Infonetics Research Finds 'Rogue Devices' a Major Factor in Mobile Device Security Adoption

By Rory Lidstone

The trend of BYOD (bring your own device) has grown steadily in popularity in recent years due to the benefits it offers in terms of employee productivity, as well as the fact that many companies believe they would be at a competitive disadvantage without it. However, there are still disadvantages to BYOD, with the primary concern being security, which usually leads to the deployment of mobile device security.

Infonetics Research addressed the rising use of mobile device security in its 2013 Mobile Security Strategies and Vendor Leadership: North American Enterprise Survey. This report examines enterprises' plans for deploying mobile device security solutions in addition to detailing their thoughts on leading mobile security vendors.

Excerpts of the survey, released today, indicate that one of the most common reasons for deploying mobile device security is to manage and secure rogue devices connected by users, according to 72 percent of respondents. Meanwhile, a little over 75 percent of respondents have already purchased or are considering purchasing a cloud-based or hybrid cloud/client-based mobile security solution, driven largely by cost.

About one third of the enterprises surveyed by Infonetics currently allow the use of employee-owned devices — namely iPads, iPhones, and Android smartphones and tablets — on their networks.

“For many IT organizations, there’s an immediate need to do something about the mobile device security problem because like it or not, a new wave of mobile devices is being connected to corporate networks, and companies are looking to lock down these devices and control which apps they can use,” said Jeff Wilson, principal analyst for security at Infonetics Research, in a statement.

“We believe that SSL VPNs will become a cornerstone of many enterprise mobile device security strategies moving forward because they solve an immediate connection security requirement, are familiar and easy to use, often free, and will likely support additional security and control functions,” Wilson added.

The report also stated that around one million malicious or high-risk Android apps are expected this year, while nearly all enterprises are expected to experience "significant device security incidents" before 2015.

Edited by Amanda Ciccatelli

Contributing Writer

Related Articles

Safe and Efficient Document Management

By: Special Guest    11/25/2020

The effectiveness of your MSP document management is directly related to customer satisfaction. Appropriate management has to be not only secure but a…

Read More

How to Deal With Dirty Data in Your ERP

By: Special Guest    11/25/2020

Having reliable and clean data as a company is a make it break it situation. One of the most important business investments is having an inventory opt…

Read More

Many MSPs Growing and Embracing New Opportunities During Pandemic

By: Laura Stotler    11/24/2020

A recent survey from Datto shows that a majority of MSPs are faring well during the coronavirus pandemic, with many discovering new growth and busines…

Read More

NRTC Managed Services Group Ramps Up Offerings for Rural America During COVID-19

By: Stefania Viscusi    11/19/2020

The Managed Services group, which provides innovative technology and support for 1,500 electric and telephone members in rural America, said they have…

Read More

Sungard AS Grows Next-Gen AWS MSP Partners

By: Stefania Viscusi    11/16/2020

Sungard Availability Services (Sungard AS), which is known for helping businesses transform their IT environments, has been making a name for itself b…

Read More