14 Quick Facts on BYOD and Mobile Security
- 1 of
-
BYOD Gains Momentum
BYOD may soon achieve critical mass; 26% of respondents already see limited use of privately owned devices, but 31 percent reported they are actively evaluating BYOD. -
BYOD Readiness
The move to official support for BYOD is more of a process than an event. A total of 40% rank their readiness for BYOD at 60% or higher. -
BYOD Budgets on the Rise
A quarter of the organizations said they will increase BYOD budgets in next 12 months. -
Mobile Devices in Use
Mobile computing finds mainstream adoption; 87% are using smartphones, 68% tablets and 79% laptops. -
Mobile Platforms Supported
A big three for mobile emerges. Apple iOS leads with 76%, but Google Android and Windows are not far behind, at 69% and 66%. -
Top Mobile Apps
Most end users still want basic email and calendaring. Email and calendaring tops the list, at 86%; the next closest application is document access and editing, at 45%. -
Drivers of Mobile Computing Adoption
Mobile computing has become an employee requirement. Mobility of employees was cited by 57%, followed by employee satisfaction (56%) and productivity (54%). -
BYOD Security Concerns
Security remains a major inhibitor. Losing company or customer data is a top concern, at 67%, followed by unauthorized access to data, at 57%. -
Biggest Inhibitor to Mobile Computing Adoption
Mobile computing puts additional strain on internal IT; 30 percent said additional resources were required to manage security. -
Mobile Management Tools
IT is making progress on mobile-computing management: 43% use mobile-device management (MDM) tools, 39% use endpoint security tools and 38% use network access control. -
Risk Control Measures
The opportunity for the channel to improve mobile management is high: 67% of IT pros polled use password protection, but only 52% use remote data wiping and 43% use encryption. -
Mobile Device Policies
Policies usually need to be developed before tools are employed. Policies are in place for email at 52% of organizations, followed by access authentication (50%) and device wiping (46%). -
Key Mobile Device Security Requirements
There is much room for mobile management improvement; 72% of respondents want logging, monitoring and reporting. -
Measurements of Mobile Success
Striking a balance between mobility and security is key. Employee productivity is the top goal for 61%, followed by improved security for 52%. -
-
What Partners Need to Know About HP, Inc.
View Slideshow » -
MSPs Face Big Cybersecurity Talent Gap
View Slideshow » -
Why Tech Companies Are Eager to Invest in 5G
View Slideshow » -
The Problem With Partner Referral Programs
View Slideshow » -
Microsoft Taps Channel for Digital Business
View Slideshow » -
New Technologies Will Fuel Channel Opportunities
View Slideshow » -
Channel's Transition to the Cloud Requires More Time
View Slideshow » -
Microsoft's Cloud Channel Begins to Mature
View Slideshow » -
Defining MSPs' Goals, Challenges and Tools
View Slideshow » -
Why Metrics Matter to the Channel
View Slideshow »
-
While there's a lot of hype surrounding the bring-your-own-device phenomenon, the rise of BYOD as an officially sanctioned policy is more of a process than an event. A new study found that more than one-fourth of IT professionals said there is limited use of privately owned devices on their networks, but almost a third said their organizations are actively evaluating their BYOD policies. More significantly from the perspective of solution providers in the channel, 25 percent of respondents said their organizations will be increasing their BYOD budgets in the next 12 months, according to the study, which is based on a survey of 1,122 IT pros conducted by the LinkedIn Information Security Community on behalf of Vectra Networks, a malware-detection software provider. The report made it clear that mobile computing is a major IT management challenge that only gets more complex with the introduction of BYOD. That should create a significant amount of demand for outside help from IT service providers. However, that problem doesn't officially exist until the organization admits there's a problem worth allocating IT budget dollars to solve. Take a look at how far BYOD has come and what challenges need addressing.
What Partners Need to Know About HP, ...
In the channel, HP, Inc. is a storied vendor that has relationships...Watch Now