Security Slideshow: Security and the Consumerization of ITBy Bob Violino | Posted 06-23-2011
84% of respondents are allowing their employees to use consumerized IT such as iPads, iPhones, Facebook, Twitter and instant messaging to conduct business communications.
To ensure secure use of these technologies, 51% of respondents say they are implementing three-layer security and compliance strategies that include a combination of trust, policy and technology.
16% of respondents say their organizations do not allow employees to use consumer technology in the workplace. Of this segment, 64% suspect that employees are using consumerized IT regardless of policies against it, and 56% say their company either has no consumer IT adoption strategy in place or they don't know if their company has a plan.
Just A Warning
71% of respondents whose organizations do not allow consumerized IT in the workplace say their companies do nothing more than issue a warning to employees who violate policy.
72% of respondents whose organizations don't allow consumerized IT in the workplace say that they are not convinced that it can be used in a secure and compliant manner.
67% of respondents say email is the most-used business application within their consumer mobile-device networks.
Nearly half (48%) of organizations that allow consumerized IT in the workplace allow users to choose which technologies they use.
The iâs Have It
89% of respondents whose organizations permit consumerized IT in the workplace say Apple iPhone and iPad are the most-used mobile devices.
49% of respondents whose organizations allow use of consumerized IT in the workplace say Facebook is the most-used social media platform.
IM Is Rare
Only 0.6% of respondents whose organizations allow consumerized IT in the workplace allow the use of IM technologies such as Yahoo! Messenger, AOL Instant Messenger and MSN Messenger.