EDGE 2015 is starting in

Find out more EDGE 2015
Menu
Smartphones represent the greatest IT security risk to business: Good Mobility Index

Smartphones represent the greatest IT security risk to business: Good Mobility Index

Good Technology releases latest report following Sydney Mobility Summit

Good Technology Mobility Summit.

Good Technology Mobility Summit.

Smartphones represent the greatest IT security risk to business, followed by the increase in the risk associated with third party applications.

That's according to the Q1 2014 Good Moblity Index report, which tracks activations across the breadth of mobile platforms and devices, and leverages findings from the more than 5,000 Good customers worldwide to highlight global mobility trends and usage patterns.

Organisations cited security as their top concern in 2014.

However this has not stopped the rise of mobility as the corresponding increase in productivity is too great to forgo for most companies.

The report found a significant increase in activation of more complex secure enterprise apps, most notably secure browsing.

It also shows that the organisations were taking steps to mitigate security risks by leveraging secure mobile enterprise apps.

Good Technology, vice president of product marketing, John Dasher, said the world was at a point where you could do certain things faster on a mobile device than on a desktop.

Read more: iPad users get access to MobileSputnik

Dasher also underscored the importance of channel partners following Good Technology's recent agreement with Tech Data.

"We are really excited the relationship with Tech Data," he said.

"Working with channel partners is the only way to scale and we are making investments in our own products to leverage those partnerships.

Read more: Businesses to increase mobility spend due to BYOD: Good Technology

"We want a partner that understands that security is a critical component to any solution."

Overall, secure enterprise app activations continued to grow at 57 percent quarter over quarter, up from 54 percent and 43 percent growth from the last two quarters respectively.

This is not surprising given recent data from the 2014 State of Endpoint Risk report published by The Ponemon Institute which highlights that within the IT environment, mobility and third party applications pose the greatest security risks.

Read more: Good Technology acquires BoxTone

In a survey of IT and IT security practitioners with involvement in endpoint security, 75 percent of respondents noted mobile devices such as smart phones represent the greatest risk of potential IT security risk, followed by the increase in the risk associated with third party applications.

According to a company statement, the number of secure browsing app activations across Good’s customer base skyrocketed this quarter by 2900 percent, boosting it to the fifth most-activated app category, despite not making the top 10 in previous quarters.

With the introduction of new secure browsing apps such as Good Access into the Good-secured ecosystem, organisations were taking full advantage of the ability to securely and seamlessly provide VPN-less access to their enterprise data.

Organisations also continue to invest in secure custom app development to mobilise business processes and drive efficiencies

Custom app activations grew 77 percent quarter over quarter, a significant jump in the 55 percent growth reported in Q4 2013.

Other app categories that saw notable growth of over 100 percent quarter over quarter include mobile printing, notes and mobile unified communications, highlighting the growing trend of organisations moving beyond tasks like document editing and management and supplementing their mobile app strategies with more advanced, sophisticated apps.

Good Technology chief executive, Christy Wyatt, said security was at the heart of every conversation with a customer.

“Productivity, collaboration, efficiency… these can only be realised when mobility is coupled with security. Organisations are seeing there’s no room, or reason, to compromise on one or the other,” she said.

EDGE 2015:: For all the latest on EDGE 2015 including the keynote speakers visit the EDGE mini-site now

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags vice president of product marketingJohn DasherGood TechnologyQ1 2014 Good Moblity Index reportChristy WyattGood Technology chief executive

Upcoming

Slideshows

In Pictures: 7 things we hate about Twitter

In Pictures: 7 things we hate about Twitter

You probably either love Twitter for its quirkiness and brevity or see it as a pointless waste of time. After nearly a decade on the social scene, Twitter still needs to improve its user experience and fill in notable gaps in the service. These seven problems are long overdue for a fix.

In Pictures: 7 things we hate about Twitter
IN PICTURES: EDGE 2015 - Sponsor Briefing

IN PICTURES: EDGE 2015 - Sponsor Briefing

With EDGE 2015 rapidly approaching, ARN and Reseller News NZ held a Sponsors Briefing where ARN publisher and president, Susan Searle, and Events Manager, Alexandra West, ran through the considerable logistics in detail. Attendees then enjoyed some splendid canapes and drinks. EDGE is designed to bring the A/NZ channel together in a collaborative and educational environment. Themed around channel channel leadership, EDGE will be held at the Sheraton Mirage, Port Douglas, July 20-23. Photos by MIKE GEE.

IN PICTURES: EDGE 2015 - Sponsor Briefing
In Pictures: Robots that cook, clean, sing and dance

In Pictures: Robots that cook, clean, sing and dance

Cooking, learning language and doing the laundry are a few of the human skills demonstrated by.real humanoid bots featured in the National Geographic movie Robots.

In Pictures: Robots that cook, clean, sing and dance

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments