Mary Meeker’s 2015 Internet Trend Report via KPCB
Global Internet User + Smartphone Subscription Growth = Good, But Growth Rate Continues to Slow
- Internet User Growth = Solid, But Slowing
@ 2.8B, +8% in 2014 vs. +10% in 2013, +11% in 2012
Net New User Additions = ~Flat @ ~200MM in 2014 / 2013 / 2012
China Users = +7%, USA = +2%, India = +33%, Japan = Flat, Brazil = +4% - Smartphone Subscription Growth = Strong, But Slowing
@ 2.1B, +23% in 2014 vs. +27% in 2013, +65% in 2012
Net New Sub Additions = ~Flat @ ~370MM+ in 2014 / 2013
China Subs = +21%, USA = +9%, India = +55%, Japan = +5%, Brazil = +28
…Incremental Internet + Smartphone Users = Harder to Garner Owing to Dependence on Developing Markets
Developing Markets Tend to Have Lower GDP per Capita / Spending Power / Infrastructure
$44K = Average GDP Per Capita…
In 5 Countries with >50MM Population & ~ / >50% Smartphone Sub Penetration…
USA / Japan / Germany / UK / France
$13K = Average GDP Per Capita…
In 16 Countries* with >50MM Population & ~ / < 50% Smartphone Sub Penetration…
China / India / Brazil / Indonesia / Russia / Mexico / Philippines / Thailand / Italy / Turkey / Nigeria / Vietnam / Egypt / Iran / Pakistan / Myanmar

Global Internet Usage (Data Traffic) Growth Strong = +21% Y/Y Aided by Mobile + Video
Consumer Internet Traffic, Global = +21% in 2014 vs. +24% in 2013, +31% in 2012
Consumer Internet Video Traffic, Global = 64% of consumer traffic in 2014 vs. 62% in 2013, 57% in 2012
Mobile Data Traffic, Global = +69% in 2014 vs. +81% in 2013, +70% in 2012
Mobile Video Traffic, Global = 55% of mobile traffic vs. 52% in 2013, 50% in 2012

Mary Meeker – Cyber Attacks = Growing in Size / Complexity / Risk
Cyber Attacks = Growing Bigger / Faster…
- Insider Misuse = Significant Cause of Breaches
>20% of breaches come directly from insiders with malicious intent. In most breaches, attackers have foothold within internal networks & spread / steal data through privilege abuse / credential misuse. - Mobile Devices = Increasingly Used to Harvest Data
Adware grew 136% to 410,000 apps between 2013 and first three quarters of 2014, giving attackers access to personal information such as contacts, which can subsequently be used to launch phishing attacks. - Mobile Device Management = Critical in Preventing Breaches
22% of breaches reported by network security decision makers involve lost / stolen devices. - Human Focus = Critical in Preventing / Remediating Attacks
Despite abundance of security products, breach response typically takes months. ~4 of 5 organizations don’t update their breach response plans to account for changing threat landscape and corporate processes. With proper technology, threat intelligence & expertise, detection to response times has been reduced by >90%. - Security Skills = Biggest Gap in Enterprise Security Programs
Despite large investments in security technologies, lack of skilled experts continues to result in breaches. At least 30% of organizations cite a ‘problematic shortage’ of each of following: 1) cloud computing and server virtualization security skills; 2) endpoint security skills; 3) network security skills; 4) data security skills; 5) security analytics / forensic skills. - Disclosures of Breaches = Coming from Outside Sources
In 69% of breaches, victim did not detect attack on own – they were notified by third party (like the press, law enforcement, etc.). This is forcing victims to disclose breaches outside their preferred terms / timing.
See full slides from Mary Meeker below.