Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
ISACA Survey Reveals Growing Acceptance of BYOD in Australia and New Zealand

Global not-for-profit IT association ISACA today released findings from its 2012 IT Risk/Reward Barometer survey. Respondents in Australia and New Zealand report a growing acceptance of “bring your own device” (BYOD) in the workplace, while also acknowledging that they believe the risk still outweighs the benefit.

The IT Risk/Reward Barometer surveyed more than 4,500 IT professionals worldwide about the risks and rewards associated with BYOD and cloud computing, among other topics. When it comes to BYOD, companies in Oceania and Africa tend to allow employees to use their own device for work purposes more than companies in other regions do. In fact, nearly half of responding enterprises in Oceania allow it (48%), while only 28% of European companies do.

Only 22% of respondents in Australia and New Zealand say the benefits—including increased productivity and efficiency and cost reduction—outweigh the risk, while 47% still believe that the risk is greater. Yet despite the dangers, 32% of enterprises still do not have a security policy in place for BYOD.

To help control BYOD risk, enterprises in Australia and New Zealand report having the following security controls in place:

  • Password management system (48%)
  • Remote wipe capability (40%)
  • Encryption (37%)

Nearly 70% of enterprises in Australia and New Zealand allow employees to access social networking sites from a work device, and 72% allow employees to shop online using a work-supplied device.

However, IT professionals report that the following employee activities pose a high risk to the enterprise:

  • Storing work passwords on a personal device (78%)
  • Losing a work-supplied computer or smart phone (67%)
  • Using an online file-sharing service for work documents (63%)
  • Downloading personal files onto a work-supplied device (51%)

“Enterprises in Oceania seem to understand and accept that employees are increasingly using their own devices for work and personal activities,” said Jo Stewart-Rattray, CISA, CISM, CGEIT, CRISC, FACS CP, director of ISACA and director of information security at BRM Holdich. “However, controls need to be in place that include clearly communicated policies and ongoing education that trains employees to help protect both the enterprise and the employees.”

ISACA, a not-for-profit association serving 100,000 IT professionals in 180 countries, provides resources to help enterprises address this challenging issue.

“ISACA recently published Securing Mobile Devices With COBIT 5 to help enterprises address mobile device security, including BYOD,” said Tony Hayes, CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, international vice president of ISACA. “By applying the COBIT framework to mobile device security, enterprises can better plan, implement and maintain comprehensive security for these devices.”

Full survey results are at www.isaca.org/risk-reward-barometer. COBIT 5 is at www.isaca.org/cobit.

About the IT Risk/Reward Barometer

The annual IT Risk/Reward Barometer helps gauge attitudes and organizational behaviors related to the risk and reward associated with the blurring boundaries between personal and work devices (BYOD), cloud computing, and increased enterprise risk related to online employee behavior. It is based on September 2012 online polling of 4,512 ISACA members from 83 countries, including 173 members in Oceania.

About ISACA

With 100,000 constituents in 180 countries, ISACA® (www.isaca.org) is a leading global association for information systems assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. It offers the CISA®, CISM®, CGEIT® and CRISC® designations and the COBIT® framework.

Follow ISACA on Twitter: https://twitter.com/ISACANews

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Cloud Developer Stories
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, ...
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computi...
SYS-CON Events announced today that the "Second Containers & Microservices Expo" will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and en...
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers acr...
In his session at @ThingsExpo, Lee Williams, a producer of the first smartphones and tablets, will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ETwater. ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE