Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.

Divider

Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Loading...
Loading...
Click here to hide

MaaS360 by Fiberlink

Study: 350 million employee-owned devices in the enterprise by 2014

Are the devices connecting to your corporate network secure? Are they protected by effective passwords and antivirus software?

brianChristiniNEW2

Study: 350 million employee-owned devices in the enterprise by 2014

byod, mobile device management, policies


Are the devices conecting to your corporate network secure? Are they protected by effective passwords and antivirus software?

While those are the types of questions causing concern for many business leaders, a recent study by Juniper found many employees connect to the enterprise network without securing their devices. As a recent Apps Tech News article reported, bring-your-own-device (BYOD) is on the rise, and has jeopardized mobile device security for many professionals.

More BYOD, more mobile device security concerns
According to the article, there will be 350 million employee-owned smartphones and tablets operating in businesses in the next two years, up from the 150 million currently in the enterprise environment. Despite the high number of mobile devices, many employees have no security software installed—a big threat when combined with the increasing growth in mobile shopping, payments and banking.

The reality of BYOD was also discussed in a recent IT Business Edge article. The article highlighted comments from Peter Frankl, Senior Vice President for lifecycle management at Absolute Software, who said BYOD presents challenges, but can end up paying for itself when properly managed. Frankl said one of the challenges with issuing company devices is keeping up with technology.

"The point is that even if IT bought those people a mobile computing device, within the year many of those same people would be looking to attach the next cool thing to the corporate network long before the device IT gave them either depreciated or was eligible for an upgrade," the article hypothesized.

Leveraging mobile device management (MDM)
Another point Frankl made was that ignoring BYOD could end up posing more risks than BYOD itself. This means IT departments need to take a proactive approach, starting with policy. Once a clear policy has been established—one that addresses potential compliance and security concerns as well as employee privacy—companies can begin looking for a mobile device management solution that meets specific business needs.

Effective mobile device management solutions address problems such as lax security practices by employees. Are there employees falling behind in installing the latest security patches for their OS? That's fine on their own devices, but MDM can prevent those insecure devices from accessing critical business applications and data. By making every employee more secure, businesses can protect data and ensure compliance with stringent security standards.

Recommended Articles for You

Post a Comment

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments

Industry News
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.