REPORTS
Strategy: Mobile UC

Research: 2013 State Of Mobile Security

Strategy: Mobile UC

2013 State Of Mobile Security 

Company data on personal devices is a done deal. So is risk: In its threat report for the first quarter of 2013, McAfee says it has 50,926 malware instances on file, with 28% of that volume arriving in 2013. In all of 2011, the company gathered only 792 samples.

Among the 424 respondents to our InformationWeek 2013 Mobile Security Survey, all of whom are involved with mobile device management, policy development and/or security at their organizations, 68% support bring your own device in some form, and an additional 20% are in the process of developing BYOD policies. Other data points:

>> 78% say their top mobile security concern is lost/stolen devices, well ahead of the No. 2 worry, users forwarding corporate information to cloud-based storage services (cited by 36%)

>> 46% require a power-on password as an authentication mechanism for mobile devices that access enterprise data/networks

>> 45% let users bring in any device, and they let it on the network as long as the user agrees to certain policies; no enforcement

>> 45% have had a data loss within the past 12 months; 11% of them were required to publicly disclose the loss

In this report, we:

>> Examine the business and technology trends pushing the move to mobility.

>> Provide recommendations on building a policy and enforcement program that can adapt to explosive growth, changing mobile technology and a dynamic mix of client ­devices.

Respondent breakdown: 32% have 5,000 or more employees; 22% are over 10,000. Financial services, government, manufacturing and education are well-represented, and 34% are IT director/manager or IT executive management (C-level/VP) level. (R6890613)

 

Survey Name   InformationWeek 2013 Mobile Security Survey 

Survey Date   April 2013

Region   North America

Number of Respondents    424

Purpose   To examine mobile security technology trends and strategies.

Methodology   InformationWeek surveyed business technology decision-makers involved with mobile device management, policy development and/or security at North American companies. The survey was conducted online, and respondents were recruited via an email invitation containing an embedded link to the survey. The email invitation was sent to qualified InformationWeek subscribers.

 


 

Table of Contents