Companies in every industry have found themselves asking an important question: How should mobility be supported by the organization? As the number of possible connected devices has grown exponentially over the past five years, the dilemma of how to integrate them while remaining secure has become much more complex. Following are three common mobile device program approaches that may help solve the riddle, along with the pros and cons of each.
Bring Your Own Device
Perhaps the most widely known of mobility plans is the bring your own device (BYOD) strategy where the employee is responsible for providing the device to be used.
- Employees pay the hardware cost, so there is no investment for devices
- Workers are happier and more productive when allowed to use a device they prefer
- Quicker integration
- No tasks for the company to perform with a carrier
- BYOD can make it difficult to administer security policies
- Challenging to manage since the device is owned by the employee but accesses company information
- If lost or stolen, the need to neutralize the device can be difficult or create conflict
- Support is more challenging since device types and carriers vary widely
For companies that work with highly sensitive data, the lack of control over a BYOD item may not align with internal policies and standards for security and access.
Choose Your Own Device
Evolving from BYOD programs, choose your own device (CYOD) helps keep costs down while allowing the business to maintain more control. In this scenario, only pre-approved device models are permitted on the network and must be configured by IT before being integrated.
- Employees are still financially responsible for acquiring the device, so organizational hardware costs are reduced
- Easier to manage a known device profile
- If a device is lost or stolen, the company is able to wipe it remotely
- Clear ownership of device data
- More expensive from the company side than BYOD since SIM cards and configuration/security software are involved
- Less satisfaction from an employee perspective
- Responsibility for any repairs must be clearly established
- Longer timeline for deployment than BYOD items
Corporate Owned, Personally Enabled
In corporate owned, personally enabled (COPE) mobility plans, the devices are provided by the company and employees are permitted to use them additionally for personal business. For companies that need greater control and security, this option is preferred.
- Clear ownership of data and hardware
- Total control over security and access
- Full manageability in the event of theft or loss
- Carriers often provide significant discounts on equipment and service plans
- Equipment purchases and repairs may be costly and fall to the company to pay
- Employees may still prefer to have a seperate personal device, and then resent having two devices to manage
- Slow to deploy
- Restricted to a small variety of devices
Each business has a different set of requirements and priorities to consider in constructing a mobility program. Think about security, the need for control, and budget guidelines to help determine the most appropriate method. Be sure that operational practices and policies are adequate to protect sensitive data and costly assets. For more information on establishing an effective mobility management program, contact Copper State today.