dcsimg
 
 
 
 
 

14 Quick Facts on BYOD and Mobile Security

 
 
By Michael Vizard  |  Posted 2014-07-25
 
 
 
 
 
 
 
 
 
 

While there's a lot of hype surrounding the bring-your-own-device phenomenon, the rise of BYOD as an officially sanctioned policy is more of a process than an event. A new study found that more than one-fourth of IT professionals said there is limited use of privately owned devices on their networks, but almost a third said their organizations are actively evaluating their BYOD policies. More significantly from the perspective of solution providers in the channel, 25 percent of respondents said their organizations will be increasing their BYOD budgets in the next 12 months, according to the study, which is based on a survey of 1,122 IT pros conducted by the LinkedIn Information Security Community on behalf of Vectra Networks, a malware-detection software provider. The report made it clear that mobile computing is a major IT management challenge that only gets more complex with the introduction of BYOD. That should create a significant amount of demand for outside help from IT service providers. However, that problem doesn't officially exist until the organization admits there's a problem worth allocating IT budget dollars to solve. Take a look at how far BYOD has come and what challenges need addressing.

 
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
























By submitting your information, you agree that channelinsider.com may send you channelinsider offers via email, phone and text message, as well as email offers about other products and services that channelinsider believes may be of interest to you. channelinsider will process your information in accordance with the Quinstreet Privacy Policy.

 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date