Video series based on Trend Micro session* at the Mobile World Congress 2012.
PREVIOUS: Day 1 – Consumerization is disruptive
[...] I think this is very interesting because it proves two things:
The first one is that consumerization is real. It’s here already today.
The second one is that it really affects all the industry verticals and all company sizes.
Consumerization is definitely a broad phenomenon. It’s happening. People who try to resist it are simply just missing the trend. The train left the station. This is real. It’s happening today.
Data shows that the majority of companies surveyed already allow employees to use their personal devices for work-related activities. On an aggregate, 56% of the respondents say yes to Consumerization as end-users favor personal devices because easier to use, more convenient and allow them to mix personal and work. While the trend is clearly affecting organizations worldwide, not all regions have adapted at the same pace: the U.S. already lead this innovation with 75% of yes, the more conservative Japan is on the raise with 36% and Germany somewhere in between with 59%. From an industry vertical perspective, Education (80%), Health Care (69%) and Business Services (67%) are the most consumerized industries while Manufacturing (48%), Government (39%) and Utilities (36%) are slower at embracing consumer technology. Company size doesn’t seem to be a discriminating factor although mid-large organizations show higher adoption rates, up to 65% for companies with 1,500 employees.
* Mobile Security Forum: “Consumer Mobile Technology in the Enterprise: A Leap of Faith?”
An increasing number of companies are opening corporate networks and data to consumer mobile devices, as employees demand to bring their own smartphones and tablets to work. However, consumer mobile technology is generally not as secure and manageable as required by the enterprise. And too many companies make the mistake of trying to stop the influx of consumer IT. What new mobile platforms will your organization contend with? What built-in security models do they provide? What vulnerabilities are they exposed to? How rigorous is the scrutiny of the official application markets? Is the corporate data stored in these devices safe? In this series, leading mobile security experts answer these questions and, more importantly, reveal solutions and best practices for your company to safely embrace consumer mobile technology in the enterprise.