Board logo

subject: Corporate Mobile Device Use And Security --- Aarkstore Enterprise [print this page]


Introduction
Introduction

Ovum and the EEMA have polled a number of their enterprise customers and members to discover how they are using mobile devices to enable employees to access corporate networks, and what their security policies are. Although mobile device use is almost universal, the results reveal a conservative approach to using the technology, with a wide range of diversity in its implementation.

Features and benefits

Mobile devices are almost universally issued to employees, and 70% can use them for some personal purposes.

Data leakage, compliance failure, loss of control, and vulnerability to malware are major concerns.

Highlights

"Consumerization," in which the employee owns their mobile device for accessing corporate systems, is happening but still at an early stage. Personal use of corporate devices is much more common. Security needs to be more holistic and better thought through.

Your key questions answered

What is the state of mobile device selection in the corporate world?

What are the principal enterprise concerns surrounding the use of mobile devices?

Table of Contents :

SUMMARY

Catalyst

Ovum view

Key messages

ORGANIZATIONS ALMOST UNIVERSALLY PROVIDE MOBILE DEVICES

The employer issues the device in most cases

Personal devices are not widely permitted to connect to corporate systems

E-mail dominates mobile device use

NEARLY 70% OF EMPLOYEES CAN USE THEIR CORPORATE DEVICE FOR PERSONAL ACTIVITIES

Most employees have some restrictions on their access

Personal communication applications are widely used from corporate devices

DATA LEAKAGE IS THE PRIMARY SECURITY FEAR

Uncontrolled interaction with external services is causing concern

Concern centers on potential risk, rather than actual loss

SECURITY PROVISION IS PATCHY

Provision doesnt match the level of concern

RECOMMENDATIONS

Recommendations for enterprises

Recommendations for vendors

APPENDIX

Further reading

Methodology

Author

Ovum Consulting

Disclaimer

FIGURES

Figure: Mobile devices supplied by companies

Figure: Access permitted from personal mobile devices

Figure: Corporate applications accessible from mobile devices

Figure: Policy for personal use of company-owned devices

Figure: External communication tools on corporate devices

Figure: Risks emanating from mobile devices

Figure: Security impact of smartphones

Figure: Security technologies used on mobile devices

Figure: Access control to corporate applications

For more information, please visit :

http://www.aarkstore.com/reports/Corporate-mobile-device-use-and-security-80174.html

Contact :Sanaa

Aarkstore Enterprise

Tel : +912227453309

Mobile No: +919272852585

Email : contact@aarkstore.com

by: Aarkstore Enterprise




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0