Risk
10/11/2010
03:56 PM
Connect Directly
RSS
E-Mail
50%
50%

Apple iOS Leads Android In Enterprise Activations

The Apple iPhone and iPad accounted for more than half of enterprise mobile device activations in the third quarter according to Good Technology.




The 18 Best iPad Apps For SMBs
(click for larger image and for full photo gallery)
The Apple iPhone and iPad made up more than half of third-quarter new activations of mobile devices by enterprise customers of Good Technology, a messaging and mobile management software company.

In its first quarterly metrics report, Good Technology found that the devices based on Apple's iOS, which include the iPhone 4, iPhone 3GS and iPad, led rivals in new deployments. However, enterprise use of smartphones and other devices running Google's Android operating system was rising fast, representing nearly 30% of new activations during the same time period.

Microsoft's Windows Mobile came in third in the survey, representing 15% of enterprise deployments. Devices based on Nokia's Symbian OS represented less than 5% of new activations.

The iPhone 4 and the iPad, launched in late June and early April, respectively, fueled Apple's rise in the enterprise, Good Technology said. Android, which is available on a wide variety of devices, rose by roughly 10 percentage points during the five-month period covered in the study.

"As an increasing number of Android devices, including both smartphones and tablet form factors, come to market, we expect this growth in Android device activations to continue to increase accordingly," the report released last week said.

Good Technology's findings on Android are in line with a recent mobile app developer survey. In a poll of 2,363 developers, Appcelerator, makers of the Titanium cross-platform mobile development software, and research firm IDC, found that developers believe Android has a better long-term outlook than iOS, even as they continue to rate the latter better in terms of app sales, discoverability and hardware. Most research rates Android as the fastest growing mobile platform.

Good Technology's study is based on internal data gathered from its customers, which include 40 Fortune 100 companies. The study does not include Research In Motion's BlackBerry smartphone, because RIM sells its own software for corporate email access.

Among Good Technology's customers, the iPhone 4 became the most frequently activated device within the first month of its release. The iPad entered the top five most activated devices less than two months after its release. The only individual Android models to crack the top five during the quarter were HTC's Droid Incredible and Motorola's Droid X.

Interestingly, 70% of companies deploying the iPad had not activated any other devices with Good Technology, while the remaining 30% had at least one other iOS or Android device.

More than 40% of Good Technology customers support both iOS and Android devices, and nearly 20% support three or more mobile platforms.

SEE ALSO:

Android Outlook Brighter Than iOS, Developers Say

Android Takes Smartphone Lead From BlackBerry, iPhone

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3051
Published: 2014-10-29
The Internet Service Monitor (ISM) agent in IBM Tivoli Composite Application Manager (ITCAM) for Transactions 7.1 and 7.2 before 7.2.0.3 IF28, 7.3 before 7.3.0.1 IF30, and 7.4 before 7.4.0.0 IF18 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof s...

CVE-2014-3668
Published: 2014-10-29
Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument t...

CVE-2014-3669
Published: 2014-10-29
Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function ...

CVE-2014-3670
Published: 2014-10-29
The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly exec...

CVE-2014-3694
Published: 2014-10-29
The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and ob...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.