fbpx
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Bringing Your Own Apple Device and Developing a BYOD Policy

windchill features best plm software
Written by Mike Solinap
Published on September 23, 2014

In today’s world, everyone has a mobile device; cell phones, tablets, or a hybrid of the two. In a blog post published on ZDNet in June 2014, Dimensional Research conducted a survey of more than 300 IT leaders, and concluded specifically Apple’s enterprise presence is only growing stronger.

To paint a visual picture the survey reports the following:

  • “60% of respondents support more than 100 Apple devices
  • 29% support 100 to 500 Apple devices
  • In 2011, 67% of companies said that Apple accounted for less than 10% of user devices. In 2014, 68% of companies reporting Apple devices are more than 10 percent of the total
  • 35% of companies say Apple represents 25% or more of user devices
  • User preferences was the primary business reason for supporting Apple
  • 68% of companies expect that Apple devices will increase about 35% over the next 3 years”

Now, what does this mean for businesses in the Enterprise, especially in light of Apple’s recent “celebrity iCloud leak” and “compromised iCloud accounts?” To put it bluntly, CTOs and CIOs must consider security policies at a much higher level than ever before.

Mobile devices of any kind are going to be vulnerable to hackers and, as such, are insecure. This means any data stored on the devices or on the servers for said devices (iCloud, for example) are in a compromising position and are susceptible to theft. From a business perspective, it would be in the best interest of the CIOs and CTOs to ensure necessary security policies are in place to mitigate any kind of sensitive data leaks.

Next Steps:

Latest White Papers

A Field Guide to Threat Vectors in the Software Supply Chain

A Field Guide to Threat Vectors in the Software Supply Chain

The software supply chain is made up of many integrated parts, people, and processes. The components range from tools and configurations to code libraries and systems. These components’ goals are developing and delivering software. Unfortunately, risks are high due to...

Related Resources

The Future of Data Engineering in 2024

The Future of Data Engineering in 2024

“Data engineering is the unsung hero of data science, the foundation upon which great data analysis is built.”Everyone in the computer science field is familiar with the phrase, “garbage in, garbage out.” This phrase encapsulates the importance of what goes on behind...

The Business Case for Moving from ENOVIA to Windchill PLM

The Business Case for Moving from ENOVIA to Windchill PLM

With many PLM solutions on the market, it can be difficult to know which is best for your business needs. Dassault Systèmes’ ENOVIA is a popular choice as it is part of their 3DExperience platform. ENOVIA has the same goal as every PLM software which is to manage a...

A Detailed Comparison of PTC Windchill and Siemens Teamcenter

A Detailed Comparison of PTC Windchill and Siemens Teamcenter

Two of the most common enterprise PLM software on the market are PTC Windchill and Siemens Teamcenter  These product lifecycle management solutions have many similarities, but there are a few key differences that may be deciding factors in choosing one. At SPK, we...