Dell claims 50 percent of its customers with a bring-your-own-device (BYOD) policy have experienced a security breach.
It said the figures served as a warning that while BYOD can make a business more agile, firms need to ensure they follow a strategy that best meets their individual requirements.
"We would not advise customers to simply let users bring in any device at all," Dell's executive director of End User Computing, Margaret Franco, told V3.
"In fact, what we've found is that customers that have allowed a BYOD policy, that have allowed end users to bring in anything that they want, fifty percent of those companies experienced a security breach," she added.
Instead, companies need to think through their business strategy, and look at which devices and approaches best serve that end, Franco said.
That strategy will differ depending on the customer, their objectives, their current infrastructure, and the security challenges of the kind of data they handle.
"Our approach is to start with an assessment of what [the customer] wants, profiling the users and looking at the right applications for those users, and only then considering what the right kind of device is," she added.
"CIOs have two choices. They can put in place policies and [mobile data management] solutions in order to react to these trends, or they can really put together a strategy for end user computing that enables them to pro-actively address them," she added.
However, whichever approach organisations choose, security is one essential component that cannot be overlooked.
Naturally, Dell said it has been listening to customers and addressing their needs with relevant technologies, such as Credant, which the firm acquired late in 2012 for its endpoint encryption services.
Dell has also been attempting to build more consumer appeal into its corporate PCs, while at the same time making consumer kit such as its XPS line more secure and better able to fit into a corporate environment.
"We are still hearing interest from customers for solutions for traditional PCs as well as tablets and smartphones," said Franco.
Ecostress instrument will provide new insights into water usage and plant health on Earth
Chinese cyber espionage group Thrip targeting satellite communications, telecoms and defence companies
Symantec warning over state-sponsored hackers targeting satellite operators' control systems
Letter to House of Commons Treasure Committee explains cause of payments glitch earlier this month
Would you want to live in a world without memes?