Apple devices are the top choice for enterprise

News

Apple devices are the top choice for enterprise

Jennifer Scott

Enterprises are choosing Apple devices in their corporate environment, despite the growing threat from its rival Google.

This was the finding of a new report from Citrix, which showed that 58% of all the devices enrolled in its enterprise mobility services in the fourth quarter of 2012 were running the iOS mobile operating system (OS).

However, Google’s Android OS was making more of an impact in EMEA than ever before. Its share of enrolments rose by 11% in the region, bringing it up to 36%, while iOS devices fell by 13% to just 53% of the sign-ups.

EMEA also showed the best region for Windows Mobile deployments, showing 21% of the handsets signed up were running this mobile OS.

But in North America, Apple continued to dominate, holding 62% market share to Android’s 35% and Windows’ 3%. In the Asia Pacific region, Windows did not register at all, while iOS ran on 75% of devices to Android’s 25%.

Using such devices on a corporate network does bring risk to the business, however, and Citrix’s report showed the enterprise was taking a more proactive approach to security than ever.

Blacklisting specific applications has become common place in 18% of the organisations who answered the survey, up from just 7% in the previous quarter.

The most common apps to be blacklisted were Angry Birds, Dropbox, Facebook and YouTube. The most trusted apps were Evernote, NitroDesk TouchDown, Google Chrome and Adobe Reader.

“2012 saw a rise in the number of business applications available on alternative platforms, with the large developer following of Android and iOS leading the charge,” said James Stevenson, area vice-president of Northern Europe for Citrix. 

“Consumers have become accustomed to downloading apps like Evernote and Skype - as well as tools for collaboration, social networking and storage - onto their smart phones and tablets with ease and then using them at work.

“This report underlines the growing pressure on IT departments to monitor the complexity of all these proprietary platforms to ensure the business still has some measure of control, or risk complexity, confusion and opening their network to the threat of malicious attack.”


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy