Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Ensuring Security and Compliance in a BYOD World

By Art Swift
July 13, 2015

IT security is complicated enough. The widespread adoption of BYOD mobile devices and the overall consumerization of IT promise to complicate security efforts exponentially. Are companies up to the challenge?

According to a recent multinational survey commissioned by CUPP Computing and conducted by Decisive Analytics, many companies are not satisfied with the mobile security they have, particularly in the face of a changing security environment. Some have yet to implement a mobile security environment at all.

Among the study’s findings:

  • In general, most larger companies reported having a mobile security solution in place, although they had concerns about shortcomings to those products.
  • By contrast, more than a third of smaller companies (less than 100 employees) had no mobile computing security solution at all.
  • Fully 68 percent of mobile security decision makers said better mobile security is needed to prevent or mitigate targeted attacks.
  • Some 66 percent also feel the need to fulfill a compliance requirement – such as HIPAA, EU Data Protection, PCI – with mobile security.
  • Among larger companies, compliance is a key driver to mobile security purchases. Smaller companies didn’t see this compliance need.

Among the security concerns expressed by IT professionals, 47 percent ranked Android devices as the top mobile security concern, followed by Windows phones (24 percent), then Apple and Blackberry devices.

In open comments, IT professionals cited cost of deployment and government intrusion as additional security concerns.

The survey indicates that IT managers are already aware that a full suite of features are necessary to protect against these novel attacks.

For example, when asked to rank a variety of mobile security features:

  • 84 percent said enterprise-level products such as anti-malware, Web reputation, firewall IPS/IDS were critical.
  • Some 80 percent also put data protection services such as mobile container, application wrapping and data loss prevention services on the critical list.
  • 79 percent added baseline mobile compliance.

Interestingly, IT security managers acknowledged the importance of mobile security in cloud environments as well.

For instance:

  • 58 percent of decision makers said they want to ensure secure access to corporate data in the cloud
  • 65 percent said want to secure valuable data on employees’ mobile devices
  • 59 percent want to protect the device itself from damaging malware.

 

Security and IT managers rated the current priority of several security-related items in their enterprises, and preventing or mitigating targeted attacks was ranked the most urgent.
Information courtesy of CUPP Computing Mobile Security Multinational Decisionmakers Study 2015
Priority Percent Rating "Very High" or "Urgent"
Achieve and maintain regulatory
compliance
66
Prevent and/or mitigate targeted
attacks
68
Secure mobile access to corporate
applications in the cloud
58
Prevent corporate data loss
from mobile devices
65
Deploy mobile anti-­malware
software
59

 

The perception that a mobile security problem exists only in the U.S. is also false. The survey included responses from five countries around the world (U.S., Japan, UK, France and Germany) and found an increase in concern over targeted attacks and data breaches worldwide. The only strong point of variance was in compliance: Japanese respondents generally did not express a need for mobile security compliance reporting.

Overall, with the widespread adoption of the BYOD philosophy, mobile devices are becoming an attractive target for intrusion and sophisticated attackers everywhere. Large companies and small businesses alike are looking for the next level of protection for their sensitive corporate and customer data, for their corporate reputations, and to ensure adequate regulatory compliance.

Companies are clearly interested in a hardware-based solution to protect data on site, in the cloud and on mobile devices themselves.

KEYWORDS: Bring Your Own Device (BYOD) data loss prevention mobile security security compliance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

 Art Swift is CEO of CUPP Computing, which provides security solutions for mobile systems, such as tablets, smartphones, remote service devices and the Internet of Things (IoT). CUPP Computing is headquartered in Oslo, Norway, and has operations in Netanya, Israel, and Palo Alto, California. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • iPhone

    Find the balance between security and privacy in a BYOD world

    See More
  • Lightbulb with gradient colorful background

    Ensuring security and compliance in evolving cloud environments

    See More
  • BYOD Puts One in Three organization’s Corporate Security at Risk

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing