Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

14 Quick Facts on BYOD and Mobile Security

BYOD Gains MomentumBYOD Gains Momentum

BYOD may soon achieve critical mass; 26% of respondents already see limited use of privately owned devices, but 31 percent reported they are actively evaluating BYOD.

BYOD ReadinessBYOD Readiness

The move to official support for BYOD is more of a process than an event. A total of 40% rank their readiness for BYOD at 60% or higher.

BYOD Budgets on the RiseBYOD Budgets on the Rise

A quarter of the organizations said they will increase BYOD budgets in next 12 months.

Mobile Devices in UseMobile Devices in Use

Mobile computing finds mainstream adoption; 87% are using smartphones, 68% tablets and 79% laptops.

Mobile Platforms SupportedMobile Platforms Supported

A big three for mobile emerges. Apple iOS leads with 76%, but Google Android and Windows are not far behind, at 69% and 66%.

Top Mobile AppsTop Mobile Apps

Most end users still want basic email and calendaring. Email and calendaring tops the list, at 86%; the next closest application is document access and editing, at 45%.

Drivers of Mobile Computing AdoptionDrivers of Mobile Computing Adoption

Mobile computing has become an employee requirement. Mobility of employees was cited by 57%, followed by employee satisfaction (56%) and productivity (54%).

BYOD Security ConcernsBYOD Security Concerns

Security remains a major inhibitor. Losing company or customer data is a top concern, at 67%, followed by unauthorized access to data, at 57%.

Biggest Inhibitor to Mobile Computing AdoptionBiggest Inhibitor to Mobile Computing Adoption

Mobile computing puts additional strain on internal IT; 30 percent said additional resources were required to manage security.

Mobile Management ToolsMobile Management Tools

IT is making progress on mobile-computing management: 43% use mobile-device management (MDM) tools, 39% use endpoint security tools and 38% use network access control.

Risk Control MeasuresRisk Control Measures

The opportunity for the channel to improve mobile management is high: 67% of IT pros polled use password protection, but only 52% use remote data wiping and 43% use encryption.

Mobile Device PoliciesMobile Device Policies

Policies usually need to be developed before tools are employed. Policies are in place for email at 52% of organizations, followed by access authentication (50%) and device wiping (46%).

Key Mobile Device Security RequirementsKey Mobile Device Security Requirements

There is much room for mobile management improvement; 72% of respondents want logging, monitoring and reporting.

Measurements of Mobile SuccessMeasurements of Mobile Success

Striking a balance between mobility and security is key. Employee productivity is the top goal for 61%, followed by improved security for 52%.