Infonetics Research Says Mobile Device Security is a Growing Challenge

Infonetics Research Says Mobile Device Security is a Growing Challenge

Mobile Device Security

Mobile Device Security

According to the latest findings from market research firm Infonetics Research, mobile device security is becoming more of a priority for US businesses. Infonetics  says that:

  • The majority of enterprises surveyed cited that strong drivers for deploying mobile device security were the need to deliver solutions that effectively handle mobile application control and mixed personal and business use.
  • When it comes to providing mobile device security, nearly half of respondents place their trust in the device OS manufacturers, waiting for security features to be embedded into the OS itself rather than using overlay security solutions
  • About half of those surveyed have dealt with lost or stolen devices containing sensitive or proprietary data.
  • Only 15% of respondents (or less) believe that remote wipe, device location, or disk/file/SD card encryption are key technologies for their mobile security solution.

Jeff Wilson, principal analyst for security at Infonetics Research commented :

Nearly every enterprise in North America needs a mobile security solution because they’re either managing mobile devices they own, rolling out a structured BYOD program, or getting control of rogue employee-owned mobile devices that have been connected to the network. The lines between corporate and personal assets are blurring.

View Full Details

Infonetics: Mobile Device Security Taking Front Stage as Businesses Try to Get Tighter Grip on Mobile Gear

March 07, 2014 04:26 PM Eastern Standard Time

CAMPBELL, Calif.–(BUSINESS WIRE)–Market research firm Infonetics Research released excerpts from its 2014 Mobile Security Strategies and Vendor Leadership: North American Enterprise Survey, which details enterprises’ plans for deploying security solutions for mobile devices, as well as their thoughts on leading mobile security vendors.

ANALYST NOTE

“Nearly every enterprise in North America needs a mobile security solution because they’re either managing mobile devices they own, rolling out a structured BYOD program, or getting control of rogue employee-owned mobile devices that have been connected to the network. The lines between corporate and personal assets are blurring,” says Jeff Wilson, principal analyst for security at Infonetics Research.

“What the industry needs are solutions capable of securing all company- and employee-owned devices from the same console, to ensure an identical level of protection for all devices, which means deploying security in the network or cloud as well as on the device.”

ENTERPRISE MOBILE SECURITY SURVEY HIGHLIGHTS

  • A majority of enterprises surveyed cited delivering solutions that effectively handle mobile application control and mixed personal and business use as strong drivers for deploying mobile device security
  • When it comes to providing mobile device security, nearly half of respondents place their trust in the device OS manufacturers, waiting for security features to be embedded into the OS itself rather than using overlay security solutions
  • About half of those surveyed have dealt with lost or stolen devices containing sensitive or proprietary data, but only 15% (or less) believe that remote wipe, device location, or disk/file/SD card encryption are key technologies for their mobile security solution

SECURITY WEBINAR

Join analyst Jeff Wilson Mar. 20 for Using Big Data Analytics to Amplify Security Intelligence, a live primer for enterprises looking to use big data to detect, mitigate, and prevent malicious attacks: http://w.on24.com/r.htm?e=752135&s=1&k=0982A14627EA5282D4986F686F78F03E

ABOUT INFONETICS’ MOBILE SECURITY STUDY

For its 29-page mobile security survey, Infonetics interviewed purchase-decision makers at medium and large companies in the U.S. and Canada about their mobile device security strategies. The survey provides insights into enterprises’ mobile security deployment drivers and barriers, purchase plans and expenditures, cloud and SaaS solutions, security incidents, security products and technologies, and familiarity with and ratings of mobile security vendors. Vendors named in the report include AirWatch, Apple, Check Point, Cisco, F-Secure, IBM, Juniper, Kaspersky, Lookout, McAfee, Microsoft, MobileIron, NQ Mobile Security, RIM, SmrtGuard, Symantec/Norton, Trend Micro, Webroot, Zenprise/Citrix, and others. To buy the survey, contact Infonetics: www.infonetics.com/contact.asp.

RELATED REPORT EXCERPTS

Mobile security gateway market closes 2013 up 70%

Cloud and data center operators investing heavily in security, rate top vendors

Application-layer attacks sparking new investments in DDoS solutions

NSA spygate underscores need for multi-layered security in the data center

RECENT AND UPCOMING SECURITY RESEARCH

Download Infonetics’ 2014 market research brochure, publication calendar, events brochure, report highlights, tables of contents, and more at www.infonetics.com/login.

Analyst Note: Infonetics Research’s Top 2014 Trends (Jan.)

Analyst Note: 2014 Security Trends: How Can We Top 2013? (Jan.)

Content Security Gateway Appliances, Software & SaaS Market Share & Forecasts (Feb.)

Network Security Appliances & Software Market Share & Forecasts (Mar.)

Cloud & CPE Managed Security Services Market Size & Forecasts (Mar.)

Data Center Security Strategies & Vendor Leadership: N.A. Enterprise Survey (Mar.)

Mobile Device Security Client Software Market Size & Forecasts (Apr.)

INFONETICS SECURITY WEBINARS

Visit https://www.infonetics.com/infonetics-events to register for upcoming webinars, view recent webinars on demand, or learn about sponsoring a webinar.

SDN and NFV: The Nitty Gritty (Mar. 18: Attend)

Using Big Data Analytics to Improve Security (Mar. 20: Attend)

Virtualizing Networks with SDN NVOs and Bare Metal Switches (Mar. 25: Attend)

Redefining Network Security Performance: The Speed You Really Need (View on-demand)

Data Center Firewalls: The New Performance Requirements (View on-demand)

DDoS Mitigation Strategies: What’s Next (Sponsor)

Securely Connecting Users in an Any Time, Any Place, Any Device World (Sponsor)

Using Next-Gen Security Appliances to Consolidate Security Strategies (Sponsor)

TO BUY REPORTS, CONTACT: N. America (West), Asia Pacific: Larry Howard, larry@infonetics.com, +1 408-583-3335

N. America (East, Midwest), L. America: Scott Coyne, scott@infonetics.com, +1 408-583-3395

EMEA, India, Singapore: George Stojsavljevic, george@infonetics.com, +44 755-488-1623

Japan, South Korea, China, Taiwan: www.infonetics.com/contact.asp

ABOUT INFONETICS

Infonetics Research (www.infonetics.com) is an international market research and consulting firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete effectively. View Infonetics’ About Us slides at http://bit.ly/QUrbrV.

Contacts

Infonetics Research

Jeff Wilson, +1-408-583-3337

Principal Analyst, Security

jeff@infonetics.com

Twitter: @securityjeff

“Nearly every enterprise in North America needs a mobile security solution because they’re either managing mobile devices they own, rolling out a structured BYOD program, or getting control of rogue employee-owned mobile devices that have been connected to the network. The lines between corporate and personal assets are blurring,” says Jeff Wilson, principal analyst for security at Infonetics Research. (Graphic: Infonetics Research)

Original source

Related News

Related Posts:

Tags: , ,

Comments are closed.