Challenges Facing Enterprise
Mobility and Security Teams
of enterprises have had a data breach in the last 12 months.
of enterprises say mobile devices were involved in a security breach.
Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024
Protected PCs, Vulnerable Mobility
Most Enterprises Closely Manage and Secure PC Devices —
Mobile Is Managed But Not as Well Protected
of firms actually protect mobile devices with mobile threat management technology.
Adoption Rate:
95% PC management software
98% PC antimalware
70% Mobile device management
35% Mobile threat management
Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024
More Devices Equals Broader Attack Surface
As Mobile Endpoints Proliferate, There Are
More Opportunities for Breaches and Attacks
How many endpoint devices do end users in your
organization typically use day to day?
1 device
2 devices
3 devices
+4 devices
Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024
Administrators Who Secure/Manage Devices
Are Under Pressure
of firms say they have to manually set up mobile devices such as smartphones and tablets.
By 2028, device installed bases will grow, while the number of IT administrators will decline.
Devices vs. Roles, 2023–2028
Worldwide IT Ops/Sys Admin
Roles Total Devices
Worldwide xOps
Roles Forecast
Preparedness Actions
Mobility Leaders Can Take Now
1
Converge and consolidate allendpoint device management across fewer platforms (i.e., UEM).
2
Identify critical mobile deviceuse cases for increased management, security, and compliance monitoring.
3
Pilot and implementAI-based tools to streamline and improve automation of endpoint device management.
4
Anticipate a future of smaller, leaner IT operations team with fewer system administrators.
5
Look to partner with service and technology providers who can help secure and extend the device fleet life cycle while offloading administrative burden and helping to cut costs.
Five Critical Areas of Caution
Every Mobility Leader
Should Consider
Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024
As breach threats, mobile devices
are as dangerous as PCs:
It is a myth that mobile endpoints are more “inherently secure” than PCs. Unmanaged unsecured mobile device usage can lead to costly security breaches.
Management ≠ security:
UEM alone isn’t enough to secure managed enterprise endpoints. Most organizations do not check the “fourth box” of on-device mobile security.
Device trust is key:
Refurbished devices, such as personal BYOD smartphones,
can open enterprises to unnecessary security risks
(e.g., unwiped/ compromised SIM cards).
Simplifying and consolidating
improve mobile security:
Device management tool sprawl can leave gaps in proper
endpoint configuration and security.
It’s dangerous to go it alone:
It’s important to find trusted technology partners and providers
that understand mobile security and management and can help
fill the unseen gaps in your mobile enterprise infrastructure.
Managing and Securing
the Expanding Mobile Enterprise