Infonetics Research Finds 'Rogue Devices' a Major Factor in Mobile Device Security Adoption

Infonetics Research Finds 'Rogue Devices' a Major Factor in Mobile Device Security Adoption

By Rory Lidstone

The trend of BYOD (bring your own device) has grown steadily in popularity in recent years due to the benefits it offers in terms of employee productivity, as well as the fact that many companies believe they would be at a competitive disadvantage without it. However, there are still disadvantages to BYOD, with the primary concern being security, which usually leads to the deployment of mobile device security.

Infonetics Research addressed the rising use of mobile device security in its 2013 Mobile Security Strategies and Vendor Leadership: North American Enterprise Survey. This report examines enterprises' plans for deploying mobile device security solutions in addition to detailing their thoughts on leading mobile security vendors.

Excerpts of the survey, released today, indicate that one of the most common reasons for deploying mobile device security is to manage and secure rogue devices connected by users, according to 72 percent of respondents. Meanwhile, a little over 75 percent of respondents have already purchased or are considering purchasing a cloud-based or hybrid cloud/client-based mobile security solution, driven largely by cost.

About one third of the enterprises surveyed by Infonetics currently allow the use of employee-owned devices — namely iPads, iPhones, and Android smartphones and tablets — on their networks.

“For many IT organizations, there’s an immediate need to do something about the mobile device security problem because like it or not, a new wave of mobile devices is being connected to corporate networks, and companies are looking to lock down these devices and control which apps they can use,” said Jeff Wilson, principal analyst for security at Infonetics Research, in a statement.

“We believe that SSL VPNs will become a cornerstone of many enterprise mobile device security strategies moving forward because they solve an immediate connection security requirement, are familiar and easy to use, often free, and will likely support additional security and control functions,” Wilson added.

The report also stated that around one million malicious or high-risk Android apps are expected this year, while nearly all enterprises are expected to experience "significant device security incidents" before 2015.




Edited by Amanda Ciccatelli
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Contributing Writer

SHARE THIS ARTICLE
Related Articles

Can MSPs Cut Microsoft Teams Incident Management Time by 50%? Martello Says Yes

By: Erik Linask    6/18/2025

New research shows MSPs can achieve a 50% reduction in labor required for Microsoft Teams incident management by using proactive monitoring and advanc…

Read More

Supercharging Your MSP with AI at SuperSummit 2025 in Dallas

By: Erik Linask    6/18/2025

SuperSummit 2025 features targeted content and education to help MSPs capitalize on the AI revolution to improve there businesses models and operation…

Read More

Ooma AirDial Elevates POTS Replacement for Large Organizations

By: Erik Linask    6/17/2025

Ooma's new RDM features are tailored for scalability of POTS replacement projects, whether those are managed by in-house IT teams or MSP partners.

Read More

Arctic Wolf Revamps MSP Channel, adds Endpoint Security

By: Erik Linask    6/13/2025

Arctic Wolf has redesigned its MSP partner program and introduced Aurora Endpoint Security for MSPs in an effort to equip MSP with the tools to combat…

Read More

Monetizing Conversational AI: Sell Outcomes, Not Technology

By: Special Guest    6/12/2025

The key for resellers and service providers is to package AI technology in a manner that is understandable, easy to implement, and aligned with SMB bu…

Read More