Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Large Enterprises Lead BYOD Adoption

Bring-your-own device has gone from being an industry buzz word to a legitimate trend and concern for many enterprises.

Bring-your-own device has gone from being an industry buzz word to a legitimate trend and concern for many enterprises.

According to a new survey from Good Technology, 72 percent of the roughly 100 respondents are already supporting bring-your-own device (BYOD) programs. Eighty percent of those have over 2,000 employees, while 60 percent have 5,000 or more – indicating that large enterprises are leading the way with BYOD adoption. The percentage of companies with no plans to support BYOD dropped from nine percent in the 2011 survey to five percent.

BYOD Adoption“This year’s report shows that BYOD continues to gain traction and those who have no plans to support BYOD are a small and rapidly shrinking minority of our customer base,” said John Herrema, senior vice president of corporate strategy at Good Technology, in a statement. “This is no surprise to us since we hear every day from our customers how embracing BYOD has made their enterprises more productive, collaborative, and competitive than they ever were before. We’re also seeing that BYOD is going global and that even our largest, most security conscious and highly regulated customers can safely embrace BYOD if they have the policies and supporting solutions in place to protect their business data and applications.”

The findings were backed up by a separate study by Dell Quest Software that revealed that approximately 70 percent of the roughly 1,500 people surveyed believe BYOD can improve their work processes, while 59 percent believe they would be at a competitive disadvantage without BYOD.

The Dell Quest survey also turned up significant differences in how BYOD programs are implemented in different countries. According to the survey, the U.S., Beijing region and Australia are the top three countries encouraging BYOD by actively managing and supporting any devices users want to bring to the corporate environment. France, Germany and the U.K. however were the bottom three countries in terms of providing that level of support.  

According to the survey by Good Technology, employee stipend and expense-back programs also influenced the number of employees using mobile devices. The majority of the companies offering stipends for employee-owned devices offer employees $61 a month or more. In cases where the stipends were limited to particular services, it was typically the user’s data plan was the most likely service to be covered overall. More than half of the companies surveyed also allowed the stipend to be applied to voice plans and text messages. Ninety-three percent of the organizations that allow employees to expense mobile costs only cover certain services, and 70 percent place a cap on expenses.

Only an estimated 19 percent of the German respondents to the Dell Quest survey said their users would be required to purchase a support program for all their personal devices. However, about 30 percent of the organizations in Germany state their employees will not be required to adhere to any regulations when it comes to devices in their BYOD policy.

“In my previous role as CIO of Quest Software, our IT empowered nearly 4,000 employees across 60 offices in 23 countries to use their preferred mobile devices whether they were phones, tablets, or non-standard laptops to do their jobs,” said Carol Fawcett, chief information officer, Dell Software Group, in a statement. “Instead of worrying about their devices, we focused on enabling access to the apps and data needed by the appropriate individuals regardless of device. We found this approach allowed us to be much more strategic and enabled us to focus on our biggest BYOD problems: security, access rights and data leakage.”

Advertisement. Scroll to continue reading.
Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.