Infonetics: Mobile Device Security Taking Front Stage as Businesses Try to Get Tighter Grip on Mobile Gear

"Nearly every enterprise in North America needs a mobile security solution because they're either managing mobile devices they own, rolling out a structured BYOD program, or getting control of rogue employee-owned mobile devices that have been connected to the network. The lines between corporate and personal assets are blurring," says Jeff Wilson, principal analyst for security at Infonetics Research. (Graphic: Infonetics Research)

CAMPBELL, Calif.--()--Market research firm Infonetics Research released excerpts from its 2014 Mobile Security Strategies and Vendor Leadership: North American Enterprise Survey, which details enterprises’ plans for deploying security solutions for mobile devices, as well as their thoughts on leading mobile security vendors.

ANALYST NOTE

“Nearly every enterprise in North America needs a mobile security solution because they’re either managing mobile devices they own, rolling out a structured BYOD program, or getting control of rogue employee-owned mobile devices that have been connected to the network. The lines between corporate and personal assets are blurring,” says Jeff Wilson, principal analyst for security at Infonetics Research.

“What the industry needs are solutions capable of securing all company- and employee-owned devices from the same console, to ensure an identical level of protection for all devices, which means deploying security in the network or cloud as well as on the device.”

ENTERPRISE MOBILE SECURITY SURVEY HIGHLIGHTS

  • A majority of enterprises surveyed cited delivering solutions that effectively handle mobile application control and mixed personal and business use as strong drivers for deploying mobile device security
  • When it comes to providing mobile device security, nearly half of respondents place their trust in the device OS manufacturers, waiting for security features to be embedded into the OS itself rather than using overlay security solutions
  • About half of those surveyed have dealt with lost or stolen devices containing sensitive or proprietary data, but only 15% (or less) believe that remote wipe, device location, or disk/file/SD card encryption are key technologies for their mobile security solution

SECURITY WEBINAR

Join analyst Jeff Wilson Mar. 20 for Using Big Data Analytics to Amplify Security Intelligence, a live primer for enterprises looking to use big data to detect, mitigate, and prevent malicious attacks: http://w.on24.com/r.htm?e=752135&s=1&k=0982A14627EA5282D4986F686F78F03E

ABOUT INFONETICS’ MOBILE SECURITY STUDY

For its 29-page mobile security survey, Infonetics interviewed purchase-decision makers at medium and large companies in the U.S. and Canada about their mobile device security strategies. The survey provides insights into enterprises’ mobile security deployment drivers and barriers, purchase plans and expenditures, cloud and SaaS solutions, security incidents, security products and technologies, and familiarity with and ratings of mobile security vendors. Vendors named in the report include AirWatch, Apple, Check Point, Cisco, F-Secure, IBM, Juniper, Kaspersky, Lookout, McAfee, Microsoft, MobileIron, NQ Mobile Security, RIM, SmrtGuard, Symantec/Norton, Trend Micro, Webroot, Zenprise/Citrix, and others. To buy the survey, contact Infonetics: http://www.infonetics.com/contact.asp.

RELATED REPORT EXCERPTS

RECENT AND UPCOMING SECURITY RESEARCH

Download Infonetics’ 2014 market research brochure, publication calendar, events brochure, report highlights, tables of contents, and more at http://www.infonetics.com/login.

INFONETICS SECURITY WEBINARS

Visit https://www.infonetics.com/infonetics-events to register for upcoming webinars, view recent webinars on demand, or learn about sponsoring a webinar.

  • SDN and NFV: The Nitty Gritty (Mar. 18: Attend)
  • Using Big Data Analytics to Improve Security (Mar. 20: Attend)
  • Virtualizing Networks with SDN NVOs and Bare Metal Switches (Mar. 25: Attend)
  • Redefining Network Security Performance: The Speed You Really Need (View on-demand)
  • Data Center Firewalls: The New Performance Requirements (View on-demand)
  • DDoS Mitigation Strategies: What's Next (Sponsor)
  • Securely Connecting Users in an Any Time, Any Place, Any Device World (Sponsor)
  • Using Next-Gen Security Appliances to Consolidate Security Strategies (Sponsor)

TO BUY REPORTS, CONTACT:

N. America (West), Asia Pacific: Larry Howard, larry@infonetics.com, +1 408-583-3335

N. America (East, Midwest), L. America: Scott Coyne, scott@infonetics.com, +1 408-583-3395

EMEA, India, Singapore: George Stojsavljevic, george@infonetics.com, +44 755-488-1623

Japan, South Korea, China, Taiwan: http://www.infonetics.com/contact.asp

ABOUT INFONETICS

Infonetics Research (www.infonetics.com) is an international market research and consulting firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete effectively. View Infonetics’ About Us slides at http://bit.ly/QUrbrV.

Contacts

Infonetics Research
Jeff Wilson, +1-408-583-3337
Principal Analyst, Security
jeff@infonetics.com
Twitter: @securityjeff

Release Summary

Excerpts from Infonetics' 2014 Mobile Security Strategies and Vendor Leadership: N. American Enterprise Survey. Covers their plans for deploying security for mobile devices and views of vendors.

Contacts

Infonetics Research
Jeff Wilson, +1-408-583-3337
Principal Analyst, Security
jeff@infonetics.com
Twitter: @securityjeff