Access your Pro+ Content below.
Enterprise mobile security by the numbers
This article is part of the Information Security magazine issue of July/August 2013 / Volume 15 / No. 6
SearchSecurity.com polled 768 IT and security professionals in April 2013 and the data clearly indicates that the challenges of securing a multi-device environment continue to mount. While shifting IT assets outside of the firewall can help companies to lower costs, roughly 60% of the Enterprise Mobile Security Survey 2013 respondents believe mobile devices present more risk to their organizations compared to Q2 2012. About 30% of respondents do not see higher risk, while 13% said they don’t know. The consumerization of IT isn’t slowing down as more employees use personally-owned devices to access corporate data and applications. But a surprising finding in our 2013 survey was how many companies no longer even issued mobile devices outside of traditional laptop computers, sliding from 83% in our Enterprise Mobile Security Survey 2012 to 65% (Figure 1). Figure 1. Many companies no longer issue mobile devices, apart from laptops. Despite growing concerns over mobile security, only 60% of respondents indicated that their ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
In this special report, Dave Shackleford explores advanced network security architectures that help segment and isolate traffic with in your data center.
Cover story: Want to shed appliances? Consolidation and new platforms hold promise for security teams.
The majority of breaches occur as the result of third parties. MacDonnell Ulsch advises companies to safeguard third-party management agreements.
Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed?
Columns in this issue
We polled readers in our annual Enterprise Mobile Security Survey and the 2013 results are in.
A decade after becoming law, the ripple effects of California's SB 1386 have surfaced in a new breed of proactive, granular state data privacy laws.
Big data presents big challenges for computer science programs from classification to cloud security. Are industry partnerships the answer?