Ornamental dots. Two rows of three dots. The top row is a light blue. The bottom row is one light blue dot followed by two orange dots. Press

New Survey Finds that 78 Percent of IT Security Professionals Believe Network Access Control is an Essential Function to Protect Enterprises from Mobile Device Risks

Security Teams Want Unified Policy Control for Mobile Devices and PCs in Their Network

Download PDF

Cupertino, Calif. — February 21, 2012Forescout Technologies, a leading provider of research services, found that 78 percent of IT security professionals believe that network access control (NAC) is an essential function to protect enterprises from mobile device risks and that enterprises want unified policy controls to manage security risks for both mobile devices and PCs.

The research, which focused on mobile device management and mobile security, was completed in January 2012 and sponsored by Forescout Technologies, Inc., a leading provider of automated security control solutions for Fortune 1000 enterprises and government organizations.  The mobile security study surveyed 365 North American IT security professionals in companies having 1,000 employees or more.  The findings present greater insight into how IT security professionals are influencing mobile device management (MDM) purchases and their perceptions of mobile security risks.  Of those surveyed:

  • 88% would either be the “purchaser” or the “purchase recommender” for an MDM tool.  This suggests that the same people who make network and information security decisions will also be making MDM decisions.
  • 68% are concerned about mobile security risks associated with mobile devices accessing corporate resources.  The majority of concerns center on:  data loss (26%), malware (23%), unauthorized users and devices (14%) and intrusions (13%).
  • 78% believe that network access control is an essential feature for mobile security. While inventory management, software management, and security management were deemed as important and essential, the means to enforce security policies based on identity, device, configuration, security posture and network activity are also considered crucial features for mobile security, capabilities available from NAC tools that are incomplete in MDM tools.
  • 96% want unified security policy management for both mobile devices and PCs, reinforcing the need for a layered approach for managed and unmanaged handhelds and PCs in the enterprise.

“IT professionals see many of the same security risks in mobile devices such as smartphones that have long been a concern for laptops and notebook computers.   Device mobility, wireless access, personal applications and the high risk of lost or stolen handhelds creates a need for added defenses against data loss, unauthorized access and malware,” said Paul McClanahan, research analyst and partner at the Boston Research Group.  “The study also showed that IT security teams are well involved in MDM purchase and implementation decisions.”

Security teams want the same endpoint intelligence, security assessment and enforcement options for mobile devices as they have for PCs, and they want it all managed from one operating console.  Forescout today introduced Forescout Mobile to meet these requirements by delivering the industry’s first unified approach for NAC, BYOD and MDM. By combining Forescout Mobile with MDM, enterprises see every mobile device that connects to the network and enforce uniform network security policies on all devices, functionality that does not exist in standalone MDMs.

Forescout’s market-leading NAC solution, Forescout CounterACT, identifies mobile devices, forces unknown users to register, and can automatically allow, deny or restrict access to specified network resources.  From the same console, Forescout Mobile offers additional functionality by providing handheld-specific security options and MDM integration. With Forescout Mobile, security professionals gain comprehensive mobile security at their fingertips and IT organizations can accelerate Bring Your Own Device (BYOD) adoption while managing mobile security risks.

About Boston Research Group

Founded in 1987, Boston Research Group specializes in providing research services to firms involved in high technology, consumer technology, financial services, insurance and health care.  Leveraging sophisticated tools, statistical and analytical mechanisms and proven techniques, the company offers tailored research to suit each industry and client’s unique research requirements.  This focused approach allows Boston Research Group to develop and maintain a high level of market knowledge and related experience in these industries.  For more information visit www.bostonresearchgroup.com.


About Forescout Technologies, Inc.
Forescout enables its customers to unleash the full power of their network through enterprise-class security and control.  Forescout’s automated solutions for network access control, mobile security, endpoint compliance and threat prevention empower organizations to gain access agility while preempting risks and eliminating remediation costs.  Because Forescout security solutions are easy to deploy, unobtrusive, intelligent and scalable, they have been chosen by more than 1,000 of the world’s most secure enterprises and military installations for global deployments spanning 37 countries.  Headquartered in Cupertino, California, Forescout delivers its solutions through its network of authorized partners worldwide.  Learn more at by visiting www.forescout.com.


The BRG mobile security study, sponsored by Forescout, was comprised of a survey of 365 North American IT security professionals in companies having 1,000 employees or more.   It was conducted and completed in January 2012.  Any use of the survey findings within this Boston Research Group 2012 study is allowed providing full public source reference to Boston Research Group, and the sponsor, Forescout Technologies, Inc.

Forescout Technologies, Inc. is a privately held Delaware corporation.  Forescout, the Forescout logo, CounterACT and ActiveResponse are trademarks of Forescout.  Other names mentioned may be trademarks of their respective owners.

Demo Request Forescout Platform Top of Page