IT pros fret about corporate mobile app security

Three-quarters of IT pros said that they manage mobile employees
Tools

A full 95 percent of IT pros are concerned about the security of corporate apps accessed through mobile devices, according to a survey by Lawless Research on behalf of cloud-based identity and access management (IAM) vendor Symplified.

Around 42 percent of respondents said that they are "very/extremely" concerned about corporate mobile app security, while 36 percent are moderately concerned and 17 percent are "slightly" concerned.

Three-quarters of 63 IT pros surveyed said that they manage mobile employees. "Mobile identity is the next hurdle for enterprises as they tackle BYOD. BYOD is continuing to be a challenge for enterprises. What we are seeing is that there is a convergence around you as a user in the enterprise and your identity with your mobile device," Brian Czarny, vice president of product management at Symplified, tells FierceMobileIT.  

The top five corporate apps accessed through mobile devices are Microsoft Office and Sharepoint, Oracle, Salesforce and SAP, according to the survey.

At the same time, enterprises are increasingly deploying custom-built corporate mobile apps. "You are seeing enterprises bring on mobile development team to build out custom native mobile applications to extend capabilities out to their employees, partners and customers. One of the big challenges that they have, in building those applications themselves or through contractors, is how do they incorporate a means of authenticating, authorizing and controlling access for those users and tying that back into their existing identity systems," explains Czarny.

This is pushing enterprises to look for IAM products that can handle mobile user access. Around 64 percent of respondents said they are moving ahead with an IAM solution. "Decision makers in the enterprise have started to realize the need for IAM. We hear from our customers that this is an area they are looking to tackle very quickly," Czarny notes.

Related Articles:
Mobile workers bypass IT on file sharing
Attackers circumvent security through app store, hardware