The world’s top companies use wandera Learn Why Try Wandera for Free

What’s your business’ mobile maturity? Find out how you stack up

What’s your business’ mobile maturity? Find out how you stack up

1415 685 Michelle Base-Bursey

At Wandera, we’ve encountered thousands of business, ranging in size, scope, industry, and location. When they come to us, all of these organizations have the same concern: their mobile device fleets.

This got us thinking.

To better understand how global organizations view the maturity of their mobile device management and security strategies, along with our partner VMware, we decided to conduct a survey.

Executed by IDG Connect, this initiative allowed us to gain key insights into the various approaches to mobility strategy among UK and US companies.

The matrix

Based on the responses of over 100 senior decision makers with direct responsibility for IT and mobile security management, the survey conducted assessed the varying levels of mobile maturity within organizations, analyzing key indicators such as device protection methods, risk management, content filtering and data usage management.

We plotted the responses on a matrix to better illustrate the stages of mobile maturity present in today’s organizations.

Mobile insights

The major takeaway from this matrix is that 59% of companies are not doing everything they can to ensure the highest level of mobile device management and security.

These organizations, based in the UK and US, do not judge themselves to be pioneers in implementing threat prevention, risk management, data breach mitigation, content filtering, data usage management and centralized administrative control on mobile devices.

It shouldn’t therefore, strike anyone as odd that top organizations continue to fall victim to preventable data breaches, malware outbreaks, and bill shock situations.

Out of all facets of the matrix, the most respondents feel they are at the highest level of maturity when it comes to risk management. But what does risk management really encompass?

The fewest respondents felt they had ‘integrated’ their mobile systems sufficiently. Why is system integration a telling sign of mobile maturity?

For answers to these questions and more, check out the complete whitepaper analysis of the IDG Connect research.

Fleet makeup

This survey also allowed us to gain insight into the mobile device fleet makeup of a wide variety of companies.

Not only were we able to see what mobile OS was dominant over all others from a corporate perspective, but we were able to understand the prevalence of BYOD device management models vs. corporately owned.


Check out the rest of the stats here.


The respondents who contributed to the survey came from both US and UK-based organizations. The number of employees within these companies ranged widely, as did the industries they identified with.

The individual job titles of those who completed the survey also varied, however, a significant proportion (35%) were CIOs, CTOs or CISOs.


For a full breakdown of respondents, look no further than our whitepaper.

How do you measure up?

The results of this research demonstrate a definite progression in businesses’ mobile-focused strategies. It’s clear that worldwide, organizations are beginning to take the management and security of their mobile device fleets more seriously.

The next step for your business is to honestly evaluate your maturity in each area laid out in the matrix.

While you may be further along in certain respects, it’s essential you consider each and every facet on its own, evaluating how advanced your strategy is, as well as what your business can do to move up the spectrum.

To receive a customized report, detailing the mobile maturity of your business (as well as how you measure up to your competition), take the assessment now.

Mobile Maturity Matrix

How does your mobile security strategy measure up? Download this report to find out.

Download now