Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Asia Pacific to bite 47 percent of global smartphone pie in 2012

Anuradha Shukla | June 29, 2012
Enterprises in the region should review mobile security policies, advises IDC.

The Asia Pacific region will command 47 percent of the global smartphone pie by 2012, according to a newly released report by IDC Financial Insights.

The report "Enterprise Mobile Device Security: Development Guidance to Tackle the Mobile Security Minefield," says that the increase in popularity and growth of smartphones for business use will lead to an increase in malicious mobile software.

IDC therefore advises enterprises to pay more attention to their security and defence mechanisms.

The majority of organisations today allow bring your own devices (BYODs) and have developed policies to support this trend. However, most employees are not aware of their company's mobile security policies.

As more enterprises allow their employees to use non-standard unmanaged devices for work to access sensitive corporate information, it becomes imperative for them to ensure that their staff adhere to necessary security mandates.

"With the rise of smartphones, IDC expects malicious mobile software - or malware such as viruses, worms, trojan horses, spyware and other rouge applications - to increase exponentially as we move into the future and this will in return amplify demand for mobile security solutions in Asia Pacific," said Li-May Chew, CFA, associate director for IDC Financial Insights Asia/Pacific Financial Advisory Service.

Preventive measures

IDC's new report examines the need for enterprise mobile security, especially within the mobile banking and payment arena. It also discusses core measures for enterprises to boost mobile security, including mobile device management (MDM) and mobile application management (MAM).

The report suggests several preventive measures to stem enterprise mobile security threats.

Enterprises can use robust security tools to remotely secure, monitor, encrypt and manage data, or secure and control corporate data and applications on an app-by-app basis.

"Nonetheless, it is not all about installing stringent mobile security features. As cliché as it may sound, we - device owners and end-users - are typically the weakest link when it comes to information security," says Chew. "It is thus up to enterprises to increase employee awareness of these threats and introduce programmes to inculcate secure practices in the work environment."


Sign up for CIO Asia eNewsletters.