Enterprise Mobile Security: Does a New Study Expose EMM's Limits?

Posted on April 21, 2015

A new study conducted by Decisive Analytics for CUPP Computing shows that acMobile_device_security_a_growing_CIO_worry_by_Niekverlaanross the U.S., Europe, and Asia the majority (68%) of enterprise IT decision makers say that preventing or mitigating targeted attacks is the single most urgent mobile security priority, closely followed by achieving and maintaining regulatory compliance (66%).

Two-thirds of managers say they are satisfied with policy enforcement and compliance features provided by their current EMM software. The study?s sponsors claim that the study, "Mobile Security Multinational Decision Makers Study 2015", exposes some limits in existing mobile security tools. Prat Agarwal, director of business development at secure mobile printing leader Breezy, notes that one of the biggest problems with existing EMM solutions is that many companies still haven?t deployed them.

?I still talk to several companies every month that don?t have an enterprise-wide EMM solution in place, and I still run across companies that don?t have any kind of policy or system in place to secure employee-owned devices brought into the workplace,? Agarwal says. ?And even more of them haven?t added a secure mobile printing solution to complete their mobile security coverage. So I wonder if the problem is less one of limits in the available tools than one of global usage of the tools.?

Mobile Security Priorities

The new study clearly shows that mobile security decision makers are well aware of the need to prevent or mitigate targeted attacks (68%). However, achieving/maintaining regulatory compliance is a close second in terms of priorities (66%). Since many companies are managing multiple compliance standards, including HIPAA, EU Data Protection, PCI and more, regulatory compliance concerns are clearly a primary driver for mobile security adoption in the workplace.

"Obviously, there has been a huge increase in targeted attacks and data breaches worldwide," said CUPP Chief Executive Officer Art Swift. "With widespread adoption of the BYOD philosophy, allowing employees to use their own devices to interact with enterprise computing environments, mobile devices are becoming an attractive target for sophisticated attackers. Our enterprise customers are looking for the next level of protection for their sensitive corporate and customer data. They also need to protect their reputations and ensure regulatory compliance."

Agarwal agrees, noting that other studies have shown that nearly a third of enterprise employees admit to having lost company data due to misuse of a mobile device. ?There is a wide disparity in how companies secure the mobile devices that connect to their data and their networks, and that creates an opening for hackers and thieves,? he says.

Current Mobile Security Software Deployments
The Cupp/Decisive study looked at the tools enterprises are currently using to protect their data. The most commonly mentioned was traditional endpoint security (16 to 22%). Interestingly, a third (32%) of the smaller companies (those with less than 100 employees) said they were currently without a security software solution. Established providers of endpoint security software were mentioned among the current vendors being used by managers.

Smaller and more specialized EMM or Mobile Device Management (MDM) vendors were also mentioned meaning that many companies actually have mixed deployment scenarios. 

While almost a third of smaller companies did not have an EMM solution, most larger companies did. Two-thirds said they were satisfied overall with their current mobile security solution. However, many noted that the increasing consumerization of IT is making it more difficult to secure company networks and data.

Agarwal isn?t surprised. ?Consumer devices are sexy, cool, and popular. From wearables to the latest apps and smartphones, they are moving from the consumer marketplace to the enterprise faster than ever. On-device encryption, which is a cornerstone of Breezy?s approach to secure mobile printing, is the strongest protection available for these kinds of devices, because even if a hacker gets the data from a stolen, lost, or compromised device, it?s useless because it?s encrypted. I think we?re going to see more and more companies looking towards this kind of security to protect themselves.?

Breezy delivers device and operating system agnostic secure mobile printing with on-device encryption for smartphones and tablets running Android and iOS operating systems. Breezy?s secure mobile printing technology is fully integrated with leading EMM providers like AirWatch, Aruba, Citrix, Good Technology, IBM (Fiberlink?s MaaS360), MobileIron and many others, and can add an extra layer of protection to the mobile devices that connect to your network or store your data. For more information on mobile device security and secure mobile printing, watch this video from Breezy, download The Definitive Guide to Mobile Printing, a free ebook, or click here to schedule a Breezy demo now.


 

Easy to deploy and manage

Customers report that Breezy installations are among the easiest they’ve ever seen for an enterprise product.