SlideShare a Scribd company logo
1 of 6
Download to read offline
© 2012 AirTight Networks. All rights reserved.
Impact of Bring Your Own Device (BYOD)
on Enterprise Security
A Survey by AirTight Networks, April 2012
316 respondents
How pervasive do you think is the use of                                           How do you view the BYOD trend
personal smart devices in your enterprise?                                               for your enterprise?




                  49%                                                                            61%


                           10%
                             3%
                                                                                      14%

                  38%                                                                            25%




                                   © 2012 AirTight Networks. All rights reserved.
Are iPads, iPhones and Androids sanctioned                      If your organization allows BYOD, do you support
      technology in your environment?                               the applications your users are accessing?




                  33%                                                                    47%

        17%
                           13%                                                                       11%

                                                                                   25%
                 37%                                                                           17%




                                  © 2012 AirTight Networks. All rights reserved.
Do you see an increasing trend                                  Are you concerned about employees using
of employees bringing Rogue Wi-Fi APs?                              mobile hotspots to bypass corporate policies?




              50%                                                                            20%


                                                                                                   11%
                      34%                                                        69%
         16%




                                © 2012 AirTight Networks. All rights reserved.
Are you concerned about the security of data                               Has BYOD affected the measures you take
 transmitted over personal smart devices?                                           for network security?




                       20%                                                               56%



                                                                                                      11%
                             11%

            69%                                                                            33%




                                   © 2012 AirTight Networks. All rights reserved.
How do you enforce your security policy                      Are you planning to invest in one or more of these
        for managing BYOD?                                      security solutions in the next 6-12 months?




          52%                                                                                 22%
                                                                                  44%
                          22%



                        9%                                                              34%
         4% 4%    9%




                                 © 2012 AirTight Networks. All rights reserved.

More Related Content

Similar to Survey on the Impact of BYOD on Enterprise Security

Raddon Chart of the Day February 23, 2012
Raddon Chart of the Day February 23, 2012Raddon Chart of the Day February 23, 2012
Raddon Chart of the Day February 23, 2012
Raddon Financial Group
 
Privacy & Data Breach Management
Privacy & Data Breach Management Privacy & Data Breach Management
Privacy & Data Breach Management
Resilient Systems
 
Raddon Chart of the Day February 28, 2012
Raddon Chart of the Day February 28, 2012Raddon Chart of the Day February 28, 2012
Raddon Chart of the Day February 28, 2012
Raddon Financial Group
 
Raddon Chart of the Day February 21, 2012
Raddon Chart of the Day February 21, 2012Raddon Chart of the Day February 21, 2012
Raddon Chart of the Day February 21, 2012
Raddon Financial Group
 
Byod four steps to enabling your network michael greco
Byod four steps to enabling your network michael grecoByod four steps to enabling your network michael greco
Byod four steps to enabling your network michael greco
K Singh
 
Mobilising people and enterprise
Mobilising people and enterpriseMobilising people and enterprise
Mobilising people and enterprise
Pim Bilderbeek
 
UK enterprises' 2012 IT investment priorities
UK enterprises' 2012  IT investment prioritiesUK enterprises' 2012  IT investment priorities
UK enterprises' 2012 IT investment priorities
Vanson Bourne
 

Similar to Survey on the Impact of BYOD on Enterprise Security (20)

Eclipse survey 2012 report [final]
Eclipse survey 2012 report [final]Eclipse survey 2012 report [final]
Eclipse survey 2012 report [final]
 
The Influential CIO
The Influential CIOThe Influential CIO
The Influential CIO
 
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 yearsThe Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
The Cloud and Mobility Pivot - How MSPs can retool for the next 5 years
 
"Open CRM" - Tom Schuster
"Open CRM" - Tom Schuster"Open CRM" - Tom Schuster
"Open CRM" - Tom Schuster
 
Raddon Chart of the Day June 14, 2012
Raddon Chart of the Day June 14, 2012Raddon Chart of the Day June 14, 2012
Raddon Chart of the Day June 14, 2012
 
How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...
How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...
How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...
 
Raddon Chart of the Day February 23, 2012
Raddon Chart of the Day February 23, 2012Raddon Chart of the Day February 23, 2012
Raddon Chart of the Day February 23, 2012
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech Week
 
Privacy & Data Breach Management
Privacy & Data Breach Management Privacy & Data Breach Management
Privacy & Data Breach Management
 
Raddon Chart of the Day February 28, 2012
Raddon Chart of the Day February 28, 2012Raddon Chart of the Day February 28, 2012
Raddon Chart of the Day February 28, 2012
 
Raddon Chart of the Day February 21, 2012
Raddon Chart of the Day February 21, 2012Raddon Chart of the Day February 21, 2012
Raddon Chart of the Day February 21, 2012
 
20121018 appconference dot_org_mobile_industry_trends_nielsen
20121018 appconference dot_org_mobile_industry_trends_nielsen20121018 appconference dot_org_mobile_industry_trends_nielsen
20121018 appconference dot_org_mobile_industry_trends_nielsen
 
SolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and BudgetSolarWinds UK and Germany SME Survey Results - Time and Budget
SolarWinds UK and Germany SME Survey Results - Time and Budget
 
Byod four steps to enabling your network michael greco
Byod four steps to enabling your network michael grecoByod four steps to enabling your network michael greco
Byod four steps to enabling your network michael greco
 
Raddon Chart of the Day June 12, 2012
Raddon Chart of the Day June 12, 2012Raddon Chart of the Day June 12, 2012
Raddon Chart of the Day June 12, 2012
 
Survey results: [Cross-Platform-] Development of Mobile Applications
Survey results: [Cross-Platform-] Development of Mobile ApplicationsSurvey results: [Cross-Platform-] Development of Mobile Applications
Survey results: [Cross-Platform-] Development of Mobile Applications
 
Symantec 2010 Windows 7 Migration Survey
Symantec 2010 Windows 7 Migration SurveySymantec 2010 Windows 7 Migration Survey
Symantec 2010 Windows 7 Migration Survey
 
Mobilising people and enterprise
Mobilising people and enterpriseMobilising people and enterprise
Mobilising people and enterprise
 
Raddon Chart of the Day June 19, 2012
Raddon Chart of the Day June 19, 2012Raddon Chart of the Day June 19, 2012
Raddon Chart of the Day June 19, 2012
 
UK enterprises' 2012 IT investment priorities
UK enterprises' 2012  IT investment prioritiesUK enterprises' 2012  IT investment priorities
UK enterprises' 2012 IT investment priorities
 

More from AirTight Networks

Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise Thyself
AirTight Networks
 

More from AirTight Networks (20)

Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise Thyself
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution brief
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQs
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 

Recently uploaded

Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 

Survey on the Impact of BYOD on Enterprise Security

  • 1. © 2012 AirTight Networks. All rights reserved. Impact of Bring Your Own Device (BYOD) on Enterprise Security A Survey by AirTight Networks, April 2012 316 respondents
  • 2. How pervasive do you think is the use of How do you view the BYOD trend personal smart devices in your enterprise? for your enterprise? 49% 61% 10% 3% 14% 38% 25% © 2012 AirTight Networks. All rights reserved.
  • 3. Are iPads, iPhones and Androids sanctioned If your organization allows BYOD, do you support technology in your environment? the applications your users are accessing? 33% 47% 17% 13% 11% 25% 37% 17% © 2012 AirTight Networks. All rights reserved.
  • 4. Do you see an increasing trend Are you concerned about employees using of employees bringing Rogue Wi-Fi APs? mobile hotspots to bypass corporate policies? 50% 20% 11% 34% 69% 16% © 2012 AirTight Networks. All rights reserved.
  • 5. Are you concerned about the security of data Has BYOD affected the measures you take transmitted over personal smart devices? for network security? 20% 56% 11% 11% 69% 33% © 2012 AirTight Networks. All rights reserved.
  • 6. How do you enforce your security policy Are you planning to invest in one or more of these for managing BYOD? security solutions in the next 6-12 months? 52% 22% 44% 22% 9% 34% 4% 4% 9% © 2012 AirTight Networks. All rights reserved.