[Mobile Security] Personal Mobile Device Policy The Problem With Consumer-Oriented Devices
Our InformationWeek 2012 Mobile Security Survey shows safety is top of mind for CIOs as employees push to use their own devices to access corporate resources. Security teams are paying attention, too.
90% ! THE RISKS
Does your mobility policy allow employees to use personal mobile devices for work?
No, and we have no plans to allow personal device use
No, but we're developing a policy
24% This issue sponsored by: 62% Yes
IT uses various methods to ensure data security in transit.
65% VPN secure tunnel
52%Secure HTTP 35%Virtual desktop,
of 946 respondents to our 2012 Strategic Security Survey believe mobile devices pose a threat to their organization's security now (69%) or that they will (21%).
Which of the following best describes what is or will be your policy on acceptable user-supplied devices?
We allow user-supplied devices with no restrictions
Users can bring in a limited range of devices and must run our device management software
Users can bring in any device and we'll let IT on our network as long as the user agrees to certain polices
Mobile Device Management
Does your organization currently or plan to have a mobile device management system?
27% No like VMware or Citrix
17% 25% 18%
Base: 278 respondents at organizations with, or developing, a policy for personal mobile device use.
Missing Mobile Devices
In the past 12 months, has any mobile device containing enterprise data, including laptops or netbooks, come up missing (including accidental loss and theft)?
Yes, we have an MDM system
52% 48% NO
Yes, within the next 12 months
Yes, within the next 24 months
Data: InformationWeek 2012 Mobile Security Survey of 322 business technology professionals, March 2012 3 YES