Mary Meeker’s 2015 Internet Trend Report

Updated on

Mary Meeker’s 2015 Internet Trend Report via KPCB

Global Internet User + Smartphone Subscription Growth = Good, But Growth Rate Continues to Slow

  • Internet User Growth = Solid, But Slowing
    @ 2.8B, +8% in 2014 vs. +10% in 2013, +11% in 2012
    Net New User Additions = ~Flat @ ~200MM in 2014 / 2013 / 2012
    China Users = +7%, USA = +2%, India = +33%, Japan = Flat, Brazil = +4%
  • Smartphone Subscription Growth = Strong, But Slowing
    @ 2.1B, +23% in 2014 vs. +27% in 2013, +65% in 2012
    Net New Sub Additions = ~Flat @ ~370MM+ in 2014 / 2013
    China Subs = +21%, USA = +9%, India = +55%, Japan = +5%, Brazil = +28

…Incremental Internet + Smartphone Users = Harder to Garner Owing to Dependence on Developing Markets

Developing Markets Tend to Have Lower GDP per Capita / Spending Power / Infrastructure

$44K = Average GDP Per Capita…

In 5 Countries with >50MM Population & ~ / >50% Smartphone Sub Penetration…

USA / Japan / Germany / UK / France

$13K = Average GDP Per Capita…

In 16 Countries* with >50MM Population & ~ / < 50% Smartphone Sub Penetration…

China / India / Brazil / Indonesia / Russia / Mexico / Philippines / Thailand / Italy / Turkey / Nigeria / Vietnam / Egypt / Iran / Pakistan / Myanmar

Internet trend Mary Meeker
Mary Meeker

Global Internet Usage (Data Traffic) Growth Strong = +21% Y/Y Aided by Mobile + Video

Consumer Internet Traffic, Global = +21% in 2014 vs. +24% in 2013, +31% in 2012

Consumer Internet Video Traffic, Global = 64% of consumer traffic in 2014 vs. 62% in 2013, 57% in 2012

Mobile Data Traffic, Global = +69% in 2014 vs. +81% in 2013, +70% in 2012

Mobile Video Traffic, Global = 55% of mobile traffic vs. 52% in 2013, 50% in 2012

Internet trend Mary Meeker
Mary Meeker

Mary Meeker – Cyber Attacks = Growing in Size / Complexity / Risk

Cyber Attacks = Growing Bigger / Faster…

  • Insider Misuse = Significant Cause of Breaches
    >20% of breaches come directly from insiders with malicious intent. In most breaches, attackers have foothold within internal networks & spread / steal data through privilege abuse / credential misuse.
  • Mobile Devices = Increasingly Used to Harvest Data
    Adware grew 136% to 410,000 apps between 2013 and first three quarters of 2014, giving attackers access to personal information such as contacts, which can subsequently be used to launch phishing attacks.
  • Mobile Device Management = Critical in Preventing Breaches
    22% of breaches reported by network security decision makers involve lost / stolen devices.
  • Human Focus = Critical in Preventing / Remediating Attacks
    Despite abundance of security products, breach response typically takes months. ~4 of 5 organizations don’t update their breach response plans to account for changing threat landscape and corporate processes. With proper technology, threat intelligence & expertise, detection to response times has been reduced by >90%.
  • Security Skills = Biggest Gap in Enterprise Security Programs
    Despite large investments in security technologies, lack of skilled experts continues to result in breaches. At least 30% of organizations cite a ‘problematic shortage’ of each of following: 1) cloud computing and server virtualization security skills; 2) endpoint security skills; 3) network security skills; 4) data security skills; 5) security analytics / forensic skills.
  • Disclosures of Breaches = Coming from Outside Sources
    In 69% of breaches, victim did not detect attack on own – they were notified by third party (like the press, law enforcement, etc.). This is forcing victims to disclose breaches outside their preferred terms / timing.

See full slides from Mary Meeker below.

Leave a Comment