Risk
10/11/2010
03:56 PM
50%
50%

Apple iOS Leads Android In Enterprise Activations

The Apple iPhone and iPad accounted for more than half of enterprise mobile device activations in the third quarter according to Good Technology.




The 18 Best iPad Apps For SMBs
(click for larger image and for full photo gallery)
The Apple iPhone and iPad made up more than half of third-quarter new activations of mobile devices by enterprise customers of Good Technology, a messaging and mobile management software company.

In its first quarterly metrics report, Good Technology found that the devices based on Apple's iOS, which include the iPhone 4, iPhone 3GS and iPad, led rivals in new deployments. However, enterprise use of smartphones and other devices running Google's Android operating system was rising fast, representing nearly 30% of new activations during the same time period.

Microsoft's Windows Mobile came in third in the survey, representing 15% of enterprise deployments. Devices based on Nokia's Symbian OS represented less than 5% of new activations.

The iPhone 4 and the iPad, launched in late June and early April, respectively, fueled Apple's rise in the enterprise, Good Technology said. Android, which is available on a wide variety of devices, rose by roughly 10 percentage points during the five-month period covered in the study.

"As an increasing number of Android devices, including both smartphones and tablet form factors, come to market, we expect this growth in Android device activations to continue to increase accordingly," the report released last week said.

Good Technology's findings on Android are in line with a recent mobile app developer survey. In a poll of 2,363 developers, Appcelerator, makers of the Titanium cross-platform mobile development software, and research firm IDC, found that developers believe Android has a better long-term outlook than iOS, even as they continue to rate the latter better in terms of app sales, discoverability and hardware. Most research rates Android as the fastest growing mobile platform.

Good Technology's study is based on internal data gathered from its customers, which include 40 Fortune 100 companies. The study does not include Research In Motion's BlackBerry smartphone, because RIM sells its own software for corporate email access.

Among Good Technology's customers, the iPhone 4 became the most frequently activated device within the first month of its release. The iPad entered the top five most activated devices less than two months after its release. The only individual Android models to crack the top five during the quarter were HTC's Droid Incredible and Motorola's Droid X.

Interestingly, 70% of companies deploying the iPad had not activated any other devices with Good Technology, while the remaining 30% had at least one other iOS or Android device.

More than 40% of Good Technology customers support both iOS and Android devices, and nearly 20% support three or more mobile platforms.

SEE ALSO:

Android Outlook Brighter Than iOS, Developers Say

Android Takes Smartphone Lead From BlackBerry, iPhone

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Experienced reindeers wanted
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.