the byod trojan horse: dangerous mobile app behaviors and back-door security risks

1
Percentage of enterprises that will have BYOD Policies within next two years. 7 1 % Percentage of enterprises that say security tops their list of BYOD policy challenges. 61 % Percentage of enterprises reporting that their BYOD policies result in lower enterprise application risk. Percentage of enterprises t hat will have policies to block risky app behaviors within next two years. 6 9 % X 71 % 16 % Percentage of enterprises that have not ident ified which mobile apps are risky. Percentage of enterprises t hat have not ident ified which app behaviors they deem risky. Source: Flexera Software’s 2015 Application Usage and Value Survey, prepared jointly with IDC. 5 5 % THE BYOD TROJAN HORSE Dangerous Mobile App Behaviors and Back-Door Security Risks

Upload: flexera-software

Post on 17-Jul-2015

53 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: The BYOD Trojan Horse: Dangerous Mobile App Behaviors and Back-Door Security Risks

Percentage of enterprises that will have BYOD Policies withinnext two years.

71%

Percentage ofenterprises that say security tops their list of BYOD policy challenges.

61%

Percentage of enterprises report ing that their BYOD policies result in lower enterprise applicat ion risk.

Percentage of enterprises that will have policies to block risky app behaviors within next two years.

69%X 71%

16%

Percentage of enterprises that have not identified which mobile apps are risky.

Percentage of enterprises that have not ident ified which app behaviors they deem risky.

Source: Flexera Software’s 2015 Applicat ion Usage and Value Survey, prepared joint ly with IDC.

55%

THE BYOD TROJAN HORSE Dangerous Mobile App Behaviors

and Back-Door Security Risks