Mobile security report: Data on devices

New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.

This Content Component encountered an error
This article can also be found in the Premium Editorial Download: Information Security magazine: Cyberthreats: Know thy enemy:
Which of these security initiatives will your company implement in 2014?

 

We asked the readers of Information Security and its sister sites (of which there are many) about their IT security initiatives in 2014. Not surprisingly, one-third of respondents in our Global IT Priorities Survey, conducted in Q4 2013, indicated that mobile endpoint security is part of a crowded to-do list. It ranked in the 30% range in our mobile security report data, alongside fundamental security controls including: threat detection/management, application-based security, vulnerability management, encryption, security data management/analysis and virtualization security. Only network-based security and data loss prevention ranked notably higher.

Which of these mobility initiatives will your company implement in 2014?

 

The mobile security report data is from TechTarget's Global IT Priorities survey, which electronically polled 4,151 IT managers and security professionals about their technology implementation strategies in 2014.

How will your company implement smartphones?

 

While mobile security is stuck in the middle of an ambitious list of initiatives in 2014, IT managers and corporate executives have struggled in recent years to secure their corporate data and internal networks, which must accommodate a mix of corporate-issued and personally owned devices. In an April 2013 TechTarget networking purchasing intentions survey of 2,700 IT managers, respondents ranked network security (31%) as the top priority for the next 12 months, followed by Wi-Fi/WLAN (27%) and data center network upgrades (25%). Bring your own device (consumer devices) outpaced all other categories as the top blind spot in existing implementations for network management (58%). Security (40%) ranked a distant second, followed by WLAN (31%) and cloud computing (31%), according to those surveyed.

What is your main goal with tablets?

 

Data from the latest TechTarget Global IT Priorities survey shows that mobile device security is still a hot spot for IT executives as tablets continue to gain ground on smartphones, and some organizations are exploring mobile virtualization and other security initiatives. Despite the clamor around BYOD, less than one-fourth (24%) of those surveyed are basing their mobile device strategies on plans that allow employees to choose and purchase their own devices. Most of those surveyed said their organizations will either use corporate-purchased devices (37%) or a combination of corporate-purchased and individually chosen (39%).

This was first published in February 2014

Dig deeper on Security Industry Market Trends, Predictions and Forecasts

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close