Security Is the Biggest Concern, Success Measure For BYOD Enterprises, New Study Finds

Share Article

BYOD and Mobility Security report sponsored by Lumension finds enterprises do not feel prepared for BYOD.

A recent survey conducted by Holger Schulze's Information Security Community group on LinkedIn finds that security is both the top concern and top measure for success for enterprises implementing BYOD programs. The BYOD and Mobility Security Report, sponsored by Lumension®, a global leader in endpoint management and security, examined the benefits of BYOD, drivers for implementing a BYOD program and how companies are responding to the security threats presented by the influx of mobile devices entering corporate networks.

BYOD is of interest to many enterprises, with close to 20 percent widely supporting privately-owned devices, an additional 35 percent saying BYOD is under evaluation, and some 40 percent of respondents still supporting company-owned mobile devices. These programs provide many benefits to employees and enterprises alike, including improved employee satisfaction, productivity and mobility, each cited by over 50 percent of respondents as a primary driver and benefit of BYOD.

However, security is also a very big concern and was cited by 70 percent of respondents as the top criteria for success, even over employee productivity, cited by 54 percent. Respondents fear a loss of company or client data, unauthorized access and malware infections, and many say they lack the resources necessary to address these security concerns. In fact, almost a third of organizations say that they do not have even a basic BYOD policy in place to help mitigate some of the risk.

“What is concerning to me is the lack of security that is actively implemented, according to survey respondents,” said Paul Zimski, vice president of solution marketing at Lumension. “Over a third of organizations have no security at all and most are relying on just encryption. Encryption is great if the device is lost or stolen, but it does little good against something like a phishing attack. In the end, a mobile device is an endpoint, subject to the same attacks we protect against on so-called traditional endpoints. Encryption simply is not enough.”

Mandatory use of encryption was cited as a risk control measure for mobile devices by 40 percent of respondents. Encryption is considered best equipped to deal with lost or stole devices, which was the third ranked security concern, after lost data and unauthorized access. When asked if they felt ready for a full enterprise BYOD adoption, only 6 percent responded that their organization was 100 percent ready, while the majority of respondents claimed to feel less than 50 percent ready for BYOD.

The BYOD and Mobility Security Report surveyed 1,650 information security professionals around the world through Holger Schulze's Information Security Community group on LinkedIn. The majority of respondents were information security specialists in organizations of 10 - 99 employees.

Supporting Resources:

About Lumension Security, Inc.
Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, Antivirus and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Virginia, Texas, Utah, Florida, Ireland, Luxembourg, the United Kingdom, Australia and Singapore. Lumension: IT Secured. Success Optimized.™ More information can be found at

Lumension, the Lumension logo, are trademarks or registered trademarks of Lumension Security, Inc. All other trademarks are the property of their respective owners.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Kim Doyle
(480) 444-1229
Email >

Jason Deal
Follow us on
Visit website