Mobile Security Survey: Lack of Awareness Chaos Pervades BYOD

SANS will be hosting a complimentary webcast on April 12, releasing the results to the First Annual Survey on Mobility Security.

In December, SANS launched its first ever mobility survey to discover if and how organizations are managing risk around their end user mobile devices. What SANS discovered was that only 9 percent of organizations felt they were fully aware of the devices accessing corporate resources, while half felt only vaguely or fairly aware of the mobile devices accessing their resources.

"Another interesting note (that aligns with what we saw on the vendor side at the RSA Security Conference in March) is that organizations are reaching for everything at their disposal to manage this risk," says Deb Radcliff, executive editor, SANS Analyst Program. "Among them are user education, MDM (mobile device management), logging and monitoring, NAC and guest networking, and configuration controls."

Fewer organizations (less than 20 percent) are using end point security tools, but of those, more are using agent-based tools rather than agent-less.

Featured

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.