Dell claims 50 percent of its customers with a bring-your-own-device (BYOD) policy have experienced a security breach.
It said the figures served as a warning that while BYOD can make a business more agile, firms need to ensure they follow a strategy that best meets their individual requirements.
"We would not advise customers to simply let users bring in any device at all," Dell's executive director of End User Computing, Margaret Franco, told V3.
"In fact, what we've found is that customers that have allowed a BYOD policy, that have allowed end users to bring in anything that they want, fifty percent of those companies experienced a security breach," she added.
Instead, companies need to think through their business strategy, and look at which devices and approaches best serve that end, Franco said.
That strategy will differ depending on the customer, their objectives, their current infrastructure, and the security challenges of the kind of data they handle.
"Our approach is to start with an assessment of what [the customer] wants, profiling the users and looking at the right applications for those users, and only then considering what the right kind of device is," she added.
"CIOs have two choices. They can put in place policies and [mobile data management] solutions in order to react to these trends, or they can really put together a strategy for end user computing that enables them to pro-actively address them," she added.
However, whichever approach organisations choose, security is one essential component that cannot be overlooked.
Naturally, Dell said it has been listening to customers and addressing their needs with relevant technologies, such as Credant, which the firm acquired late in 2012 for its endpoint encryption services.
Dell has also been attempting to build more consumer appeal into its corporate PCs, while at the same time making consumer kit such as its XPS line more secure and better able to fit into a corporate environment.
"We are still hearing interest from customers for solutions for traditional PCs as well as tablets and smartphones," said Franco.
Only 35 per cent of IT decision makers regularly review their data formats
One-third of CIOs admit that their organisation has fallen victim to a security breach in the last two years
CIOs warn that companies are losing battle against cyber crime
Government hasn't revealed number of SMBs that have signed up to G-Cloud 9
More fingers of blame pointed at gangs linked to North Korean government