NEW YORK, Dec. 9, 2010 /PRNewswire/ --Reportlinker.com announces that a new market research report is available in its catalogue:
Corporate mobile device use and security
http://www.reportlinker.com/p0337478/Corporate-mobile-device-use-and-security.html
Introduction
Ovum and the EEMA have polled a number of their enterprise customers and members to discover how they are using mobile devices to enable employees to access corporate networks, and what their security policies are. Although mobile device use is almost universal, the results reveal a conservative approach to using the technology, with a wide range of diversity in its implementation.
Features and benefits
Mobile devices are almost universally issued to employees, and 70% can use them for some personal purposes.
Data leakage, compliance failure, loss of control, and vulnerability to malware are major concerns.
Highlights
"Consumerization," in which the employee owns their mobile device for accessing corporate systems, is happening but still at an early stage. Personal use of corporate devices is much more common. Security needs to be more holistic and better thought through.
Your key questions answered
What is the state of mobile device selection in the corporate world?
What are the principal enterprise concerns surrounding the use of mobile devices?
SUMMARY
Catalyst
Ovum view
Key messages
ORGANIZATIONS ALMOST UNIVERSALLY PROVIDE MOBILE DEVICES
The employer issues the device in most cases
Personal devices are not widely permitted to connect to corporate systems
E-mail dominates mobile device use
NEARLY 70% OF EMPLOYEES CAN USE THEIR CORPORATE DEVICE FOR PERSONAL ACTIVITIES
Most employees have some restrictions on their access
Personal communication applications are widely used from corporate devices
DATA LEAKAGE IS THE PRIMARY SECURITY FEAR
Uncontrolled interaction with external services is causing concern
Concern centers on potential risk, rather than actual loss
SECURITY PROVISION IS PATCHY
Provision doesn't match the level of concern
RECOMMENDATIONS
Recommendations for enterprises
Recommendations for vendors
APPENDIX
Further reading
Methodology
Author
Ovum Consulting
Disclaimer
FIGURES
Figure: Mobile devices supplied by companies
Figure: Access permitted from personal mobile devices
Figure: Corporate applications accessible from mobile devices
Figure: Policy for personal use of company-owned devices
Figure: External communication tools on corporate devices
Figure: Risks emanating from mobile devices
Figure: Security impact of smartphones
Figure: Security technologies used on mobile devices
Figure: Access control to corporate applications
To order this report:
Wireless Technology Industry: Corporate mobile device use and security
Wireless Technology Business News
Check our Company Profile, SWOT and Revenue Analysis!
CONTACT: |
|
Nicolas Bombourg |
|
Reportlinker |
|
Email: [email protected] |
|
US: (805)652-2626 |
|
Intl: +1 805-652-2626 |
|
SOURCE Reportlinker
Share this article