User input into device purchases welcomed by IT managers

News by SC Staff

Three-quarters of security and IT managers are seeing an increase in user influence on purchasing decisions.

Three-quarters of security and IT managers are seeing an increase in user influence on purchasing decisions.

As iPhones, netbooks and tablet PCs enter the workplace, more than 60 per cent of IT executives said that users have some input regarding the types of smartphones purchased, 52 per cent said users provide input on or make decisions about netbooks while 50 per cent involve users in tablet decisions.

When it comes to desktops and laptops, users have input into purchasing decisions at 35 per cent and 47 per cent of companies respectively. Just over a quarter of the respondents report their companies currently allow employees to use their own personal computers or mobile devices for work purposes.

However 63 per cent believe that using devices such as netbooks, tablets, smart phones and social media would increase productivity, and the trend to enable users more access to consumer technologies is viewed in a positive light by most respondents.

Following recent reports by Unisys and Sourcefire on how employees are using personal devices for work, the report by RSA found that nearly 60 per cent of respondents said that unauthorised connections to the corporate network still occur, and 23 per cent of the largest organisations surveyed have experienced a serious breach or incident because of a personal device on the corporate network.

Tom Heiser, chief operating officer at RSA, said: “Like it or not, personal and professional computing have collided and the fall out is being felt in enterprises worldwide. User-driven IT has the potential to deliver huge benefits to users and their organisations.

“The companies that figure out how to unleash user know-how and consumer technologies while managing the risks will win this high stakes game. This is the moment for information security teams to step up and be the most valuable players.”


Find this article useful?

Get more great articles like this in your inbox every lunchtime

Video and interviews

Interview - Everyone has an Achilles heel: The new security paradigm

How can we defend networks now that the perimeter has all but disappeared?
Brought to you in partnership with ExtraHop