SHARE
Facebook X Pinterest WhatsApp

In Search of a Context-Aware Security Strategy

Context-aware security In Search of a Context-Aware Security Strategy Seeking to strike a balance between security and end-user productivity, many firms are looking for some form of context-aware security, which prioritizes threats. IT Security Priorities IT pros (87%) and business execs (86%) agree that IT security is a much higher priority than end-user convenience. IT […]

Written By
thumbnail Michael Vizard
Michael Vizard
Sep 18, 2015
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Context-aware security

1 - In Search of a Context-Aware Security StrategyIn Search of a Context-Aware Security Strategy

Seeking to strike a balance between security and end-user productivity, many firms are looking for some form of context-aware security, which prioritizes threats.

2 - IT Security PrioritiesIT Security Priorities

IT pros (87%) and business execs (86%) agree that IT security is a much higher priority than end-user convenience.

3 - IT Security's Impact on ProductivityIT Security’s Impact on Productivity

91% of business users report IT security has an impact on their productivity, while 53% say that impact has been greater in the last 18 months.

4 - The Password ParadoxThe Password Paradox

A vast majority of business users (85%) report they have to keep track of multiple passwords and 29% report having to keep track of six or more.

5 - Mobile Device UseMobile Device Use

46% of business users own their own mobile devices, and 51% report they manage their devices on their own. Only 53% of the companies that own the devices actually manage them.

6 - Access to Corporate DataAccess to Corporate Data

95% use their mobile devices to access corporate data, and 83% report they do so daily.

7 - Remote Access SecurityRemote Access Security

58% say they use their mobile devices to access corporate data remotely, with 82% of those respondents saying their companies have adopted some form of remote access security. A full 92% say they have been negatively impacted by remote access security technologies.

8 - Cloud Application Security IssuesCloud Application Security Issues

While 77% of IT respondents say cloud applications increase productivity, 74% say security issues prevent wider adoption of those applications.

9 - BYOD Security IssuesBYOD Security Issues

61% of the IT pros polled indicate that BYOD policies increase productivity, but 72% also say security prevents further adoption.

10 - Top IT Security RisksTop IT Security Risks

Employee workarounds to IT security (69%), BYOD practices (64%), and remote access and compromised credentials (both at 63%) top the list of risks.

11 - Context-Aware SecurityContext-Aware Security

Just over a quarter (28%) report they have implemented context-aware security, while 48% say they have in some areas but not all.

12 - Benefits of Context-Aware SecurityBenefits of Context-Aware Security

The ability to prioritize threats (55%), followed by greater visibility and the capability to identify threats in real time, both at 47%, are the top benefits.

13 - Top IT Security ChallengesTop IT Security Challenges

Difficulty addressing changing security needs (53%), followed by manual IT intervention (47%) and employee productivity (36%) are the top security issues.

thumbnail Michael Vizard

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a writer for publications including Programmableweb, IT Business Edge, CIOinsight, Channel Insider and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs
Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite
Jordan Smith
Aug 13, 2025
MetTel to Modernize Communication Lines for VA
Jordan Smith
Aug 8, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.