Many of the 200 ANZ ICT decision-makers surveyed believe their businesses are at increased risk because of BYOD programs, including those in financial services, energy, mining and retail, and 51 percent of them have indicated that support for BYOD has distracted or changed their IT strategies, and only 37 percent felt their organisations were well prepared for it.
The study was commissioned by Juniper Networks and undertaken by Forrester Consulting last month.
According to Juniper Networks’ Australia and New Zealand Managing Director, Mark Iles, BYOD adoption is approaching an inflection point with organisations in Australia and New Zealand, with IT departments realising that they need to “simplify their networks and ditch ‘tack-on’ end-point security solutions that are often device-specific in favour of a more holistic solution.”
Iles said the Forrester BYOD study highlighted the underlying trends of the users' changing relationship with technology, device agnosticism, location-independence, and mobility in general, and that organisations must therefore “address these underlying challenges head-on,” and should not simply submit to “meeting the expectations of 'overly demanding' business users by focusing only on tactical solutions for access to email.”
Key findings of the survey included:
• Twenty-nine (29) percent of survey respondents cited a preference for considering, designing and deploying a mobile security solution to be aligned with their existing network security
• Fifty-seven (57) percent of organisations surveyed with 1,000 or more employees have already implemented BYOD programs. More than half the organisations surveyed already support at least the top three mobile operating systems
• Forty-seven (47) percent of the large enterprises surveyed say that they are not expanding their BYOD program. The research provides multiple reasons that may be contributing to this shift including direct cost, increased complexity, substantial administrative overheads, additional security concerns and a common perception of immature or under-utilised solutions
• More respondents cited a need for user role-based identity and access control or device security and improved network security.