IDC

Managing and Securing
The Expanding Mobile Enterprise

What’s at Stake When Sensitive Corporate Data Goes Mobile

Challenges Facing Enterprise
Mobility and Security Teams

of enterprises have had a data breach in the last 12 months.

of enterprises say mobile devices were involved in a security breach.

Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024

Protected PCs, Vulnerable Mobility

Most Enterprises Closely Manage and Secure PC Devices — Mobile Is Managed But Not as Well Protected

of firms actually protect mobile devices with mobile threat management technology.

Adoption Rate:

95%
PC management software

98%
PC antimalware

70%
Mobile device management

35%
Mobile threat management

Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024

More Devices Equals Broader Attack Surface

As Mobile Endpoints Proliferate, There Are More Opportunities for Breaches and Attacks

How many endpoint devices do end users in your organization typically use day to day?

1 device
2 devices

3 devices

+4 devices

Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024

Administrators Who Secure/Manage Devices Are Under Pressure

of firms say they have to manually set up mobile devices such as smartphones and tablets.

By 2028, device installed bases
will grow, while the number of
IT administrators will decline.

Devices vs. Roles, 2023–2028

Worldwide IT Ops/Sys Admin Roles Total Devices

Worldwide xOps Roles Forecast

Preparedness Actions
Mobility Leaders Can Take Now

1

Converge and consolidate all endpoint device management across fewer platforms (i.e., UEM).

2

Identify critical mobile device use cases for increased management, security, and compliance monitoring.

3

Pilot and implement AI-based tools to streamline and improve automation of endpoint device management.

4

Anticipate a future of smaller, leaner IT operations team with fewer system administrators.

5

Look to partner with service and technology providers who can help secure and extend the device fleet life cycle while offloading administrative burden and helping to cut costs.

Five Critical Areas of Caution
Every Mobility Leader Should Consider

Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024

As breach threats, mobile devices are as dangerous as PCs:

It is a myth that mobile endpoints are more “inherently secure” than PCs. Unmanaged unsecured mobile device usage can lead to costly security breaches.

Management ≠ security:

UEM alone isn’t enough to secure managed enterprise endpoints. Most organizations do not check the “fourth box” of on-device mobile security.

Device trust is key:

Refurbished devices, such as personal BYOD smartphones, can open enterprises to unnecessary security risks (e.g., unwiped/ compromised SIM cards).

Simplifying and consolidating improve mobile security:

Device management tool sprawl can leave gaps in proper endpoint configuration and security.

It’s dangerous to go it alone:

It’s important to find trusted technology partners and providers that understand mobile security and management and can help fill the unseen gaps in your mobile enterprise infrastructure.
IDC

Managing and Securing
the Expanding Mobile Enterprise