Policy, Governance & Security

  • ID: 1867484
  • August 2011
  • Region: Global, United States
  • 21 Pages
1 of 3

The need for wireless policy has never been greater. AOTMP research indicates that wireless expenses represent 35% of total telecom spend, and this percentage will continue to grow for the foreseeable future. Furthermore, with recent increases in the number of Smart Devices containing sensitive company-related information and the number of applications being deployed onto these devices, companies must ensure effective policies are in place in order to deter inappropriate behavior and to avoid potentially damaging consequences. In short, all of these events are driving enterprises to think more broadly about their wireless policies.

More enterprises have a documented wireless policy today. In fact, AOTMP research indicates that 81% of all enterprises have established a formal wireless policy. AOTMP research indicates that enterprises have been able to reduce their wireless expenses, on average, by 21% by establishing a wireless policy along with continuous compliance monitoring and enforcement efforts. Specific policy attributes driving cost reductions in wireless expense include:

- Outlining who is eligible for a wireless device
- Having documented approval processes

Note: Product cover images may vary from those shown
2 of 3

Executive Summary


Policy & Governance


Wireless Policy Best Practice Considerations

Key Findings Summary

Appendix A: Telecom Environment Management Scope

Complete Report Access Options

About the Authors

About AOTMP Research


Table of Figures

Figure 1 Enterprise Wireless Policy Adoption Trend
Figure 3 Company Headquarters
Figure 2 Respondent Title / Role
Figure 4 Company Size
Figure 5 Wireless Policy Adoption Trend – By Industry
Figure 6 Overall Effectiveness of Policy
Figure 7 Frequency of Policy Updates
Figure 8 Group(s) Responsible for Monitoring / Enforcing Policy Compliance
Figure 9 Does Policy Address Employee Liable Devices
Figure 10 Does Policy Address Elements of Security
Figure 11 Does Company Require Password Protection on Devices
Figure 12 Enterprises Accessing Company Proprietary Information via Devices
Figure 13 Enterprises Allowing Access to Customer Information via Devices
Figure 14 Policy Lifecycle Overview
Figure 15 Sample Policy Outline
Figure 16 Policy & Governance Considerations
Figure 17 Security Considerations

Note: Product cover images may vary from those shown
3 of 3
Note: Product cover images may vary from those shown


  • Quick Help: The report will be emailed to you. The report is sent in PDF format. This is an enterprise license, allowing all employees within your organisation access to the product.


If you have a more general question about our products please try our



Our Clients

  • Qualcomm Incorporated
  • Cisco Systems, Inc.
  • Siemens AG
  • Freescale Semiconductor, Inc.
  • Vodafone Group PLC
  • Analog Devices, Inc.