Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

iOS surpasses Android in BYOD enterprise usage, study says

Twitter grows, Facebook declines, and IE6 use remains steady, according to Zscaler

Article comments

Consumerisation trends in the enterprise shifted dramatically in the first quarter of 2012, with mobile devices running Apple's iOS operating system showing more activity in the workplace than those running Google's Android, as well as end users migrating from Facebook and to Twitter.

Zscaler ThreatlabZ, the research arm of SaaS security provider Zscaler, recently released data based on more than 200 billion first quarter transactions in its cloud, which serves global companies of all sizes. A transaction, as defined by Zscaler ThreatlabZ senior security researcher Mike Geide, occurs every time a file is accessed from a web server.

The data shows transactions originating from iOS devices increased steadily over the quarter, ending March with slightly more than 50% of mobile activity. Transactions from Android devices, meanwhile, dropped to 37% by the end of March. As recently as December 2011, Android and iOS devices were about equal at 47% of transactions among Zscaler's enterprise customers, Geide says, after Android had held the lead for most of 2011.

BlackBerry devices observed in Zscaler's study dropped from about 18% of January transactions to about 15% by the end of March.

Rising consumer use of iPhones and iPads may have contributed to this growth in transactions. Geide says that many of Zscaler's clients set up guest wireless networks, as more companies look to keep personal devices from choking their networks or presenting security risks.

Employees are more likely to connect to guest networks for personal transactions, Geide says. "You don't want to be using your 3G connection to stream Pandora on your iPhone because you're going to be eating a lot of bandwidth and paying Verizon a ton of money," Geide says.

Another contributing factor could be iPhone activity from actual guests using those guest networks. For example, Geide says visitors and patients in hospital waiting rooms are ignoring the magazine rack in favour of their smartphones and tablets connected to the guest network.

"We'll see tons of mobile traffic through that guest network because that's what everybody's doing in the waiting room," Geide says.

Other research has shown the iPhone users are prone to being more active on their smartphones than those using Android devices. Online data analytics firm Chitika monitors smartphone-specific activity on its advertising network, showing that iPhone users accounted for 67% of mobile traffic, while those using Android phones made up 28.7% at time of publishing.

"It is not surprising then that iOS device usage in the enterprise is also growing, from employees using their personal devices at work and from enterprises adopting a BYOD for work policy," Geide says.

While the current free-for-all in enterprise mobility brought on by the growing BYOD trend was reflected in the consistently changing mobile statistics, employee social media use appears to have been affected by increasingly strict enterprise policies.

Zscaler's cloud has seen Facebook transactions decline steadily, from 52.4% of all transactions in its Web Apps category in the first quarter of 2011 to 41.07% in the quarter ending this March. Geide attributes this to companies cracking down on social networking during work. The study shows that the number of organisations blocking access to social networking sites grew from 2.46% of its user base in January to 3.99% in March.

However, Twitter transactions increased from 6.39% to 7.44%. Geide says several factors are contributing to the migration from Facebook to Twitter use in the workplace.

First is the productivity perception enterprise decision makers have of each site. Perhaps because of the additional apps available on Facebook, Twitter is seen as the lesser of two evils, Geide says.

"While Twitter is still under the umbrella of social networks and social media, Twitter itself can, in some ways, be explained as a micro-blog," Geide says. "So it's still a way of exchanging information, where Facebook may have the perception as a platform for potentially goofing off. You can install games and do a variety of things on Facebook that you wouldn't be able to do on Twitter."

Security is another reason, Geide says. Although Twitter has been the source of its share of large-scale malware attacks, it's commonly perceived as a more secure option to Facebook, Geide says.

"There has been a handful of serious security issues that have happened on Twitter, but in general when people talk about social networking and social media threats, the first thing that pops into everybody's minds and the first thing that drums up conversation is usually Facebook," he says.

He added that LinkedIn is also commonly thrown into the conversation surrounding potentially dangerous social networking sites. In the study, transactions on LinkedIn saw a slight decline, from 1.55% to 1.45% over the quarter.

Looking ahead, Geide says he expects the web browser statistics to shift in the next quarter, specifically in regard to Internet Explorer use. While IE8 accounted for far more browser transactions than any other version of Internet Explorer, at about 30%, the number of users running the much more vulnerable IE6 remained steady. Likewise, the outdated IE7 was the second-most common version of Microsoft's browser, accounting for roughly 17% of Internet Explorer transactions.

Some first quarter trends suggest that those running Internet Explorer, which was far and away the most common web browser, are already becoming more secure. The latest version, IE9, saw the largest percentage increase over the quarter, closing out March at nearly 5% of transactions, while IE7 users upgraded to newer versions of the browser at a rate of about 4.8% per month.

Another development that Geide believes will help improve the security outlook is Adobe's decision to push out silent Flash updates. Once plugins can update automatically, one of the largest sources for exploits in the enterprise will be patched, Geide says.

"I think that'll definitely be a step in the right direction," he says. "Right now Adobe Reader and Adobe Flash are among the most popular exploits targeted and the browser exploits that are most heavily used on the web right now."


More from Techworld

More relevant IT news


slgr said: Heyhow about commenting on the data and device security and how that impacted iOS taking over Android in the enterprise

Adam said: To facilitate BYOD businesses must give employees easy but secure access to the organizations applications from various devices including iPads iPhones Android devices and Chromebooks while minimizing the intervention required by IT staff An ideal solution for such a scenario is Ericom AccessNow a pure HTML5 RDP client that enables remote users to connect to any RDP host including Terminal Server RDS Session Host physical desktops or VDI virtual desktops and run their applications and desktops in a browser AccessNow works natively with Chrome Safari Internet Explorer with Chrome Frame plug-in Firefox and any other browser with HTML5 and WebSockets supportAccessNow also provides an optional Secure Gateway component enabling external users to securely connect to internal resources using AccessNow without requiring a VPNFor more info and to download a demo visithttpwwwericomcomhtml5rdNote I work for Ericom

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *