The "consumerization" of IT remains a hot topic for technology executives, with the growing popularity of products such as the Apple iPad and social networking sites such as Facebook and Twitter. So how secure are these consumer-focused technologies that are increasingly pushing their way into the work environment, and what impact are they having on corporate compliance efforts? Proofpoint Inc., a provider of cloud-based email security offerings, and research firm Osterman Research, conducted an online survey of 632 IT and security professionals from U.S. businesses and government agencies in May 2011 to find out. The results are featured in the "2011 Consumerized IT Security Survey," released on June 23. According to the report, this is an issue many organizations need to think about: more than 80 percent of those surveyed are letting their employees use consumerized IT products and services to conduct business communications. "Consumerized IT in the workplace is a fact of life, and organizations recognize that they must act to integrate it in a secure and compliant manner," says Michael Osterman, principal of Osterman Research.
Nearly half (48%) of organizations that allow consumerized IT in the workplace allow users to choose which technologies they use.
This article was originally published on 06-23-2011