Centrify finds Apple BYODs are liabilities

Centrify Corporation, the leader in securing identities from cyberthreats, today announced findings from a recent survey it commissioned to determine penetration and security compliance of Apple devices in the workplace. Conducted by Dimensional Research, the Centrify Apple survey demonstrates that while people widely use Apple devices for work, lack of security and management of those devices exposes companies to significant liabilities.

Of the total 2,249 US workers surveyed, nearly half (45 per cent) use at least one Apple device for work purposes. In addition:

  • A majority of those Apple devices (63 per cent) are owned by the user as opposed to the company and are used to access work email, corporate documents and business applications
  • 59 percent of Macs are used to access confidential company information
  • 65 per cent of Macs are used to access sensitive or regulated customer information
  • 51 per cent of iPhones in the workplace are used to gain access to business applications
  • 58 per cent of iPads in the workplace are used to gain access to business applications

However, despite the popularity of Apple devices in the workplace, businesses do not invest enough resources to secure or manage them.

  • Over half (51 per cent) of all devices are secured by a password that is merely a single word or a series of numbers
  • Most devices (58 per cent) also do not have software installed to enforce strong passwords
  • More than half (56 per cent) of users report sharing their passwords with others
  • Only 17 per cent of Apple devices have a company-supplied password manager
  • Only 28 per cent of Apple devices have company-provided device management solutions installed
  • Only 35 per cent of Apple devices have encryption of stored data enforced by their company

Ultimately there is no discernable correlation between password strength and sensitivity of information accessed or accessible from a particular device or user

[quote_box_center]

“Centrify’s Apple survey spotlights the massive exposures that occur when devices do not comply with standard corporate security policies,” said Bill Mann, senior vice president of products and marketing, Centrify. “In particular, customer data represents a huge liability. Disclosure of regulated information such as healthcare records could expose corporations to fines and other legal action. Most importantly, there are solutions on the market today that can handily secure Apple devices without sacrificing user productivity. It’s time for IT to take action.”

[/quote_box_center]

Centrify provides the only fully integrated enterprise solution for Apple users, devices and applications across existing corporate networks and beyond. Whether Apple device users work inside or outside of the corporate firewall, Centrify provides all of the capabilities necessary to keep them secure and productive.

Centrify integrates comprehensive mobile & Mac management with Identity and Access management. Unlike standalone Enterprise Mobile Management vendors, who can only do device management and push applications to devices, Centrify integrates the ability to secure and manage devices with the identity policy required to manage app access, across devices. The ability to combine the device’s security posture and location with a user’s role to make application access decisions is unique to Centrify.

For more information about Centrify’s modern approach to Apple identity management, device management and application management, please visit www.centrify.com/apple.

+ posts

Meet Stella

Newsletter

Related articles

The Rise of Smart Vending Machines

Smart vending machines are delivering more accessible solutions to the modern workforce by delivering replacement IT items quickly and efficiently.

Designated Driver: Why Complex Technology Environments Require a Steady Hand

While the function of monitoring software is to provide configuration and compliance assurance, in achieving these tasks, typically the solution will actually deliver much more than this.

Building the Business Case for Satellite IoT 

The door is open for SIs across the world to build on the knowledge gained over the last few years,

Using Cloud To Avoid Bloated Business Models

With the right approach, cloud computing can bring huge benefits, helping businesses become resilient, so they can adapt to any unexpected market disruptors now and in the future. Now, the promise of cloud is as strong as it has ever been.

Elevating healthcare services with cloud computing

The cloud is enabling healthcare to evolve and is helping to address the challenges of budgets, manpower and other resource shortages while treatment and expectations grow exponentially.

Subscribe to our Newsletter