Survey Report: Managing BYOD in Corporate Environments
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Survey Report: Managing BYOD in Corporate Environments

  • 885 views
Uploaded on

Osterman Research conducted two surveys in February and March 2013 focused on Bring Your Own Device (BYOD) issues in small, mid-sized and large organizations, primarily in North America.

Osterman Research conducted two surveys in February and March 2013 focused on Bring Your Own Device (BYOD) issues in small, mid-sized and large organizations, primarily in North America.

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
885
On Slideshare
885
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
26
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. sponsored by Osterman Research, Inc. P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com www.ostermanresearch.com • twitter.com/mosterman An Osterman Research Survey Report Published June 2013 sponsored by Survey Report: Managing BYOD in Corporate Environments SPON SURVEYREPORT SPON
  • 2. ©2013 Osterman Research, Inc. 1 Survey Report: Managing BYOD in Corporate Environments EXECUTIVE SUMMARY The Bring Your Own Device (BYOD) trend is pervasive today in organizations of all sizes and across all industries. It enables users and IT to improve worker productivity and generate higher employee satisfaction, reduce operational costs, innovate more quickly, and sustain competitive advantage. BYOD reflects the general trend of enabling collaboration anytime, anywhere for workers who expect to be just as productive away from the office as they are when working within their corporate network (e.g., a presentation that is started on a laptop, revised on a tablet and approved by team members on a smartphone). Moreover, BYOD enables workers to achieve a seamless flow of information and access to applications across all of their devices, whether these devices are supplied by their employer or personally owned. At the same time, the BYOD trend is also posing challenges to IT to secure and manage a much more diverse mobile device and application landscape. SURVEY BACKGROUND Osterman Research conducted two surveys in February and March 2013 focused on Bring Your Own Device (BYOD) issues in small, mid-sized and large organizations, primarily in North America. The two surveys, which were conducted online using a combination of the Osterman Research survey panel and an external panel, had the following focus areas and respondent counts: • IT issues: 444 respondents were queried about issues that their IT departments face when managing both personally owned and company-supplied mobile devices and applications. The industries represented in the survey are shown in the table below. • End user issues: 433 end users of mobile devices were queried about the primary mobile device they use for work-related purposes. Industries Surveyed in the IT Survey Industry % Technology 17% Financial services/insurance 13% Government 11% Education 10% Manufacturing 9% Energy 5% Healthcare 4% Entertainment/media 3% Retail 3% Consumer 2% Automotive 1% Real estate 1% Telco 1% Transportation 1% Other 18% ABOUT THIS SURVEY REPORT This report presents the results of the surveys conducted for the Osterman Research white paper entitled Managing BYOD in Corporate Environments that was published in April 2013. That white paper is available from the Osterman Research Web site by clicking here. Osterman Research conducted two surveys in February and March 2013 focused on Bring Your Own Device (BYOD) issues in small, mid-sized and large organizations.
  • 3. ©2013 Osterman Research, Inc. 2 Survey Report: Managing BYOD in Corporate Environments IT SURVEY FINDINGS Importance of Reasons to Support Personally Owned Devices % Responding Important or Very Important Reason % Increasing worker productivity and making employees much more productive on mobile devices 69% Keep employees happy by permitting them to bring their own mobile devices to work 61% View mobile enablement as way to get ahead of competition and sustain competitive advantage 48% Reexamining how we engage with our customers, partners and suppliers and thinking through the impact of making core critical services available on these mobile devices 46% Trying to reduce spend on our telecommunication bill 37% We are committed to leveraging the cloud for IT services and enabling enterprise mobility is a critical piece of the company’s journey to moving workloads onto the cloud 34% Keeping the stress off of our file-sharing infrastructure and reducing on-premise storage costs 19% Reducing the strain on our email server 17% Penetration of Email, Smartphone and Tablet Users by Organization Size Mobile device penetration is inversely related to organization size.
  • 4. ©2013 Osterman Research, Inc. 3 Survey Report: Managing BYOD in Corporate Environments Penetration of Company-Owned and Personally Owned Devices % of Organizations in Which Applications are Deployed Penetration of Personally Deployed Applications in Use % of Organizations in Which Applications are Deployed A larger proportion of organizations have employee- owned devices within them than company-owned devices – a trend that we anticipate will continue.
  • 5. ©2013 Osterman Research, Inc. 4 Survey Report: Managing BYOD in Corporate Environments “Do you have a formal IT policy for supporting personally owned mobile devices used for business purposes?” Policies That Organizations Have Established for Personally Owned Devices Policy % of Orgs Acceptable use policies for devices 61% Specific corporate resources may be accessed (email, calendar, etc.) 55% Devices must be password/PIN-protected 55% Only IT-approved devices may be used on the corporate network 48% IT has the authority to remotely wipe employees’ devices 44% Acceptable use policies for applications 42% Only IT-approved operating systems or OS versions are permitted 39% Specific Web sites may not be accessed over the corporate network 34% Only IT-approved applications may be used on the corporate network 31% Ownership of data on personally owned devices has been clearly defined 31% IT must have access to devices to install software, run malware checks, etc. 30% Specific applications are permitted 25% Specific applications are not permitted 21% Hourly employees have a separate BYOD policy than salaried employees 7% Camera/video capabilities may not be employed 5% Only about one- half of organ- izations formally support BYOD.
  • 6. ©2013 Osterman Research, Inc. 5 Survey Report: Managing BYOD in Corporate Environments Inhibitors for the Adoption of Enterprise Applications on Mobile Devices % Responding an Inhibitor or Major Inhibitor Mobile Device Management Systems in Use 2013 and 2014 Platform 2013 2014 BlackBerry Enterprise Server (BES) 61% 37% Microsoft Systems Center Mobile Device Manager 22% 40% Airwatch 15% 20% Good Mobility Suite 10% 13% HP Mobile Device Management 7% 8% Zenprise (Citrix) 6% 9% MobileIron 6% 9% Good Dynamics 5% 7% Fiberlink 4% 5% Sybase Afaria 3% 3% NotifyMDM 3% 3% Others 16% 18% One-half of organizations are not focused on enableing applications on mobile devices.
  • 7. ©2013 Osterman Research, Inc. 6 Survey Report: Managing BYOD in Corporate Environments Access Permitted on Mobile Devices Company-Supplied or Personally Owned Application Access Methods Permitted on Mobile Devices More than one- half of organ- izations permit access to the corporate intranet from mobile devices.
  • 8. ©2013 Osterman Research, Inc. 7 Survey Report: Managing BYOD in Corporate Environments Capabilities Enabled for Mobile Devices Platform Can be Remotely Wiped Can be Scanned for Malware Can be Scanned for Language or Data Leakage Content Can be Archived for Comp- liance Company-owned smartphones 92% 38% 18% 22% Company-owned iPads and other tablets 87% 41% 20% 22% Personally owned smartphones 73% 30% 12% 14% Personally owned iPads and other tablets 73% 32% 12% 15% Seriousness of Mobility Problems and How Well Organizations are Managing Them Mobility problems are more serious than the efficacy with which organizations are addressing them.
  • 9. ©2013 Osterman Research, Inc. 8 Survey Report: Managing BYOD in Corporate Environments “Do you have a plan to implement technology that can keep personal and work information separate on the same device?” Spending on BYOD per Smartphone User by Organization Size 2013 and 2014 Only one in six organizations has a technology plan focused on keeping personal and work infor- mation on mobile devices separate.
  • 10. ©2013 Osterman Research, Inc. 9 Survey Report: Managing BYOD in Corporate Environments “Does your organization see increasing use of HTML 5 with BYOD or are native apps preferred?” Preference for Cloud or Internal Management of Mobile Applications Most organ- izations are not yet sure if they will manage mobile applic- ations with a cloud provider or manage them internally.
  • 11. ©2013 Osterman Research, Inc. 10 Survey Report: Managing BYOD in Corporate Environments END USER SURVEY FINDINGS Primary Mobile Device in Use Importance of Various Experiences on the Mobile Devices Used for Work % Responding Important or Very Important Most iPhones and Android devices used in the workplace are personally owned.
  • 12. ©2013 Osterman Research, Inc. 11 Survey Report: Managing BYOD in Corporate Environments Activities for Which the Primary Mobile Device is Used “Has your primary mobile device ever been infected by a virus or other malware?” Email is the dominant application in use on mobile devices.
  • 13. ©2013 Osterman Research, Inc. 12 Survey Report: Managing BYOD in Corporate Environments “If you lost your primary mobile device, are you fully aware of the procedure that is in place for your to notify your IT department so that they could remotely wipe the device of all sensitive data?” End-User Perception About Corporate Attitudes Toward the Use of Personally Owned Devices Used for Work Purposes One in nine end users works for an organization that does not have a procedure in place to remote wipe a lost or stolen mobile device.
  • 14. ©2013 Osterman Research, Inc. 13 Survey Report: Managing BYOD in Corporate Environments © 2013 Osterman Research, Inc. All rights reserved. No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior written authorization of Osterman Research, Inc. Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document or any software product or other offering referenced herein serve as a substitute for the reader’s compliance with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively, “Laws”)) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the information contained in this document. THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL.