Access "Enterprise mobile security by the numbers"
This article is part of the July/August 2013 / Volume 15 / No. 6 issue of Unlock new pathways to network security architecture
SearchSecurity.com polled 768 IT and security professionals in April 2013 and the data clearly indicates that the challenges of securing a multi-device environment continue to mount. While shifting IT assets outside of the firewall can help companies to lower costs, roughly 60% of the Enterprise Mobile Security Survey 2013 respondents believe mobile devices present more risk to their organizations compared to Q2 2012. About 30% of respondents do not see higher risk, while 13% said they don’t know. The consumerization of IT isn’t slowing down as more employees use personally-owned devices to access corporate data and applications. But a surprising finding in our 2013 survey was how many companies no longer even issued mobile devices outside of traditional laptop computers, sliding from 83% in our Enterprise Mobile Security Survey 2012 to 65% (Figure 1). Figure 1. Many companies no longer issue mobile devices, apart from laptops. Despite growing concerns over mobile security, only 60% of respondents indicated that their organization required security ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Unlock new pathways to network security architecture
by Dave Shackleford
Cover story: Want to shed appliances? Consolidation and new platforms hold promise for security teams.
-
Enterprise mobile security by the numbers
by Kathleen Richards, Features Editor
Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed?
-
Unlock new pathways to network security architecture
by Dave Shackleford
-
-
Third-party risk management: Horror stories? You are not alone
by MacDonnell Ulsch, Contributor
The majority of breaches occur as the result of third parties. MacDonnell Ulsch advises companies to safeguard third-party management agreements.
-
Third-party risk management: Horror stories? You are not alone
by MacDonnell Ulsch, Contributor
-
Columns
-
New data on enterprise mobile security
by Kathleen Richards, Features Editor
We polled readers in our annual Enterprise Mobile Security Survey and the 2013 results are in.
-
Ten years later: The legacy of SB 1386 compliance on data privacy laws
by Randy Sabett, Contributor
A decade after becoming law, the ripple effects of California's SB 1386 have surfaced in a new breed of proactive, granular state data privacy laws.
-
Is big data education a big failure?
by Doug Jacobson and Julie A. Rursch
Big data presents big challenges for computer science programs from classification to cloud security. Are industry partnerships the answer?
-
New data on enterprise mobile security
by Kathleen Richards, Features Editor
More Premium Content Accessible For Free
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Enterprise network security visibility: Beyond traditional defenses
E-Handbook
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security ...