SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
sponsored by
Osterman Research, Inc.
P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA
Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com
www.ostermanresearch.com • twitter.com/mosterman
An Osterman Research Survey Report
Published June 2013
sponsored by
Survey Report: Managing BYOD
in Corporate Environments
SPON
SURVEYREPORT
SPON
©2013 Osterman Research, Inc. 1
Survey Report: Managing BYOD
in Corporate Environments
EXECUTIVE SUMMARY
The Bring Your Own Device (BYOD) trend is pervasive today in organizations of all
sizes and across all industries. It enables users and IT to improve worker
productivity and generate higher employee satisfaction, reduce operational costs,
innovate more quickly, and sustain competitive advantage. BYOD reflects the general
trend of enabling collaboration anytime, anywhere for workers who expect to be just
as productive away from the office as they are when working within their corporate
network (e.g., a presentation that is started on a laptop, revised on a tablet and
approved by team members on a smartphone). Moreover, BYOD enables workers to
achieve a seamless flow of information and access to applications across all of their
devices, whether these devices are supplied by their employer or personally owned.
At the same time, the BYOD trend is also posing challenges to IT to secure and
manage a much more diverse mobile device and application landscape.
SURVEY BACKGROUND
Osterman Research conducted two surveys in February and March 2013 focused on
Bring Your Own Device (BYOD) issues in small, mid-sized and large organizations,
primarily in North America. The two surveys, which were conducted online using a
combination of the Osterman Research survey panel and an external panel, had the
following focus areas and respondent counts:
• IT issues: 444 respondents were queried about issues that their IT departments
face when managing both personally owned and company-supplied mobile
devices and applications. The industries represented in the survey are shown in
the table below.
• End user issues: 433 end users of mobile devices were queried about the
primary mobile device they use for work-related purposes.
Industries Surveyed in the IT Survey
Industry %
Technology 17%
Financial services/insurance 13%
Government 11%
Education 10%
Manufacturing 9%
Energy 5%
Healthcare 4%
Entertainment/media 3%
Retail 3%
Consumer 2%
Automotive 1%
Real estate 1%
Telco 1%
Transportation 1%
Other 18%
ABOUT THIS SURVEY REPORT
This report presents the results of the surveys conducted for the Osterman Research
white paper entitled Managing BYOD in Corporate Environments that was published
in April 2013. That white paper is available from the Osterman Research Web site by
clicking here.
Osterman
Research
conducted two
surveys in
February and
March 2013
focused on Bring
Your Own Device
(BYOD) issues in
small, mid-sized
and large
organizations.
©2013 Osterman Research, Inc. 2
Survey Report: Managing BYOD
in Corporate Environments
IT SURVEY FINDINGS
Importance of Reasons to Support Personally Owned Devices
% Responding Important or Very Important
Reason %
Increasing worker productivity and making employees much more
productive on mobile devices
69%
Keep employees happy by permitting them to bring their own mobile
devices to work
61%
View mobile enablement as way to get ahead of competition and
sustain competitive advantage
48%
Reexamining how we engage with our customers, partners and
suppliers and thinking through the impact of making core critical
services available on these mobile devices
46%
Trying to reduce spend on our telecommunication bill 37%
We are committed to leveraging the cloud for IT services and
enabling enterprise mobility is a critical piece of the company’s
journey to moving workloads onto the cloud
34%
Keeping the stress off of our file-sharing infrastructure and reducing
on-premise storage costs
19%
Reducing the strain on our email server 17%
Penetration of Email, Smartphone and Tablet Users by Organization Size
Mobile device
penetration is
inversely related
to organization
size.
©2013 Osterman Research, Inc. 3
Survey Report: Managing BYOD
in Corporate Environments
Penetration of Company-Owned and Personally Owned Devices
% of Organizations in Which Applications are Deployed
Penetration of Personally Deployed Applications in Use
% of Organizations in Which Applications are Deployed
A larger
proportion of
organizations
have employee-
owned devices
within them than
company-owned
devices – a trend
that we anticipate
will continue.
©2013 Osterman Research, Inc. 4
Survey Report: Managing BYOD
in Corporate Environments
“Do you have a formal IT policy for supporting personally owned mobile
devices used for business purposes?”
Policies That Organizations Have Established for Personally Owned Devices
Policy
% of
Orgs
Acceptable use policies for devices 61%
Specific corporate resources may be accessed (email, calendar, etc.) 55%
Devices must be password/PIN-protected 55%
Only IT-approved devices may be used on the corporate network 48%
IT has the authority to remotely wipe employees’ devices 44%
Acceptable use policies for applications 42%
Only IT-approved operating systems or OS versions are permitted 39%
Specific Web sites may not be accessed over the corporate network 34%
Only IT-approved applications may be used on the corporate network 31%
Ownership of data on personally owned devices has been clearly
defined
31%
IT must have access to devices to install software, run malware
checks, etc.
30%
Specific applications are permitted 25%
Specific applications are not permitted 21%
Hourly employees have a separate BYOD policy than salaried
employees
7%
Camera/video capabilities may not be employed 5%
Only about one-
half of organ-
izations formally
support BYOD.
©2013 Osterman Research, Inc. 5
Survey Report: Managing BYOD
in Corporate Environments
Inhibitors for the Adoption of Enterprise Applications on Mobile Devices
% Responding an Inhibitor or Major Inhibitor
Mobile Device Management Systems in Use
2013 and 2014
Platform 2013 2014
BlackBerry Enterprise Server (BES) 61% 37%
Microsoft Systems Center Mobile Device Manager 22% 40%
Airwatch 15% 20%
Good Mobility Suite 10% 13%
HP Mobile Device Management 7% 8%
Zenprise (Citrix) 6% 9%
MobileIron 6% 9%
Good Dynamics 5% 7%
Fiberlink 4% 5%
Sybase Afaria 3% 3%
NotifyMDM 3% 3%
Others 16% 18%
One-half of
organizations are
not focused on
enableing
applications on
mobile devices.
©2013 Osterman Research, Inc. 6
Survey Report: Managing BYOD
in Corporate Environments
Access Permitted on Mobile Devices
Company-Supplied or Personally Owned
Application Access Methods Permitted on Mobile Devices
More than one-
half of organ-
izations permit
access to the
corporate
intranet from
mobile devices.
©2013 Osterman Research, Inc. 7
Survey Report: Managing BYOD
in Corporate Environments
Capabilities Enabled for Mobile Devices
Platform
Can be
Remotely
Wiped
Can be
Scanned
for
Malware
Can be
Scanned
for
Language
or Data
Leakage
Content
Can be
Archived
for
Comp-
liance
Company-owned smartphones 92% 38% 18% 22%
Company-owned iPads and
other tablets
87% 41% 20% 22%
Personally owned smartphones 73% 30% 12% 14%
Personally owned iPads and
other tablets
73% 32% 12% 15%
Seriousness of Mobility Problems and How Well Organizations are
Managing Them
Mobility
problems are
more serious
than the efficacy
with which
organizations are
addressing them.
©2013 Osterman Research, Inc. 8
Survey Report: Managing BYOD
in Corporate Environments
“Do you have a plan to implement technology that can keep personal and
work information separate on the same device?”
Spending on BYOD per Smartphone User by Organization Size
2013 and 2014
Only one in six
organizations has
a technology
plan focused on
keeping personal
and work infor-
mation on mobile
devices separate.
©2013 Osterman Research, Inc. 9
Survey Report: Managing BYOD
in Corporate Environments
“Does your organization see increasing use of HTML 5 with BYOD or are
native apps preferred?”
Preference for Cloud or Internal Management of Mobile Applications
Most organ-
izations are not
yet sure if they
will manage
mobile applic-
ations with a
cloud provider or
manage them
internally.
©2013 Osterman Research, Inc. 10
Survey Report: Managing BYOD
in Corporate Environments
END USER SURVEY FINDINGS
Primary Mobile Device in Use
Importance of Various Experiences on the Mobile Devices Used for Work
% Responding Important or Very Important
Most iPhones
and Android
devices used in
the workplace
are personally
owned.
©2013 Osterman Research, Inc. 11
Survey Report: Managing BYOD
in Corporate Environments
Activities for Which the Primary Mobile Device is Used
“Has your primary mobile device ever been infected by a virus or other
malware?”
Email is the
dominant
application in
use on mobile
devices.
©2013 Osterman Research, Inc. 12
Survey Report: Managing BYOD
in Corporate Environments
“If you lost your primary mobile device, are you fully aware of the
procedure that is in place for your to notify your IT department so that
they could remotely wipe the device of all sensitive data?”
End-User Perception About Corporate Attitudes Toward the Use of
Personally Owned Devices Used for Work Purposes
One in nine end
users works for
an organization
that does not
have a procedure
in place to
remote wipe a
lost or stolen
mobile device.
©2013 Osterman Research, Inc. 13
Survey Report: Managing BYOD
in Corporate Environments
© 2013 Osterman Research, Inc. All rights reserved.
No part of this document may be reproduced in any form by any means, nor may it be
distributed without the permission of Osterman Research, Inc., nor may it be resold or
distributed by any entity other than Osterman Research, Inc., without prior written authorization
of Osterman Research, Inc.
Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes
legal advice, nor shall this document or any software product or other offering referenced herein
serve as a substitute for the reader’s compliance with any laws (including but not limited to any
act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively,
“Laws”)) referenced in this document. If necessary, the reader should consult with competent
legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no
representation or warranty regarding the completeness or accuracy of the information contained
in this document.
THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR
IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE
DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE
ILLEGAL.

Mais conteúdo relacionado

Mais procurados

Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareChromeInfo Technologies
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information securityBee_Ware
 
VMware Emerging Strategies for Managing Mobility
VMware Emerging Strategies for Managing MobilityVMware Emerging Strategies for Managing Mobility
VMware Emerging Strategies for Managing MobilityVMware
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...Thierry Labro
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle eastteam-abr
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Spiceworks Ziff Davis
 
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Fuji Xerox Australia
 
Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Datafield
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...TELKOMNIKA JOURNAL
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...RES
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articlesIJMIT JOURNAL
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODCamilo Fandiño Gómez
 

Mais procurados (19)

Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
VMware Emerging Strategies for Managing Mobility
VMware Emerging Strategies for Managing MobilityVMware Emerging Strategies for Managing Mobility
VMware Emerging Strategies for Managing Mobility
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
 
Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...The User Enablement Dilemma: How do you empower users while maximizing securi...
The User Enablement Dilemma: How do you empower users while maximizing securi...
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Security that works
Security that worksSecurity that works
Security that works
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articles
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
 
Mobilize to realize
Mobilize to realizeMobilize to realize
Mobilize to realize
 

Semelhante a Survey Report: Managing BYOD in Corporate Environments

Ifs Mobility Survey Results
Ifs Mobility Survey ResultsIfs Mobility Survey Results
Ifs Mobility Survey Resultscharlesrathmann
 
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableSurviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableCapgemini
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...Javier Gonzalez
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemIron Mountain
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programsIBM Software India
 
Evua Enterprise Mobility 2011 - Tablets & The Enterprise
Evua Enterprise Mobility 2011 - Tablets & The Enterprise  Evua Enterprise Mobility 2011 - Tablets & The Enterprise
Evua Enterprise Mobility 2011 - Tablets & The Enterprise Rosendo Travieso
 
Enterprise Mobility Report - Unwiring the Enterprise
Enterprise Mobility Report - Unwiring the EnterpriseEnterprise Mobility Report - Unwiring the Enterprise
Enterprise Mobility Report - Unwiring the Enterprise[x]cube LABS
 
The world of mobile, social, and rapidly expanding data
The world of mobile, social, and rapidly expanding dataThe world of mobile, social, and rapidly expanding data
The world of mobile, social, and rapidly expanding dataFredrik Tunvall
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...Altimeter, a Prophet Company
 
Mobility Index Report за 2 квартал 2015
Mobility Index Report за 2 квартал 2015Mobility Index Report за 2 квартал 2015
Mobility Index Report за 2 квартал 2015AppTractor
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 

Semelhante a Survey Report: Managing BYOD in Corporate Environments (20)

Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Ifs Mobility Survey Results
Ifs Mobility Survey ResultsIfs Mobility Survey Results
Ifs Mobility Survey Results
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableSurviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerable
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
Get Ready for Wearables at Work
Get Ready for Wearables at WorkGet Ready for Wearables at Work
Get Ready for Wearables at Work
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
Evua Enterprise Mobility 2011 - Tablets & The Enterprise
Evua Enterprise Mobility 2011 - Tablets & The Enterprise  Evua Enterprise Mobility 2011 - Tablets & The Enterprise
Evua Enterprise Mobility 2011 - Tablets & The Enterprise
 
Enterprise Mobility Report - Unwiring the Enterprise
Enterprise Mobility Report - Unwiring the EnterpriseEnterprise Mobility Report - Unwiring the Enterprise
Enterprise Mobility Report - Unwiring the Enterprise
 
The world of mobile, social, and rapidly expanding data
The world of mobile, social, and rapidly expanding dataThe world of mobile, social, and rapidly expanding data
The world of mobile, social, and rapidly expanding data
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
 
Mobility Index Report за 2 квартал 2015
Mobility Index Report за 2 квартал 2015Mobility Index Report за 2 квартал 2015
Mobility Index Report за 2 квартал 2015
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 

Mais de Osterman Research, Inc.

Best Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsBest Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsOsterman Research, Inc.
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessOsterman Research, Inc.
 
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...Osterman Research, Inc.
 
Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365Osterman Research, Inc.
 
How the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveHow the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveOsterman Research, Inc.
 
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Osterman Research, Inc.
 
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsMobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsOsterman Research, Inc.
 
Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Osterman Research, Inc.
 
Why All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaWhy All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaOsterman Research, Inc.
 
What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?Osterman Research, Inc.
 
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...Osterman Research, Inc.
 
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private CloudsCloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private CloudsOsterman Research, Inc.
 
Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Osterman Research, Inc.
 
Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...Osterman Research, Inc.
 
Making File Transfer Easier, Compliant and More Secure
Making File Transfer Easier, Compliant and More SecureMaking File Transfer Easier, Compliant and More Secure
Making File Transfer Easier, Compliant and More SecureOsterman Research, Inc.
 
Making Office 365 More Secure and Compliant
Making Office 365 More Secure and CompliantMaking Office 365 More Secure and Compliant
Making Office 365 More Secure and CompliantOsterman Research, Inc.
 

Mais de Osterman Research, Inc. (20)

Best Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsBest Practices for Managing Archive Migrations
Best Practices for Managing Archive Migrations
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
 
Best Practices for File Sharing
Best Practices for File SharingBest Practices for File Sharing
Best Practices for File Sharing
 
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
 
Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365
 
How the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveHow the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less Expensive
 
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
 
A Better Method of Authentication
A Better Method of AuthenticationA Better Method of Authentication
A Better Method of Authentication
 
Putting IT Back in Control of BYOD
Putting IT Back in Control of BYODPutting IT Back in Control of BYOD
Putting IT Back in Control of BYOD
 
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsMobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
 
Key Issues in eDiscovery
Key Issues in eDiscoveryKey Issues in eDiscovery
Key Issues in eDiscovery
 
Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010
 
Why All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaWhy All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social Media
 
What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?
 
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
 
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private CloudsCloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
 
Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012
 
Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...
 
Making File Transfer Easier, Compliant and More Secure
Making File Transfer Easier, Compliant and More SecureMaking File Transfer Easier, Compliant and More Secure
Making File Transfer Easier, Compliant and More Secure
 
Making Office 365 More Secure and Compliant
Making Office 365 More Secure and CompliantMaking Office 365 More Secure and Compliant
Making Office 365 More Secure and Compliant
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Survey Report: Managing BYOD in Corporate Environments

  • 1. sponsored by Osterman Research, Inc. P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com www.ostermanresearch.com • twitter.com/mosterman An Osterman Research Survey Report Published June 2013 sponsored by Survey Report: Managing BYOD in Corporate Environments SPON SURVEYREPORT SPON
  • 2. ©2013 Osterman Research, Inc. 1 Survey Report: Managing BYOD in Corporate Environments EXECUTIVE SUMMARY The Bring Your Own Device (BYOD) trend is pervasive today in organizations of all sizes and across all industries. It enables users and IT to improve worker productivity and generate higher employee satisfaction, reduce operational costs, innovate more quickly, and sustain competitive advantage. BYOD reflects the general trend of enabling collaboration anytime, anywhere for workers who expect to be just as productive away from the office as they are when working within their corporate network (e.g., a presentation that is started on a laptop, revised on a tablet and approved by team members on a smartphone). Moreover, BYOD enables workers to achieve a seamless flow of information and access to applications across all of their devices, whether these devices are supplied by their employer or personally owned. At the same time, the BYOD trend is also posing challenges to IT to secure and manage a much more diverse mobile device and application landscape. SURVEY BACKGROUND Osterman Research conducted two surveys in February and March 2013 focused on Bring Your Own Device (BYOD) issues in small, mid-sized and large organizations, primarily in North America. The two surveys, which were conducted online using a combination of the Osterman Research survey panel and an external panel, had the following focus areas and respondent counts: • IT issues: 444 respondents were queried about issues that their IT departments face when managing both personally owned and company-supplied mobile devices and applications. The industries represented in the survey are shown in the table below. • End user issues: 433 end users of mobile devices were queried about the primary mobile device they use for work-related purposes. Industries Surveyed in the IT Survey Industry % Technology 17% Financial services/insurance 13% Government 11% Education 10% Manufacturing 9% Energy 5% Healthcare 4% Entertainment/media 3% Retail 3% Consumer 2% Automotive 1% Real estate 1% Telco 1% Transportation 1% Other 18% ABOUT THIS SURVEY REPORT This report presents the results of the surveys conducted for the Osterman Research white paper entitled Managing BYOD in Corporate Environments that was published in April 2013. That white paper is available from the Osterman Research Web site by clicking here. Osterman Research conducted two surveys in February and March 2013 focused on Bring Your Own Device (BYOD) issues in small, mid-sized and large organizations.
  • 3. ©2013 Osterman Research, Inc. 2 Survey Report: Managing BYOD in Corporate Environments IT SURVEY FINDINGS Importance of Reasons to Support Personally Owned Devices % Responding Important or Very Important Reason % Increasing worker productivity and making employees much more productive on mobile devices 69% Keep employees happy by permitting them to bring their own mobile devices to work 61% View mobile enablement as way to get ahead of competition and sustain competitive advantage 48% Reexamining how we engage with our customers, partners and suppliers and thinking through the impact of making core critical services available on these mobile devices 46% Trying to reduce spend on our telecommunication bill 37% We are committed to leveraging the cloud for IT services and enabling enterprise mobility is a critical piece of the company’s journey to moving workloads onto the cloud 34% Keeping the stress off of our file-sharing infrastructure and reducing on-premise storage costs 19% Reducing the strain on our email server 17% Penetration of Email, Smartphone and Tablet Users by Organization Size Mobile device penetration is inversely related to organization size.
  • 4. ©2013 Osterman Research, Inc. 3 Survey Report: Managing BYOD in Corporate Environments Penetration of Company-Owned and Personally Owned Devices % of Organizations in Which Applications are Deployed Penetration of Personally Deployed Applications in Use % of Organizations in Which Applications are Deployed A larger proportion of organizations have employee- owned devices within them than company-owned devices – a trend that we anticipate will continue.
  • 5. ©2013 Osterman Research, Inc. 4 Survey Report: Managing BYOD in Corporate Environments “Do you have a formal IT policy for supporting personally owned mobile devices used for business purposes?” Policies That Organizations Have Established for Personally Owned Devices Policy % of Orgs Acceptable use policies for devices 61% Specific corporate resources may be accessed (email, calendar, etc.) 55% Devices must be password/PIN-protected 55% Only IT-approved devices may be used on the corporate network 48% IT has the authority to remotely wipe employees’ devices 44% Acceptable use policies for applications 42% Only IT-approved operating systems or OS versions are permitted 39% Specific Web sites may not be accessed over the corporate network 34% Only IT-approved applications may be used on the corporate network 31% Ownership of data on personally owned devices has been clearly defined 31% IT must have access to devices to install software, run malware checks, etc. 30% Specific applications are permitted 25% Specific applications are not permitted 21% Hourly employees have a separate BYOD policy than salaried employees 7% Camera/video capabilities may not be employed 5% Only about one- half of organ- izations formally support BYOD.
  • 6. ©2013 Osterman Research, Inc. 5 Survey Report: Managing BYOD in Corporate Environments Inhibitors for the Adoption of Enterprise Applications on Mobile Devices % Responding an Inhibitor or Major Inhibitor Mobile Device Management Systems in Use 2013 and 2014 Platform 2013 2014 BlackBerry Enterprise Server (BES) 61% 37% Microsoft Systems Center Mobile Device Manager 22% 40% Airwatch 15% 20% Good Mobility Suite 10% 13% HP Mobile Device Management 7% 8% Zenprise (Citrix) 6% 9% MobileIron 6% 9% Good Dynamics 5% 7% Fiberlink 4% 5% Sybase Afaria 3% 3% NotifyMDM 3% 3% Others 16% 18% One-half of organizations are not focused on enableing applications on mobile devices.
  • 7. ©2013 Osterman Research, Inc. 6 Survey Report: Managing BYOD in Corporate Environments Access Permitted on Mobile Devices Company-Supplied or Personally Owned Application Access Methods Permitted on Mobile Devices More than one- half of organ- izations permit access to the corporate intranet from mobile devices.
  • 8. ©2013 Osterman Research, Inc. 7 Survey Report: Managing BYOD in Corporate Environments Capabilities Enabled for Mobile Devices Platform Can be Remotely Wiped Can be Scanned for Malware Can be Scanned for Language or Data Leakage Content Can be Archived for Comp- liance Company-owned smartphones 92% 38% 18% 22% Company-owned iPads and other tablets 87% 41% 20% 22% Personally owned smartphones 73% 30% 12% 14% Personally owned iPads and other tablets 73% 32% 12% 15% Seriousness of Mobility Problems and How Well Organizations are Managing Them Mobility problems are more serious than the efficacy with which organizations are addressing them.
  • 9. ©2013 Osterman Research, Inc. 8 Survey Report: Managing BYOD in Corporate Environments “Do you have a plan to implement technology that can keep personal and work information separate on the same device?” Spending on BYOD per Smartphone User by Organization Size 2013 and 2014 Only one in six organizations has a technology plan focused on keeping personal and work infor- mation on mobile devices separate.
  • 10. ©2013 Osterman Research, Inc. 9 Survey Report: Managing BYOD in Corporate Environments “Does your organization see increasing use of HTML 5 with BYOD or are native apps preferred?” Preference for Cloud or Internal Management of Mobile Applications Most organ- izations are not yet sure if they will manage mobile applic- ations with a cloud provider or manage them internally.
  • 11. ©2013 Osterman Research, Inc. 10 Survey Report: Managing BYOD in Corporate Environments END USER SURVEY FINDINGS Primary Mobile Device in Use Importance of Various Experiences on the Mobile Devices Used for Work % Responding Important or Very Important Most iPhones and Android devices used in the workplace are personally owned.
  • 12. ©2013 Osterman Research, Inc. 11 Survey Report: Managing BYOD in Corporate Environments Activities for Which the Primary Mobile Device is Used “Has your primary mobile device ever been infected by a virus or other malware?” Email is the dominant application in use on mobile devices.
  • 13. ©2013 Osterman Research, Inc. 12 Survey Report: Managing BYOD in Corporate Environments “If you lost your primary mobile device, are you fully aware of the procedure that is in place for your to notify your IT department so that they could remotely wipe the device of all sensitive data?” End-User Perception About Corporate Attitudes Toward the Use of Personally Owned Devices Used for Work Purposes One in nine end users works for an organization that does not have a procedure in place to remote wipe a lost or stolen mobile device.
  • 14. ©2013 Osterman Research, Inc. 13 Survey Report: Managing BYOD in Corporate Environments © 2013 Osterman Research, Inc. All rights reserved. No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior written authorization of Osterman Research, Inc. Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document or any software product or other offering referenced herein serve as a substitute for the reader’s compliance with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively, “Laws”)) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the information contained in this document. THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL.