Tactical Advice

The Mobile Apps Most Commonly Banned (and Allowed) at Work

Fewer businesses than you might think actively blacklist or whitelist iOS or Android applications as part of a BYOD policy.
The Mobile Apps Most Commonly Banned (and Allowed) at Work
Credit: iStockphoto/ThinkStockPhotos

The bring-your-own-device (BYOD) trend has taken over the workplace, and there’s little most businesses can do to stop it, which is why many have given up trying. In a July 2012 survey, 80 percent of respondents said they now allow employees to use their personal notebooks, tablets and smartphones at work. That’s up from a mere 10 percent just five years ago.

Done right, the implementation of a BYOD policy can result in significant savings. Done wrong — without proper security, privacy, legal and management practices in place — it could be a disaster. One way a few employers are minimizing the risk of employee-owned devices in the office: blacklisting and whitelisting certain apps.

A recent TabTimes article highlights a report from Fiberlink, the company behind the MaaS360 mobile device management (MDM) solution, which analyzed data from more than 2 million smartphones and tablets managed by its MDM solution. The company released its findings last week, shedding some light on which apps are being banned and which are being allowed.

As you can see below, the iOS and Android blacklists overlap quite a bit, with both including all-time favorites such as Angry Birds, Dropbox and Netflix.

Top 10 Blacklisted Apps: iOS Devices

  1. Dropbox
  2. SugarSync
  3. Box.net
  4. Facebook
  5. Google Drive
  6. Pandora
  7. SkyDrive
  8. Angry Birds
  9. Hoccer
  10. Netflix

Top 10 Blacklisted Apps: Android Devices

  1. Dropbox
  2. Facebook
  3. Netflix
  4. Google+
  5. Angry Birds
  6. Google Play Movies & TV
  7. Google Play Books
  8. SugarSync
  9. Google Play Music
  10. Google+ Hangouts

Oddly enough, Dropbox, along with a few other apps, appears on both whitelisted and blacklisted apps.

“This shows that while some companies see Dropbox as being a threat, other[s] embrace it,” opines ZDNet’s Adrian Kingsley-Hughes in a post about the Fiberlink report. “Outside the top 10, this is likely to be the case for most apps, as companies tailor the blacklists and whitelists to their specific needs.”

Top 10 Whitelisted Apps: iOS Devices

  1. iBooks
  2. Adobe Reader
  3. Google
  4. Citrix Receiver
  5. Numbers
  6. Dropbox
  7. Pages
  8. itunes U
  9. Keynote
  10. WebEx

Top 10 Whitelisted Apps: Android Devices

  1. NITDroid
  2. Adobe Reader
  3. Lookout
  4. Google
  5. Skype
  6. Citrix Receiver
  7. Android Translator
  8. Antivirus
  9. ZXing
  10. Google Maps

Perhaps the most interesting Fiberlink finding is just how few businesses actually create blacklists and whitelists of apps when implementing a BYOD policy in the first place. For iOS devices, the number is only 10 percent; for Android-run smartphones and tablets it’s less than 5 percent.

MaaS360 customers in manufacturing and service industries are most likely to blacklist apps, according to the report. By contrast, those in consumer/retail and service industries create the most whitelists. For businesses that practice blacklisting, the number of banned apps averages five for iOS devices and seven for Android devices; that’s far fewer than the 16 iOS apps and 10 Android apps whitelisted on average.

Say Hello to MAMmy

Mobile application management (MAM) encompasses the process of controlling employee access to internally and externally developed apps. With over a million apps available to employees for download to their tablets and smartphones, MAM has become an important component of any good mobile device management (MDM) solution in the BYOD — and, by extension, the bring-your-own-application (BYOA) — age.

According to Gartner, a partial solution to the problem of BYOA is the growing trend of companies operating their own app stores, from which employees can download and install corporate-sanctioned apps onto personal computers and mobile devices. Gartner estimates that by 2017, 25 percent of companies will operate their own app stores.

"Apps downloaded from public app stores for mobile devices disrupt IT security, application and procurement strategies," says Gartner vice president of research Ian Finley. "Bring your own application has become as important as bring your own device in the development of a comprehensive mobile strategy.”

These app stores will succeed only “if IT security, application, procurement and sourcing professionals can work together. . . . When successful, they can increase the value delivered by the application portfolio and reduce the associated risks, license fees and administration expenses,” Finely adds.

Sign up for our e-newsletter

About the Author

James Alan Miller

James is a veteran technology journalist with many years’ experience creating and developing magazine and online content. He is passionate about mobile tech, music and running — when the stars align.  Follow him on Google+ and Twitter:


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.