Mobile Device Management: Enterprises Risk Falling Behind as Fleets Grow, Study Finds 

IDCBLOG

The corporate mobility paradox is more evident than ever: mobile is essential for business, but managing and securing it has never been more complex. So much so, that 100% of companies recently surveyed by Tangoe said they’re struggling to manage their fleets effectively.  

Mobility is meant to drive efficiency, yet growing fleet complexity is slowing organizations down. IDC unpacks this in its Mobile Device Management (MDM) research, uncovering the latest challenges, trends, and critical actions mobility leaders need to take to secure, simplify, and reposition for success. If your organization is navigating the complexities of mobile expansion, tighter IT resources, and growing risks, this is a must-have resource.   

Want the full report? Check it out here: Managing and Securing the Expanding Mobile Enterprise. 

Devices Are Multiplying, but IT is Shrinking  

Between the surge of hybrid and remote work and the explosion of IoT devices, enterprise mobility has reached new heights. IDC’s data echoes that momentum: over 60% of workers now use two or more devices to do their jobs. This won’t slow anytime soon, with one analysis projecting the number of connected devices worldwide will nearly double by 2029.   

But while devices multiply, IT resources are shrinking. IDC projects that xOps and system admin roles will drop 11% by 2028, even as the number of devices per IT professional grows by over 40%. This is a dangerous imbalance. Device growth + leaner IT teams = potentially crippling operational strain and security gaps.     

Mobile Endpoints Are Just as Vulnerable – if Not More So – Than Traditional Devices  

Roughly 60% of companies agree that employee use of mobile technology poses a serious risk to corporate data security, especially when part of a BYOD program. That shouldn’t come as a surprise in a world where work happens anywhere, across multiple devices, and often outside the purview of IT. It should, however, serve as a sober reminder of the reality of mobile risk. Some of the most valuable, sensitive, and protected data in an enterprise is accessed and stored on smartphones.   

Over 80% of companies plan to modify their mobile ownership strategy to address evolving business requirements. Learn how Tangoe’s one-time tech refresh services help shift from BYOD fast and efficiently.  

The frequency with which these risks occur should light a fire under IT leaders to batten down the hatches. A significant number of companies report regular mobile security incidents, from SIM-swapping and spoofed Wi-Fi to lost devices, mobile phishing, and app-based data leaks (employees today use twice as many apps as they did just five years ago, making Mobile Application Management and Mobile Endpoint Security more important than ever).  

Without strong, proactive management, data is bound to get out. In nearly 75% of cases, organizations reported that either valuable, sensitive data or less sensitive but still confidential data was accessed during their most recent security breach. Only 23% said no data was taken. This underscores the need for full visibility into every device, its security posture, and where it fits in the broader enterprise ecosystem.  

Tool Overload, Limited Automation, and End Users Handling IT Tasks 

Enterprises are investing in more tools than ever, yet still relying on outdated processes that introduce risk, inconsistency, and unnecessary complexity. Nearly 45% juggle multiple device management platforms – often three or more – due to varying device types, team preferences, or legacy systems from M&A activity.  

IDC also found that more than half of Apple and Android smartphones are set up and provisioned manually by employees. This may seem like a simple shortcut, but it can end up seriously compromising security, consistency, and control – the exact things IT needs to protect. Automation delivers a win-win, ensuring security and consistency at scale while giving IT time back to focus on bigger priorities. 

Most Enterprises Don’t Check All the Boxes for Complete Endpoint Management & Security 

MDM and Unified Endpoint Management (UEM) create a powerful foundation for managing and securing corporate fleets – bringing control, visibility, and automation under one roof – but they’re only part of the picture.   

IDC found that: 

  • Less than one-third of organizations have implemented on-device security (security measures that are built into and operate directly on the device).  
  • On average, only 27% of devices have Mobile Threat Defense (MTD) installed.  
  • 75% of enterprises have adopted UEM to simplify control across their expanding fleets, but less than half have integrated UEM with other core IT platforms like identity and access management (IAM) systems, IT asset management systems, and endpoint security tools.  

These integrations are critical for ensuring the most comprehensive mobile security framework (ex: integrating with IAM systems like Microsoft Entra and Okta ensure that UEM can support policies based on identity and user roles, effectively ensuring a Zero Trust security model). 

Take A Mobile Gut Check   

Are you working twice as hard to do what automation could handle in seconds? Are your end-users doing IT’s job? Are you reacting, or being proactive? There’s so much more IDC’s report covers, including: 

  • A Preparedness Playbook with five key actions to future-proof your mobility strategy 
  • Five critical cautions every IT and mobility leader should know 
  • Even more data-backed insights and strategic shifts you can’t afford to ignore 

Psst…one of IDC’s five key actions is to find a trusted partner. With 14M+ devices under management, 400+ carrier integrations, and a leading team of mobile tech consultants, Tangoe knows what it takes to simplify, secure, and scale corporate fleets. Request a demo for more information about Tangoe’s MMS capabilities and the expert support of the Tangoe Advisory Services team.  

The research is in – now, it’s your move. See how your mobile strategy stacks up and sharpen your next steps with IDC’s report and playbook.