Feeds

Asia leads global BYOD race

IT managers jump on the bandwagon

Secure remote control for conventional and virtual desktops

Asian IT professionals are racing ahead of their global rivals when it comes to implementing Bring Your Own Device (BYOD) policies in their organisations, according to new research from BT.

The telecoms giant interviewed 2,000 IT users and managers in 11 countries and found that those in the region were the most forward thinking when it came to consumerisation trends.

A whopping 90 per cent of those in India, China and Singapore said they thought firms with a BYOD policy have a competitive advantage, as opposed to 80 per cent of those worldwide.

In terms of actually implementing such a strategy, 96 per cent of Chinese, 91 per cent of Singaporean and 86 per cent of Indian IT managers said they were currently rolling out BYOD or will be in the next two years. The global average was 81 per cent, said BT.

The benefits of allowing employees to use their personal devices in the workplace are well understood these days, including reduced hardware purchasing and management costs and improved user productivity.

However, IT managers are having to wrestle with the conundrum of how to ensure corporate data is safe when accessed from an employee-owned device – an issue borne out by the study.

Only ten per cent of those interviewed said they thought all users appreciate the security risks involved while less than a fifth said they thought all users understand issues around device access and permissions, BT said.

Nearly three-quarters said security challenges had to be overcome before they could roll out BYOD policies.

Little wonder then that security vendors are queuing up to offer their advice, and products, to help IT managers cope.

A Trend Micro spokesperson told The Reg that IT managers must ensure employees comply with corporate security policies from the outset if they want to use their personal device at work.

“They should avoid accessing their office networks using unauthorised devices. Furthermore, they should only access sites that have been approved by their IT departments,” the vendor added.

“Finally, Trend Micro highly recommends that users install security software that can stop the execution of malicious files on their mobile devices.”

The vendor also pointed out the dangers of malware hidden in legitimate mobile applications.

Android is the main culprit here but last month the Chinese government also expressed concern about security vulnerabilities in the application stores run by mobile operators China Mobile and China Telecom. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ellison: Sparc M7 is Oracle's most important silicon EVER
'Acceleration engines' key to performance, security, Larry says
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
Troll hunter Rackspace turns Rotatable's bizarro patent to stone
News of the Weird: Screen-rotating technology declared unpatentable
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.