Whenever you visit our websites, information may be collected using cookies and similar tools to improve your user experience and to enhance the performance of the website.
Closing this message means you accept the use of cookies.
Research Report: The State of Mobile Computing Security
ESG Research Report
Feb 12, 2014
In order to accurately assess organizations’ mobile computing adoption, strategies, and security, ESG recently surveyed 242 members of IT and security personnel working at enterprise-class (1,000 employees or more) organizations in North America. All respondents were responsible for mobile computing initiatives, operations, and security.
Page Count: 62
Table of Contents
Executive Summary
Report Conclusions
Introduction
Research Objectives
Research Findings
ESG’s Mobile Computing Security Segmentation Model
The State of Mobile Computing
Mobile Computing Security Policy Overview
Who Is Responsible for Mobile Computing Security Policies?
User Requirements for Mobile Computing
Security Policies for Mobile Devices
Mobile Computing Security and the IT Organization
Mobile Computing Security Challenges and Activities
Enterprise Use of Mobile Device Management (MDM) Technologies
Mobile Application Development and Security
Mobile Application Development Security Processes and Strategies
Mobile Computing Security Final Thoughts
Conclusion
Research Implications for Information Security Professionals
Research Implications for Information Security Vendors
Research Methodology
Respondent Demographics
Respondents by Current Role
Respondents by Information Security Technology Purchasing Responsibility
Respondents by Familiarity with Mobile Computing Usage and Strategy
Respondents by Familiarity with Mobile Computing Security
The primary objective of this ESG research study was to survey Critical Infrastructure and Key Resources (CIKR) organizations in order to qualify and quantify the current status of their existing security profiles as well as their awareness of and…