Risk
10/11/2010
03:56 PM
50%
50%

Apple iOS Leads Android In Enterprise Activations

The Apple iPhone and iPad accounted for more than half of enterprise mobile device activations in the third quarter according to Good Technology.




The 18 Best iPad Apps For SMBs
(click for larger image and for full photo gallery)
The Apple iPhone and iPad made up more than half of third-quarter new activations of mobile devices by enterprise customers of Good Technology, a messaging and mobile management software company.

In its first quarterly metrics report, Good Technology found that the devices based on Apple's iOS, which include the iPhone 4, iPhone 3GS and iPad, led rivals in new deployments. However, enterprise use of smartphones and other devices running Google's Android operating system was rising fast, representing nearly 30% of new activations during the same time period.

Microsoft's Windows Mobile came in third in the survey, representing 15% of enterprise deployments. Devices based on Nokia's Symbian OS represented less than 5% of new activations.

The iPhone 4 and the iPad, launched in late June and early April, respectively, fueled Apple's rise in the enterprise, Good Technology said. Android, which is available on a wide variety of devices, rose by roughly 10 percentage points during the five-month period covered in the study.

"As an increasing number of Android devices, including both smartphones and tablet form factors, come to market, we expect this growth in Android device activations to continue to increase accordingly," the report released last week said.

Good Technology's findings on Android are in line with a recent mobile app developer survey. In a poll of 2,363 developers, Appcelerator, makers of the Titanium cross-platform mobile development software, and research firm IDC, found that developers believe Android has a better long-term outlook than iOS, even as they continue to rate the latter better in terms of app sales, discoverability and hardware. Most research rates Android as the fastest growing mobile platform.

Good Technology's study is based on internal data gathered from its customers, which include 40 Fortune 100 companies. The study does not include Research In Motion's BlackBerry smartphone, because RIM sells its own software for corporate email access.

Among Good Technology's customers, the iPhone 4 became the most frequently activated device within the first month of its release. The iPad entered the top five most activated devices less than two months after its release. The only individual Android models to crack the top five during the quarter were HTC's Droid Incredible and Motorola's Droid X.

Interestingly, 70% of companies deploying the iPad had not activated any other devices with Good Technology, while the remaining 30% had at least one other iOS or Android device.

More than 40% of Good Technology customers support both iOS and Android devices, and nearly 20% support three or more mobile platforms.

SEE ALSO:

Android Outlook Brighter Than iOS, Developers Say

Android Takes Smartphone Lead From BlackBerry, iPhone

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice post
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1750
Published: 2015-07-01
Open redirect vulnerability in nokia-mapsplaces.php in the Nokia Maps & Places plugin 1.6.6 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the href parameter to page/place.html. NOTE: this was originally reported as cross-sit...

CVE-2014-1836
Published: 2015-07-01
Absolute path traversal vulnerability in htdocs/libraries/image-editor/image-edit.php in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the image_path parameter in a cancel action.

CVE-2015-0848
Published: 2015-07-01
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.

CVE-2015-1330
Published: 2015-07-01
unattended-upgrades before 0.86.1 does not properly authenticate packages when the (1) force-confold or (2) force-confnew dpkg options are enabled in the DPkg::Options::* apt configuration, which allows remote man-in-the-middle attackers to upload and execute arbitrary packages via unspecified vecto...

CVE-2015-1950
Published: 2015-07-01
IBM PowerVC Standard Edition 1.2.2.1 through 1.2.2.2 does not require authentication for access to the Python interpreter with nova credentials, which allows KVM guest OS users to discover certain PowerVC credentials and bypass intended access restrictions via unspecified Python code.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report