which can subsequently be used to launch phishing attacks.
  • Mobile Device Management = Critical in Preventing Breaches
    22% of breaches reported by network security decision makers involve lost / stolen devices.
  • Human Focus = Critical in Preventing / Remediating Attacks
    Despite abundance of security products, breach response typically takes months. ~4 of 5 organizations don’t update their breach response plans to account for changing threat landscape and corporate processes. With proper technology, threat intelligence & expertise, detection to response times has been reduced by >90%.
  • Security Skills = Biggest Gap in Enterprise Security Programs
    Despite large investments in security technologies, lack of skilled experts continues to result in breaches. At least 30% of organizations cite a ‘problematic shortage’ of each of following: 1) cloud computing and server virtualization security skills; 2) endpoint security skills; 3) network security skills; 4) data security skills; 5) security analytics / forensic skills.
  • Disclosures of Breaches = Coming from Outside Sources
    In 69% of breaches, victim did not detect attack on own – they were notified by third party (like the press, law enforcement, etc.). This is forcing victims to disclose breaches outside their preferred terms / timing.

See full slides from Mary Meeker below.

Updated on

No posts to display