Risk
10/11/2010
03:56 PM
Connect Directly
RSS
E-Mail
50%
50%

Apple iOS Leads Android In Enterprise Activations

The Apple iPhone and iPad accounted for more than half of enterprise mobile device activations in the third quarter according to Good Technology.




The 18 Best iPad Apps For SMBs
(click for larger image and for full photo gallery)
The Apple iPhone and iPad made up more than half of third-quarter new activations of mobile devices by enterprise customers of Good Technology, a messaging and mobile management software company.

In its first quarterly metrics report, Good Technology found that the devices based on Apple's iOS, which include the iPhone 4, iPhone 3GS and iPad, led rivals in new deployments. However, enterprise use of smartphones and other devices running Google's Android operating system was rising fast, representing nearly 30% of new activations during the same time period.

Microsoft's Windows Mobile came in third in the survey, representing 15% of enterprise deployments. Devices based on Nokia's Symbian OS represented less than 5% of new activations.

The iPhone 4 and the iPad, launched in late June and early April, respectively, fueled Apple's rise in the enterprise, Good Technology said. Android, which is available on a wide variety of devices, rose by roughly 10 percentage points during the five-month period covered in the study.

"As an increasing number of Android devices, including both smartphones and tablet form factors, come to market, we expect this growth in Android device activations to continue to increase accordingly," the report released last week said.

Good Technology's findings on Android are in line with a recent mobile app developer survey. In a poll of 2,363 developers, Appcelerator, makers of the Titanium cross-platform mobile development software, and research firm IDC, found that developers believe Android has a better long-term outlook than iOS, even as they continue to rate the latter better in terms of app sales, discoverability and hardware. Most research rates Android as the fastest growing mobile platform.

Good Technology's study is based on internal data gathered from its customers, which include 40 Fortune 100 companies. The study does not include Research In Motion's BlackBerry smartphone, because RIM sells its own software for corporate email access.

Among Good Technology's customers, the iPhone 4 became the most frequently activated device within the first month of its release. The iPad entered the top five most activated devices less than two months after its release. The only individual Android models to crack the top five during the quarter were HTC's Droid Incredible and Motorola's Droid X.

Interestingly, 70% of companies deploying the iPad had not activated any other devices with Good Technology, while the remaining 30% had at least one other iOS or Android device.

More than 40% of Good Technology customers support both iOS and Android devices, and nearly 20% support three or more mobile platforms.

SEE ALSO:

Android Outlook Brighter Than iOS, Developers Say

Android Takes Smartphone Lead From BlackBerry, iPhone

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.