+ All Categories
Home > Technology > Survey on the Impact of BYOD on Enterprise Security

Survey on the Impact of BYOD on Enterprise Security

Date post: 26-May-2015
Category:
Upload: airtight-networks
View: 478 times
Download: 0 times
Share this document with a friend
Description:
AirTight releases new survey on the Impact of BYOD on Enterprise Security
Popular Tags:
6
Impact of Bring Your Own Device (BYOD) on Enterprise Security A Survey by AirTight Networks, April 2012 316 respondents © 2012 AirTight Networks. All rights reserved.
Transcript
Page 1: Survey on the Impact of BYOD on Enterprise Security

Impact of Bring Your Own Device (BYOD) on Enterprise Security A Survey by AirTight Networks, April 2012 316 respondents

© 2

012

AirT

ight

Net

wor

ks. A

ll rig

hts

rese

rved

.

Page 2: Survey on the Impact of BYOD on Enterprise Security

© 2012 AirTight Networks. All rights reserved.

25%

61%

14%

38%

49%

10%

3%

How pervasive do you think is the use of personal smart devices in your enterprise?

How do you view the BYOD trend for your enterprise?

Page 3: Survey on the Impact of BYOD on Enterprise Security

© 2012 AirTight Networks. All rights reserved.

37%

33%

17% 13%

Are iPads, iPhones and Androids sanctioned technology in your environment?

If your organization allows BYOD, do you support the applications your users are accessing?

17%

47%

25%

11%

Page 4: Survey on the Impact of BYOD on Enterprise Security

© 2012 AirTight Networks. All rights reserved.

11%

20%

69% 16%

34%

50%

Do you see an increasing trend of employees bringing Rogue Wi-Fi APs?

Are you concerned about employees using mobile hotspots to bypass corporate policies?

Page 5: Survey on the Impact of BYOD on Enterprise Security

© 2012 AirTight Networks. All rights reserved.

Are you concerned about the security of data transmitted over personal smart devices?

69%

11%

20%

Has BYOD affected the measures you take for network security?

11%

56%

33%

Page 6: Survey on the Impact of BYOD on Enterprise Security

© 2012 AirTight Networks. All rights reserved.

How do you enforce your security policy for managing BYOD?

22%

52%

9% 9%

4% 4% 34%

22% 44%

Are you planning to invest in one or more of these security solutions in the next 6-12 months?


Recommended