Infonetics Research Finds 'Rogue Devices' a Major Factor in Mobile Device Security Adoption

Infonetics Research Finds 'Rogue Devices' a Major Factor in Mobile Device Security Adoption

By Rory Lidstone

The trend of BYOD (bring your own device) has grown steadily in popularity in recent years due to the benefits it offers in terms of employee productivity, as well as the fact that many companies believe they would be at a competitive disadvantage without it. However, there are still disadvantages to BYOD, with the primary concern being security, which usually leads to the deployment of mobile device security.

Infonetics Research addressed the rising use of mobile device security in its 2013 Mobile Security Strategies and Vendor Leadership: North American Enterprise Survey. This report examines enterprises' plans for deploying mobile device security solutions in addition to detailing their thoughts on leading mobile security vendors.

Excerpts of the survey, released today, indicate that one of the most common reasons for deploying mobile device security is to manage and secure rogue devices connected by users, according to 72 percent of respondents. Meanwhile, a little over 75 percent of respondents have already purchased or are considering purchasing a cloud-based or hybrid cloud/client-based mobile security solution, driven largely by cost.

About one third of the enterprises surveyed by Infonetics currently allow the use of employee-owned devices — namely iPads, iPhones, and Android smartphones and tablets — on their networks.

“For many IT organizations, there’s an immediate need to do something about the mobile device security problem because like it or not, a new wave of mobile devices is being connected to corporate networks, and companies are looking to lock down these devices and control which apps they can use,” said Jeff Wilson, principal analyst for security at Infonetics Research, in a statement.

“We believe that SSL VPNs will become a cornerstone of many enterprise mobile device security strategies moving forward because they solve an immediate connection security requirement, are familiar and easy to use, often free, and will likely support additional security and control functions,” Wilson added.

The report also stated that around one million malicious or high-risk Android apps are expected this year, while nearly all enterprises are expected to experience "significant device security incidents" before 2015.




Edited by Amanda Ciccatelli
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Contributing Writer

SHARE THIS ARTICLE
Related Articles

Real Estate Forecast 2025: Emerging Developments and Market Shifts

By: Contributing Writer    7/1/2025

Buying or selling property can be challenging. Rising mortgage rates and fluctuating home prices leave many uncertain about their next move. Business …

Read More

Protecting Business Assets with Smarter Security Frameworks

By: Contributing Writer    7/1/2025

Protecting your business is more challenging than ever. Cyber threats are increasing every day. Hackers target small and large businesses alike, searc…

Read More

Reimagining Public Transportation in the Era of Smart Mobility

By: Contributing Writer    7/1/2025

Public transportation can be frustrating. Buses stuck in traffic, late trains, and hard-to-navigate systems often leave people stressed or stranded. M…

Read More

SonicWall Powers Secure Access for Missouri MSP, Improving Cybersecurity and Network Access for Clients

By: Erik Linask    6/27/2025

With SonicWall, Stronghold Data delivers a modern, secure remote access solution that ensures access to networks and resources and improves cybersecur…

Read More

Guardz Unleashes AI-Driven ITDR to Combat Escalating Identity-Based Threats

By: Erik Linask    6/26/2025

The launch of Identity Threat Detection and Response (ITDR) gives MSPs the tools to defend SMBs against increasingly sophisticated attacks targeting u…

Read More