Authors: Mike Anderson, Jim Lundy Date: December 4, 2012
Topics: Cloud, Mobile Research Note Number: 2012-41
What risks will cloud computing bring to the firm?
What are the cloud and networking best practices regarding security?
What are the best practices for harnessing the power of mobile computing?
Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile management tools to rein in security for the growth of BYOD.
To download the PDF of this research note, click here.
Planning Assumption: MDM and MAM will consolidate into integrated mobile management by 2014.
Mobile devices are rapidly permeating most organizations, and securing those that are employee-owned is a top issue. Mobile is becoming a fundamental element of computing, both in terms of support and in its integration with software strategies. This emerging trend is still rapidly evolving, and today’s enterprises face growing pains as the change encompasses them. This note deals with the information security aspects of mobile systems and the bring-your-own-device (BYOD) movement.
The percentage of organizations with BYOD programs continues to grow, and Aragon expects 75% of large organizations to support this approach by the end of 2012. Government agencies have been slower to accept it than most others, primarily due to HR or legal policy concerns, and for issues regarding security. Although there are circumstances where agencies with classified roles or data must restrict BYOD because of security issues, large non-defense organizations are increasingly open to BYOD approaches and policies.
Note: This is part of Aragon’s archived research. Please visit our Coverage Areas page to view our most recent content.
Copyright © 2012 Aragon Research Inc. and or its affiliates. All rights reserved.