Research Report: The State of Mobile Computing Security
ESG Research Report
In order to accurately assess organizations’ mobile computing adoption, strategies, and security, ESG recently surveyed 242 members of IT and security personnel working at enterprise-class (1,000 employees or more) organizations in North America. All respondents were responsible for mobile computing initiatives, operations, and security.
 
Report Info
Table of Contents
  • Executive Summary
    • Report Conclusions
  • Introduction
    • Research Objectives
  • Research Findings
    • ESG’s Mobile Computing Security Segmentation Model
    • The State of Mobile Computing
    • Mobile Computing Security Policy Overview
      • Who Is Responsible for Mobile Computing Security Policies?
      • User Requirements for Mobile Computing
      • Security Policies for Mobile Devices
    • Mobile Computing Security and the IT Organization
    • Mobile Computing Security Challenges and Activities
    • Enterprise Use of Mobile Device Management (MDM) Technologies
    • Mobile Application Development and Security
      • Mobile Application Development Security Processes and Strategies
    • Mobile Computing Security Final Thoughts
  • Conclusion
    • Research Implications for Information Security Professionals
    • Research Implications for Information Security Vendors
  • Research Methodology
  • Respondent Demographics
    • Respondents by Current Role
    • Respondents by Information Security Technology Purchasing Responsibility
    • Respondents by Familiarity with Mobile Computing Usage and Strategy
    • Respondents by Familiarity with Mobile Computing Security
    • Respondents by Number of Employees
    • Respondents by Industry
    • Respondents by Annual Revenue
Attachments
  •   ESG-Research-Report-Abstract-State-of-Mobile-Computing-Security-Feb-2014.pdf
  •   ESG-Research-Report-The-State-of-Mobile-Computing-Security-Feb-2014.pdf