Tactical Advice

The Mobile Apps Most Commonly Banned (and Allowed) at Work

Fewer businesses than you might think actively blacklist or whitelist iOS or Android applications as part of a BYOD policy.
The Mobile Apps Most Commonly Banned (and Allowed) at Work
Credit: iStockphoto/ThinkStockPhotos

The bring-your-own-device (BYOD) trend has taken over the workplace, and there’s little most businesses can do to stop it, which is why many have given up trying. In a July 2012 survey, 80 percent of respondents said they now allow employees to use their personal notebooks, tablets and smartphones at work. That’s up from a mere 10 percent just five years ago.

Done right, the implementation of a BYOD policy can result in significant savings. Done wrong — without proper security, privacy, legal and management practices in place — it could be a disaster. One way a few employers are minimizing the risk of employee-owned devices in the office: blacklisting and whitelisting certain apps.

A recent TabTimes article highlights a report from Fiberlink, the company behind the MaaS360 mobile device management (MDM) solution, which analyzed data from more than 2 million smartphones and tablets managed by its MDM solution. The company released its findings last week, shedding some light on which apps are being banned and which are being allowed.

As you can see below, the iOS and Android blacklists overlap quite a bit, with both including all-time favorites such as Angry Birds, Dropbox and Netflix.

Top 10 Blacklisted Apps: iOS Devices

  1. Dropbox
  2. SugarSync
  3. Box.net
  4. Facebook
  5. Google Drive
  6. Pandora
  7. SkyDrive
  8. Angry Birds
  9. Hoccer
  10. Netflix

Top 10 Blacklisted Apps: Android Devices

  1. Dropbox
  2. Facebook
  3. Netflix
  4. Google+
  5. Angry Birds
  6. Google Play Movies & TV
  7. Google Play Books
  8. SugarSync
  9. Google Play Music
  10. Google+ Hangouts

Oddly enough, Dropbox, along with a few other apps, appears on both whitelisted and blacklisted apps.

“This shows that while some companies see Dropbox as being a threat, other[s] embrace it,” opines ZDNet’s Adrian Kingsley-Hughes in a post about the Fiberlink report. “Outside the top 10, this is likely to be the case for most apps, as companies tailor the blacklists and whitelists to their specific needs.”

Top 10 Whitelisted Apps: iOS Devices

  1. iBooks
  2. Adobe Reader
  3. Google
  4. Citrix Receiver
  5. Numbers
  6. Dropbox
  7. Pages
  8. itunes U
  9. Keynote
  10. WebEx

Top 10 Whitelisted Apps: Android Devices

  1. NITDroid
  2. Adobe Reader
  3. Lookout
  4. Google
  5. Skype
  6. Citrix Receiver
  7. Android Translator
  8. Antivirus
  9. ZXing
  10. Google Maps

Perhaps the most interesting Fiberlink finding is just how few businesses actually create blacklists and whitelists of apps when implementing a BYOD policy in the first place. For iOS devices, the number is only 10 percent; for Android-run smartphones and tablets it’s less than 5 percent.

MaaS360 customers in manufacturing and service industries are most likely to blacklist apps, according to the report. By contrast, those in consumer/retail and service industries create the most whitelists. For businesses that practice blacklisting, the number of banned apps averages five for iOS devices and seven for Android devices; that’s far fewer than the 16 iOS apps and 10 Android apps whitelisted on average.

Say Hello to MAMmy

Mobile application management (MAM) encompasses the process of controlling employee access to internally and externally developed apps. With over a million apps available to employees for download to their tablets and smartphones, MAM has become an important component of any good mobile device management (MDM) solution in the BYOD — and, by extension, the bring-your-own-application (BYOA) — age.

According to Gartner, a partial solution to the problem of BYOA is the growing trend of companies operating their own app stores, from which employees can download and install corporate-sanctioned apps onto personal computers and mobile devices. Gartner estimates that by 2017, 25 percent of companies will operate their own app stores.

"Apps downloaded from public app stores for mobile devices disrupt IT security, application and procurement strategies," says Gartner vice president of research Ian Finley. "Bring your own application has become as important as bring your own device in the development of a comprehensive mobile strategy.”

These app stores will succeed only “if IT security, application, procurement and sourcing professionals can work together. . . . When successful, they can increase the value delivered by the application portfolio and reduce the associated risks, license fees and administration expenses,” Finely adds.

Sign up for our e-newsletter

About the Author

James Alan Miller

James is a veteran technology journalist with many years’ experience creating and developing magazine and online content. He is passionate about mobile tech, music and running — when the stars align.  Follow him on Google+ and Twitter:

Security

Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
Tools to Maintain Mobile Sec... |
Far-flung devices pose serious challenges, but a variety of technologies can help protect...
Edward Snowden Personifies t... |
The NSA leak shows critical areas where organizations can better protect their data.

Storage

The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

The Value of Converged Infra... |
Improvements in security, management and efficiency are just a few of the benefits CI can...
Curse Builds a Private Cloud... |
One of the top resources in online gaming builds out a robust infrastructure that can...
SDN at the Forefront of HP’s... |
Computing giant kicks off Interop 2014 with a series of announcements aimed at turning...

Networking

Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Hardware & Software

Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
The Tools That Power Busines... |
Ever-evolving analytic software can greatly improve financial institutions’ decision-...
XP-iration Date: Today Is th... |
It’s officially lights out for Windows XP as an operating system. Here’s how the world is...