Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Ensuring Security and Compliance in a BYOD World

By Art Swift
CUPP chart smartphone ranking

When asked to rank several mobile platforms in order of security concerns, Android was consistently mentioned as the top concern. Forty-seven percent of survey-takers placed it first.

Graphic courtesy of CUPP Computing Mobile Security Multinational Decisionmakers Study 2015

July 13, 2015

IT security is complicated enough. The widespread adoption of BYOD mobile devices and the overall consumerization of IT promise to complicate security efforts exponentially. Are companies up to the challenge?

According to a recent multinational survey commissioned by CUPP Computing and conducted by Decisive Analytics, many companies are not satisfied with the mobile security they have, particularly in the face of a changing security environment. Some have yet to implement a mobile security environment at all.

Among the study’s findings:

  • In general, most larger companies reported having a mobile security solution in place, although they had concerns about shortcomings to those products.
  • By contrast, more than a third of smaller companies (less than 100 employees) had no mobile computing security solution at all.
  • Fully 68 percent of mobile security decision makers said better mobile security is needed to prevent or mitigate targeted attacks.
  • Some 66 percent also feel the need to fulfill a compliance requirement – such as HIPAA, EU Data Protection, PCI – with mobile security.
  • Among larger companies, compliance is a key driver to mobile security purchases. Smaller companies didn’t see this compliance need.

Among the security concerns expressed by IT professionals, 47 percent ranked Android devices as the top mobile security concern, followed by Windows phones (24 percent), then Apple and Blackberry devices.

In open comments, IT professionals cited cost of deployment and government intrusion as additional security concerns.

The survey indicates that IT managers are already aware that a full suite of features are necessary to protect against these novel attacks.

For example, when asked to rank a variety of mobile security features:

  • 84 percent said enterprise-level products such as anti-malware, Web reputation, firewall IPS/IDS were critical.
  • Some 80 percent also put data protection services such as mobile container, application wrapping and data loss prevention services on the critical list.
  • 79 percent added baseline mobile compliance.

Interestingly, IT security managers acknowledged the importance of mobile security in cloud environments as well.

For instance:

  • 58 percent of decision makers said they want to ensure secure access to corporate data in the cloud
  • 65 percent said want to secure valuable data on employees’ mobile devices
  • 59 percent want to protect the device itself from damaging malware.

 

Security and IT managers rated the current priority of several security-related items in their enterprises, and preventing or mitigating targeted attacks was ranked the most urgent.
Information courtesy of CUPP Computing Mobile Security Multinational Decisionmakers Study 2015
Priority Percent Rating "Very High" or "Urgent"
Achieve and maintain regulatory
compliance
66
Prevent and/or mitigate targeted
attacks
68
Secure mobile access to corporate
applications in the cloud
58
Prevent corporate data loss
from mobile devices
65
Deploy mobile anti-­malware
software
59

 

The perception that a mobile security problem exists only in the U.S. is also false. The survey included responses from five countries around the world (U.S., Japan, UK, France and Germany) and found an increase in concern over targeted attacks and data breaches worldwide. The only strong point of variance was in compliance: Japanese respondents generally did not express a need for mobile security compliance reporting.

Overall, with the widespread adoption of the BYOD philosophy, mobile devices are becoming an attractive target for intrusion and sophisticated attackers everywhere. Large companies and small businesses alike are looking for the next level of protection for their sensitive corporate and customer data, for their corporate reputations, and to ensure adequate regulatory compliance.

Companies are clearly interested in a hardware-based solution to protect data on site, in the cloud and on mobile devices themselves.

KEYWORDS: Bring Your Own Device (BYOD) data loss prevention mobile device security security compliance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

 Art Swift is CEO of CUPP Computing, which provides security solutions for mobile systems, such as tablets, smartphones, remote service devices and the Internet of Things (IoT). CUPP Computing is headquartered in Oslo, Norway, and has operations in Netanya, Israel, and Palo Alto, California. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • iPhone

    Find the balance between security and privacy in a BYOD world

    See More
  • Lightbulb with gradient colorful background

    Ensuring security and compliance in evolving cloud environments

    See More
  • Generic Image for Leadership Topic

    BYOD Puts One in Three organization’s Corporate Security at Risk

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing