Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

IT and employees see BYOD security (much) differently

Thor Olavsrud | Nov. 21, 2012
IT organizations continue to struggle with the details when it comes to enabling BYOD for applications beyond email, and a new study finds that while employees are eager to access corporate resources from their mobile devices, they have little tolerance for controls IT wants to impose.

However, Chiu notes that many IT organizations are already doing these things without employees recognizing it.

"People who are accessing these corporate networks are being logged and they don't realize it," he says. "And the regulations have come down pretty clear on this: The corporate network is a corporate-owned resource and companies are allowed to log what they want."

"Employees just don't realize how much control's already put on them already," Chiu adds. "They don't realize until they get a block or aren't able to get to a specific site."

Blue Coat says 41 percent of IT organizations log corporate data access from mobile devices, 37 percent restrict the types of sites or content that can be accessed from mobile devices on their network and 34 percent log any web content accessed from mobile devices on their network.

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.