An IDC consumerization study indicated that 40.7% of devices used by information workers to access business applications are ones they own themselves, including laptops, smartphones, and tablets such as Apple’s iPad. That was a 10-point jump from the prior year’s study.1 Perhaps more concerning, this trend is happening faster than IT managers realize. When IDC surveyed IT managers about the number of consumer devices on their networks, they underestimated the number by 50%.1 Whether you are prohibiting, tolerating or embracing BYOD, you need to define policy and weigh non-technical and technical security control mechanisms that enable corporate and personal mobile device use while protecting resources and data.
Planning for BYOD Success
"Architecting a flexible strategy for enterprise BYOD," written by security industry analyst Phil Hochmuth of IDC, reviews BYOD trends and risks, the mobile security landscape, policy development and control options. The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Note 1: http://www.cio.com.au/article/393246/idc_it_hasn_t_grasped_consumerization_trend/