Categories: Insights

What’s your business’ mobile maturity? Find out how you stack up

At Wandera, we’ve encountered thousands of business, ranging in size, scope, industry, and location. When they come to us, all of these organizations have the same concern: their mobile device fleets.

This got us thinking.

To better understand how global organizations view the maturity of their mobile device management and security strategies, along with our partner VMware, we decided to conduct a survey.

Executed by IDG Connect, this initiative allowed us to gain key insights into the various approaches to mobility strategy among UK and US companies.

The matrix

Based on the responses of over 100 senior decision makers with direct responsibility for IT and mobile security management, the survey conducted assessed the varying levels of mobile maturity within organizations, analyzing key indicators such as device protection methods, risk management, content filtering and data usage management.

We plotted the responses on a matrix to better illustrate the stages of mobile maturity present in today’s organizations.

Mobile insights

The major takeaway from this matrix is that 59% of companies are not doing everything they can to ensure the highest level of mobile device management and security.

These organizations, based in the UK and US, do not judge themselves to be pioneers in implementing threat prevention, risk management, data breach mitigation, content filtering, data usage management and centralized administrative control on mobile devices.

It shouldn’t therefore, strike anyone as odd that top organizations continue to fall victim to preventable data breaches, malware outbreaks, and bill shock situations.

Out of all facets of the matrix, the most respondents feel they are at the highest level of maturity when it comes to risk management. But what does risk management really encompass?

The fewest respondents felt they had ‘integrated’ their mobile systems sufficiently. Why is system integration a telling sign of mobile maturity?

For answers to these questions and more, check out the complete whitepaper analysis of the IDG Connect research.

Fleet makeup

This survey also allowed us to gain insight into the mobile device fleet makeup of a wide variety of companies.

Not only were we able to see what mobile OS was dominant over all others from a corporate perspective, but we were able to understand the prevalence of BYOD device management models vs. corporately owned.

Check out the rest of the stats here.


The respondents who contributed to the survey came from both US and UK-based organizations. The number of employees within these companies ranged widely, as did the industries they identified with.

The individual job titles of those who completed the survey also varied, however, a significant proportion (35%) were CIOs, CTOs or CISOs.

For a full breakdown of respondents, look no further than our whitepaper.

How do you measure up?

The results of this research demonstrate a definite progression in businesses’ mobile-focused strategies. It’s clear that worldwide, organizations are beginning to take the management and security of their mobile device fleets more seriously.

The next step for your business is to honestly evaluate your maturity in each area laid out in the matrix.

While you may be further along in certain respects, it’s essential you consider each and every facet on its own, evaluating how advanced your strategy is, as well as what your business can do to move up the spectrum.

To receive a customized report, detailing the mobile maturity of your business (as well as how you measure up to your competition), take the assessment now.

Mobile Maturity Matrix

How does your mobile security strategy measure up? Download this report to find out.

Download now

Michelle Base-Bursey

Published by
Michelle Base-Bursey
Tags: content filteringdata managemententerprise mobility managementIDG Connectmobilemobile maturitymobile securityVMware

Recent Posts

Types of Phishing Attacks: There’s Plenty of Phish in the Sea

What is phishing? A phishing attack is a simple yet effective attack technique, which can provide the perpetrators with a…

4 days ago

Product update: big new updates to the Wandera mobile app

Some product updates are hard to define. Is it a new feature? Does it need a name? When it comes…

2 weeks ago

4 ways hackers are infiltrating phones with malware on Android phones

It’s not hard to tell if your desktop computer is infected with malware - it might slow down, ads or…

3 weeks ago

Product update: Enhanced App Insights

We’ve come a long way since Apple coined, and relentlessly promoted, its famous ‘there’s an app for that’ tagline. In…

4 weeks ago

Your GDPR action plan for mobile

If recent events have taught us anything, it’s that when it comes to organizations handling data, consumer distrust is at…

4 weeks ago

Three things to consider before signing up to a data pool plan

Mobile data pools are a cost-efficient option especially for large organizations with many corporate mobile devices. Having a single bill…

4 weeks ago