Why BYOD Is Worrying CIOs


About 66 per cent of respondents said employees are encouraged to bring their own device to work and 44 per cent said employees are allowed to select and use a specific set of personally-owned devices.

Also, 64 per cent respondents indicated that there has been a rapid increase in requests for authorizing access to mobile devices.

In this scenario, about 69 per cent respondents said managing policies and configuration of devices is a complex undertaking.

While 56 per cent of respondents said current solutions are ineffective in managing security of mobile, BYOD, and virtualization, 43 per cent said capabilities for detecting and blocking attacks that detect known vulnerabilities are insufficient to address threats in the present scenario.

About 53 per cent said their existing solutions are incompetent to withstand sophisticated, targeted and persistent threats.

"The technology transformation driven by mobility, BYOD, virtualization and cloud challenges the conventional security strategies in many aspects. The current capabilities are not sufficient enough and the survey confirms this," DSCI Director (Data Protection) Vinayak Godse said.

Threat and malware protection, quarantine of non-standard devices, enforceability of network policy on mobile devices, encryption of communication and data, and security scanning of mobile devices were key concerns for the protecting endpoints.

About 82 per cent said they wanted capabilities like authentication and authorization of users based on who, what, where, when, and how including granular access capabilities.

The study also found 63 per cent respondents saying management of solutions will require additional skills and effort, adding to cost.

Also Read: 7 Most Successful Enterprises By IIT Graduates

Also Read: 10 Best Data Recovery Software for 2013

Source: PTI