Mobile Device Usage Soars with or Without Permission

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6
Previous Next

Click through for results from an IT consumerization study conducted by Osterman Research on behalf of Proofpoint.

While IT professionals debate the merits of bringing your own technology (BYOT) to work, it looks like the proverbial horse has already left the barn.

A study of 632 IT executives, conducted by Osterman Research on behalf of Proofpoint, finds that the vast majority of companies already allow employees to use mobile computing devices at work regardless of the risks.

The reality is that most companies don’t have the resources to do anything more than declare a policy. But having a policy is one thing; the tools to actually enforce it are a whole other matter. The good news is that more IT organizations are getting the tools in place, but effort to regain control appears to be coming long after the fact.

More Slideshows:


Handy BlackBerry Security Apps Apps to help you keep your BlackBerry device safe from viruses and theft.

Twelve Finer Points of Email Etiquette A closer look at email dos and don'ts.

Ten Notable Apps for Your iPhone iPhone apps to help you get more done.

 

Related Topics : HTC, Broadcom, Nortel, Data Loss Prevention, Mobile Search

 
More Slideshows

Misc71-190x128 10 iOS Brainstorming Apps to Organize Your Ideas

With the ever-increasing capabilities of mobile apps and devices, users can now have a nearly limitless canvas to scratch out and rearrange ideas. ...  More >>

Drone2-190x128.jpg What We Need to Know Now: Drones and Security

Drone security is complicated, however, because it encompasses so many different types of security threats. This is creating challenges for programmers, lawmakers and the general public, who need to address drone security without lessening the positive aspects of the devices. ...  More >>

Wearables7-290x195 5 Tips When Incorporating Wearables in the Workplace

While there are clear benefits to introducing wearables into enterprise functions, organizations must address issues concerning employee privacy and data security. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.