dcsimg

Mobile Device Usage Soars with or Without Permission

  • Mobile Device Usage Soars with or Without Permission-

    Click through for results from an IT consumerization study conducted by Osterman Research on behalf of Proofpoint.

1 | 2 | 3 | 4 | 5 | 6

Mobile Device Usage Soars with or Without Permission

  • 1 | 2 | 3 | 4 | 5 | 6
  • Previous
    Mobile Device Usage Soars with or Without Permission-1

    Click through for results from an IT consumerization study conducted by Osterman Research on behalf of Proofpoint.

While IT professionals debate the merits of bringing your own technology (BYOT) to work, it looks like the proverbial horse has already left the barn.

A study of 632 IT executives, conducted by Osterman Research on behalf of Proofpoint, finds that the vast majority of companies already allow employees to use mobile computing devices at work regardless of the risks.

The reality is that most companies don’t have the resources to do anything more than declare a policy. But having a policy is one thing; the tools to actually enforce it are a whole other matter. The good news is that more IT organizations are getting the tools in place, but effort to regain control appears to be coming long after the fact.

More Slideshows:


Handy BlackBerry Security Apps Apps to help you keep your BlackBerry device safe from viruses and theft.

Twelve Finer Points of Email Etiquette A closer look at email dos and don'ts.

Ten Notable Apps for Your iPhone iPhone apps to help you get more done.