Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Dark Reading
Dark Reading
Products and Releases

Bitglass Report: BYOD Supported in More Than 70 Percent of Organizations That Are Driven by Need for Increased Productivity

Financial Services Industry Leads in Support for BYOD, Despite Regulations and Security Concerns

CAMPBELL, CA--(April 28, 2016) - Bitglass, the Total Data Protection company, released the results of its report “How Forward-Looking Industries Secure BYOD,” which shares insights on bring-your-own device (BYOD) security gained from a survey of more than 800 cybersecurity professionals across five major industries, including financial services, technology, healthcare, government and education. Bitglass found that 72 percent of organizations, led by the financial services sector, support BYOD for all or some employees. However, relatively few organizations are able to control access to corporate data, remotely wipe devices or enforce device encryption. Only 14 percent have successfully deployed much-hyped Mobile Application Management (MAM) solutions.

"The threat of data leakage is more prevalent than ever, as employees look to access sensitive corporate information on mobile devices outside the corporate network," said Nat Kausik, CEO, Bitglass. "Unfortunately, few organizations have adequate risk-control measures in place. Fewer than half support critical capabilities such as device encryption and DLP – a gap that suggests more-comprehensive BYOD security solutions are needed.”

Key Findings:

●     72 percent of organizations surveyed support BYOD, led by financial services at 74 percent.

●     Despite regulations and security concerns, fewer than 60 percent of financial services organizations have remote wipe and encryption capabilities.

●     Only 54 percent of government organizations support BYOD, a lower percentage than in all other surveyed industries.

●     Higher education lags behind other industries in enforcing essential risk-control measures. Only 18 percent of those surveyed have access controls in place, and just 29 percent have the ability to remotely wipe devices.

●     Only 14 percent of organizations have adopted MAM tools since their introduction in 2010. Most respondents cited employee privacy concerns and usability issues as top challenges to adoption.


Concerns, Drivers and Inhibitors

Bitglass’ report found that 62 percent of healthcare organizations see compliance as a top security concern, due to HIPAA’s stringent requirements. Notably, organizations across all sectors were concerned with data leakage – including 81 percent of financial services organizations, 90 percent of healthcare organizations and 79 percent of education organizations.

Organizations in most industries see employee satisfaction as a key benefit of enabling BYOD. Government was the only exception, with just 44 percent of respondents valuing employee satisfaction.

Privacy was cited as the biggest inhibitor to BYOD adoption in 52 percent of small and medium-sized businesses (SMBs) and in 44 percent of organizations in the technology sector, where savvy employees understand the invasive nature of existing tools such as MDM and MAM. Security was cited as the biggest inhibitor to BYOD in large organizations and regulated industries, namely financial services and healthcare.

Strikingly, the report found that device encryption was supported in only 36 percent of educational institutions, 56 percent of financial services organizations and 57 percent of healthcare organizations – timely statistics as the U.S. and other countries continue to debate the use of encryption in the enterprise and by consumers.

To view the complete Bitglass report, “How Forward-Looking Industries Secure BYOD,” visit:bitglass.com/byod-trends-report_2016


Bitglass is a Cloud Access Security Broker that delivers innovative technologies that transcend the network perimeter to deliver total data protection for the enterprise – in the cloud, at access, on mobile devices, on the network and anywhere on the Internet. Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. Bitglass is based in Silicon Valley.


Press Contact
Travis Anderson
10Fold for Bitglass
(925) 271-8227
[email protected]


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel function where a lack of checks allows the exploitation of an integer overflow on the size parameter of the tz_map_shared_mem function.
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel�s tz_handle_trusted_app_smc function where a lack of integer overflow checks on the req_off and param_ofs variables leads to memory corruption of critical kernel structures.
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the tz_map_shared_mem function can bypass boundary checks, which might lead to denial of service.
PUBLISHED: 2021-06-22
Trusty contains a vulnerability in TSEC TA which deserializes the incoming messages even though the TSEC TA does not expose any command. This vulnerability might allow an attacker to exploit the deserializer to impact code execution, causing information disclosure.
PUBLISHED: 2021-06-22
Trusty contains a vulnerability in all TAs whose deserializer does not reject messages with multiple occurrences of the same parameter. The deserialization of untrusted data might allow an attacker to exploit the deserializer to impact code execution.