Risk
10/11/2010
03:56 PM
50%
50%

Apple iOS Leads Android In Enterprise Activations

The Apple iPhone and iPad accounted for more than half of enterprise mobile device activations in the third quarter according to Good Technology.




The 18 Best iPad Apps For SMBs
(click for larger image and for full photo gallery)
The Apple iPhone and iPad made up more than half of third-quarter new activations of mobile devices by enterprise customers of Good Technology, a messaging and mobile management software company.

In its first quarterly metrics report, Good Technology found that the devices based on Apple's iOS, which include the iPhone 4, iPhone 3GS and iPad, led rivals in new deployments. However, enterprise use of smartphones and other devices running Google's Android operating system was rising fast, representing nearly 30% of new activations during the same time period.

Microsoft's Windows Mobile came in third in the survey, representing 15% of enterprise deployments. Devices based on Nokia's Symbian OS represented less than 5% of new activations.

The iPhone 4 and the iPad, launched in late June and early April, respectively, fueled Apple's rise in the enterprise, Good Technology said. Android, which is available on a wide variety of devices, rose by roughly 10 percentage points during the five-month period covered in the study.

"As an increasing number of Android devices, including both smartphones and tablet form factors, come to market, we expect this growth in Android device activations to continue to increase accordingly," the report released last week said.

Good Technology's findings on Android are in line with a recent mobile app developer survey. In a poll of 2,363 developers, Appcelerator, makers of the Titanium cross-platform mobile development software, and research firm IDC, found that developers believe Android has a better long-term outlook than iOS, even as they continue to rate the latter better in terms of app sales, discoverability and hardware. Most research rates Android as the fastest growing mobile platform.

Good Technology's study is based on internal data gathered from its customers, which include 40 Fortune 100 companies. The study does not include Research In Motion's BlackBerry smartphone, because RIM sells its own software for corporate email access.

Among Good Technology's customers, the iPhone 4 became the most frequently activated device within the first month of its release. The iPad entered the top five most activated devices less than two months after its release. The only individual Android models to crack the top five during the quarter were HTC's Droid Incredible and Motorola's Droid X.

Interestingly, 70% of companies deploying the iPad had not activated any other devices with Good Technology, while the remaining 30% had at least one other iOS or Android device.

More than 40% of Good Technology customers support both iOS and Android devices, and nearly 20% support three or more mobile platforms.

SEE ALSO:

Android Outlook Brighter Than iOS, Developers Say

Android Takes Smartphone Lead From BlackBerry, iPhone

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8370
Published: 2015-01-29
VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file.

CVE-2015-0236
Published: 2015-01-29
libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.

CVE-2015-1043
Published: 2015-01-29
The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors.

CVE-2015-1044
Published: 2015-01-29
vmware-authd (aka the Authorization process) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allows attackers to cause a host OS denial of service via unspecified vectors.

CVE-2015-1422
Published: 2015-01-29
Multiple cross-site scripting (XSS) vulnerabilities in Gecko CMS 2.2 and 2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) horder[], (2) jak_catid, (3) jak_content, (4) jak_css, (5) jak_delete_log[], (6) jak_email, (7) jak_extfile, (8) jak_file, (9) jak_hookshow[], (10) j...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.