14 Quick Facts on BYOD and Mobile Security

By Michael Vizard

While there's a lot of hype surrounding the bring-your-own-device phenomenon, the rise of BYOD as an officially sanctioned policy is more of a process than an event. A new study found that more than one-fourth of IT professionals said there is limited use of privately owned devices on their networks, but almost a third said their organizations are actively evaluating their BYOD policies. More significantly from the perspective of solution providers in the channel, 25 percent of respondents said their organizations will be increasing their BYOD budgets in the next 12 months, according to the study, which is based on a survey of 1,122 IT pros conducted by the LinkedIn Information Security Community on behalf of Vectra Networks, a malware-detection software provider. The report made it clear that mobile computing is a major IT management challenge that only gets more complex with the introduction of BYOD. That should create a significant amount of demand for outside help from IT service providers. However, that problem doesn't officially exist until the organization admits there's a problem worth allocating IT budget dollars to solve. Take a look at how far BYOD has come and what challenges need addressing.

This article was originally published on 2014-07-25