SolarWinds, a provider of powerful and affordable IT management software, released the results of a personal mobile device survey conducted in partnership with Network World.
SolarWinds and Network World surveyed 400 IT professionals about how they are dealing with the Bring Your Own (Mobile) Device trend. Respondents expressed security concerns and IT support challenges. They cited the potential for loss of confidential information; legal issues and regulatory compliance risks; the introduction of malware threats; and the management burden associated with supporting diverse types of devices.
“IT professionals know that the BYOD trend is coming – or has already arrived – and many don’t know how much support or oversight they should provide on personal mobile devices,” said Sanjay Castelino, vice president of product marketing, SolarWinds. “They are trying to build the boat while sailing it, and are learning every day what the implications of BYOD are to their corporate networks.”
With the increased use of mobile devices in the workplace, 44 percent of respondents said they’ve seen an increase in help desk requests, over 40 percent said they’ve experienced an increase in network traffic, and over 15 percent have experienced an increase in security issues.
Over 65 percent said they don’t have the necessary tools in place to manage non-company-issued mobile devices on the network. One respondent noted, “An increase in workload due to a more diverse hardware and software infrastructure,” and another said that the management overhead is so significant that “we needed to outsource mobile device management to keep up with the demand.”
When asked to rate their level of confidence that they know about all of the personal mobile devices with access to the corporate network, over 27 percent said they are not at all confident.
Depending on the company policy, specific devices may be prohibited, devices may have to be approved, or personal devices may be banned altogether.
“Respondents said they’re employing a wide range of vendor tools and security tactics in order to provide safe, productive mobile access to employees,” said Ann Bednarz, associate online news editor, Network World. “Usage policies vary, and many are a work in progress as business priorities shift and access technologies mature. Determining security policies that can be reasonably enforced on personal mobile devices is tricky.”
SolarWinds IT management portfolio includes network management products to help IT professionals manage personal devices on the corporate network. This includes Network Performance Monitor (NPM), NetFlow Traffic Analyzer (NTA) for traffic analysis, Log & Event Manager (LEM) for detection of security issues, and User Device Tracker (UDT) to track the location of users.
The company recently acquired Rove, a mobile IT management vendor, releasing SolarWinds Mobile Admin software.
Hot Topic
The Latest
E-commerce is set to skyrocket with a 9% rise over the next few years ... To thrive in this competitive environment, retailers must identify digital resilience as their top priority. In a world where savvy shoppers expect 24/7 access to online deals and experiences, any unexpected downtime to digital services can lead to significant financial losses, damage to brand reputation, abandoned carts with designer shoes, and additional issues ...
Efficiency is a highly-desirable objective in business ... We're seeing this scenario play out in enterprises around the world as they continue to struggle with infrastructures and remote work models with an eye toward operational efficiencies. In contrast to that goal, a recent Broadcom survey of global IT and network professionals found widespread adoption of these strategies is making the network more complex and hampering observability, leading to uptime, performance and security issues. Let's look more closely at these challenges ...

The pressure on IT teams has never been greater. As data environments grow increasingly complex, resource shortages are emerging as a major obstacle for IT leaders striving to meet the demands of modern infrastructure management ... According to DataStrike's newly released 2025 Data Infrastructure Survey Report, more than half (54%) of IT leaders cite resource limitations as a top challenge, highlighting a growing trend toward outsourcing as a solution ...

Gartner revealed its top strategic predictions for 2025 and beyond. Gartner's top predictions explore how generative AI (GenAI) is affecting areas where most would assume only humans can have lasting impact ...
The adoption of artificial intelligence (AI) is accelerating across the telecoms industry, with 88% of fixed broadband service providers now investigating or trialing AI automation to enhance their fixed broadband services, according to new research from Incognito Software Systems and Omdia ...
AWS is a cloud-based computing platform known for its reliability, scalability, and flexibility. However, as helpful as its comprehensive infrastructure is, disparate elements and numerous siloed components make it difficult for admins to visualize the cloud performance in detail. It requires meticulous monitoring techniques and deep visibility to understand cloud performance and analyze operational efficiency in detail to ensure seamless cloud operations ...
Imagine a future where software, once a complex obstacle, becomes a natural extension of daily workflow — an intuitive, seamless experience that maximizes productivity and efficiency. This future is no longer a distant vision but a reality being crafted by the transformative power of Artificial Intelligence ...
Enterprise data sprawl already challenges companies' ability to protect and back up their data. Much of this information is never fully secured, leaving organizations vulnerable. Now, as GenAI platforms emerge as yet another environment where enterprise data is consumed, transformed, and created, this fragmentation is set to intensify ...

OpenTelemetry (OTel) has revolutionized the way we approach observability by standardizing the collection of telemetry data ... Here are five myths — and truths — to help elevate your OTel integration by harnessing the untapped power of logs ...