All the latest UK technology news, reviews and analysis


Dell claims half of BYOD firms have suffered a security breach

15 Mar 2013
Business man using smartphone as part of bring your own device trend

Dell claims 50 percent of its customers with a bring-your-own-device (BYOD) policy have experienced a security breach.

It said the figures served as a warning that while BYOD can make a business more agile, firms need to ensure they follow a strategy that best meets their individual requirements.

"We would not advise customers to simply let users bring in any device at all," Dell's executive director of End User Computing, Margaret Franco, told V3.

"In fact, what we've found is that customers that have allowed a BYOD policy, that have allowed end users to bring in anything that they want, fifty percent of those companies experienced a security breach," she added.

Instead, companies need to think through their business strategy, and look at which devices and approaches best serve that end, Franco said.

That strategy will differ depending on the customer, their objectives, their current infrastructure, and the security challenges of the kind of data they handle.

"Our approach is to start with an assessment of what [the customer] wants, profiling the users and looking at the right applications for those users, and only then considering what the right kind of device is," she added.

"CIOs have two choices. They can put in place policies and [mobile data management] solutions in order to react to these trends, or they can really put together a strategy for end user computing that enables them to pro-actively address them," she added.

However, whichever approach organisations choose, security is one essential component that cannot be overlooked.

Naturally, Dell said it has been listening to customers and addressing their needs with relevant technologies, such as Credant, which the firm acquired late in 2012 for its endpoint encryption services.

Dell has also been attempting to build more consumer appeal into its corporate PCs, while at the same time making consumer kit such as its XPS line more secure and better able to fit into a corporate environment.

"We are still hearing interest from customers for solutions for traditional PCs as well as tablets and smartphones," said Franco.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Daniel Robinson
About

Daniel Robinson is technology editor at V3, and has been working as a technology journalist for over two decades. Dan has served on a number of publications including PC Direct and enterprise news publication IT Week. Areas of coverage include desktops, laptops, smartphones, enterprise mobility, storage, networks, servers, microprocessors, virtualisation and cloud computing.

More on Strategy
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
20%
14%
4%
21%
29%
12%

Popular Threads

Powered by Disqus
Galaxy S5 vs One M8 video review

Galaxy S5 vs HTC One M8 video review

We see which Android contender is best for business

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Head of Linux / DevOps - eCommerce

Head of Linux / DevOps - eCommerce - Hands on Quant...

Applications Packager (Citrix, Wise, AppSense, VB script, MSI, SCCM)

We are currently seeking an experienced Applications...

C++ Software Engineer - Algorithmic Trading

The opportunity itself is for a C++ Software Engineer...

Python Automation Test Analyst - Popular Online Retailer

Python Automation Test Analyst, Tester, OpenERP, eCommerce...
To send to more than one email address, simply separate each address with a comma.