A majority of enterprises say delivering solutions that effectively handle mobile application control and mixed personal and business use are strong drivers for deploying mobile device security, according to a survey of decision-makers at medium and large companies in the U.S. and Canada conducted by Infonetics Research in February 2014.
When it comes to providing mobile device security, nearly half of the organizations Infonetics surveyed place their trust in the device operating system manufacturers, waiting for security features to be embedded into the OS itself rather than using overlay security solutions.
About half of those surveyed have dealt with lost or stolen devices containing sensitive or proprietary data, the report says. But only 15 percent think remote wipe, device location, or disk/file/SD card encryption are key technologies for their mobile security solution.
“Nearly every enterprise in North America needs a mobile security solution because they’re either managing mobile devices they own, rolling out a structured BYOD [bring-your-own-device] program, or getting control of rogue employee-owned mobile devices that have been connected to the network,” Jeff Wilson, principal analyst for security at Infonetics, said in a statement. “The lines between corporate and personal assets are blurring.”
What organizations need are “solutions capable of securing all company- and employee-owned devices from the same console, to ensure an identical level of protection for all devices, which means deploying security in the network or cloud as well as on the device,” Wilson said.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access