Lumension Security report examines how companies are responding to the security threats presented by the influx of mobile devices on the company networ

May 15, 2013

3 Min Read


A recent survey conducted by Holger Schulze's Information Security Community group on LinkedIn finds that security is both the top concern and top measure for success for enterprises implementing BYOD programs. The BYOD and Mobility Security Report, sponsored by Lumension®, a global leader in endpoint management and security, examined the benefits of BYOD, drivers for implementing a BYOD program and how companies are responding to the security threats presented by the influx of mobile devices entering corporate networks.

BYOD is of interest to many enterprises, with close to 20% widely supporting privately-owned devices, an additional 35% saying BYOD is under evaluation, and some 40% of respondents still supporting company-owned mobile devices. These programs provide many benefits to employees and enterprises alike, including improved employee satisfaction, productivity and mobility, each cited by over 50% of respondents as a primary driver and benefit of BYOD.

However, security is also a very big concern and was cited by 70% of respondents as the top criteria for success, even over employee productivity, cited by 54%. Respondents fear a loss of company or client data, unauthorized access and malware infections, and many say they lack the resources necessary to address these security concerns. In fact, almost a third of organizations say that they do not have even a basic BYOD policy in place to help mitigate some of the risk.

"What is concerning to me is the lack of security that is actively implemented, according to survey respondents," said Paul Zimski, vice president of solution marketing at Lumension. "Over a third of organizations have no security at all and most are relying on just encryption. Encryption is great if the device is lost or stolen, but it does little good against something like a phishing attack. In the end, a mobile device is an endpoint, subject to the same attacks we protect against on so-called traditional endpoints. Encryption simply is not enough."

Mandatory use of encryption was cited as a risk control measure for mobile devices by 40% of respondents. Encryption is considered best equipped to deal with lost or stole devices, which was the third ranked security concern, after lost data and unauthorized access. When asked if they felt ready for a full enterprise BYOD adoption, only 6% responded that their organization was 100% ready, while the majority of respondents claimed to feel less than 50% ready for BYOD.

The BYOD and Mobility Security Report surveyed 1,650 information security professionals around the world through Holger Schulze's Information Security Community group on LinkedIn. The majority of respondents were information security specialists in organizations of 10 - 99 employees. A full breakdown of the survey results is available online here. You can read Paul Zimski's blog post discussing the survey here.

Supporting Resources:

· Survey Results

· Optimal Security Blog

· Lumension on Twitter

About Lumension Security, Inc.

Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, Antivirus and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Virginia, Texas, Utah, Florida, Ireland, Luxembourg, the United Kingdom, Australia and Singapore. Lumension: IT Secured. Success Optimized.&trade More information can be found at

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights