This IDC InfoBrief provides IT and mobility leaders with the latest industry data on trends around mobile device usage, management, security, and the potential threat mobile devices can pose to corporate compliance and data security. It includes IDC primary research surveys, industry market data, and information gathered from interviews with IT/mobility professionals and other resources. At the conclusion there is a mobility decision-maker’s “playbook,” which includes five key takeaways based on IDC research and data, as well as five critical areas of caution for mobility professionals to consider.
Windows PC
Mobile Devices
(Android/iOS/Windows tablets)
Windows Servers
Linux
MacOS
Data was not exfiltrated
Don’t know
Source: IDC’s Worldwide Future Enterprise Resiliency and Spending Survey, Wave 6, June 2024
Some of the most valuable, sensitive, and protected data in an enterprise is accessed and stored on smartphones.
How often does your organization experience the following types of mobile security incidents?
(Percentage of respondents who answered “Frequently” or “Very Frequently”)
SIM-swapping/jacking incidents or misuse of corporate mobile phone numbers
Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024
the use of mobile technology by employees poses a serious risk to corporate data security in my organization.
Most enterprises only check three out of four boxes when completing endpoint management and security.
Mobile Threat Defense
Enterprises with
mobile threat defense deployed
Average of devices with
mobile threat defense installed
Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024
How many endpoint devices do end users in your organization typically use day to day?
1 device
2 device
3 device
Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024
In 2024, more than 50%
of shipped mobile devices were eSIM-enabled
(e.g., accommodated more than one SIM).
Outsourcing mobility management platforms as a service can help
reduce management sprawl and better secure corporate smartphones.
Why does your organization use multiple endpoint management tools?
Various business units or organizational groups use different products for specific device use cases.
Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024
of enterprises have multiple device management tools (three different tools on average).
While fewer than half of business smartphones are managed, fewer than 35% have on-device security, exposing devices and data to cyber-risks.
Apple iOS
Android
Chrome OS
Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024
of IT security/ops professionals view corporate-liable devices as more secure than BYOD.
What tools or methods do you use to set up and provision mobile devices?
Apple iPhones
Android Smartphones
Manual setup by end user
Manual setup by corporate IT
Automated setup via Apple Business Manager
Automated setup/Android Enterprise Zero Touch
Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024
Worldwide IT Ops/Sys Admin
Roles Total Devices
2023-2028
Worldwide xOps
Roles Forecast
2023-2028
Laptops
Worldwide Business Endpoint Growth by Category
(2023-2028 CAGR)
Ability to apply single security and management policies across multiple device types
Consolidated mobility and PC management IT staff for greater operational efficiency
Analytics and data gathered from UEM platforms that improve employee productivity and business operations efficiency
Reduced number of separate software platforms
Increased end-user experience and satisfaction with enterprise devices and software (PC and mobile)
Streamlining of new employee onboarding for device provisioning
Unified/single system for device/IT asset tracking
Unified Endpoint
Management
The Top 3 Most Critical
IT Platforms to Integrate with UEM
Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024
Better Together:
Converge and consolidate all endpoint device management across fewer platforms (i.e., UEM).
Identify critical mobile device use cases for increased management, security, and compliance monitoring.
Pilot and implement AI-based tools to streamline and improve automation of endpoint device management.
Anticipate a future of smaller, leaner IT operations team with fewer system administrators.
Look to partner with service and technology providers who can help secure and extend the device fleet life cycle while offloading administrative burden and helping to cut costs.
Source: IDC’s U.S. Enterprise Endpoint Management Survey, 2024