IT has traditionally had near complete ownership and control over workplace devices, but as employees increasingly access corporate data and networks using their own smartphones, tablets and other personal devices, IT’s ability to ensure security has lessened significantly.
Just as employees are going to use unauthorised software and applications to complete work tasks as efficiently as possible (what’s known as shadow IT), they’re going to use unauthorised devices if those that are allocated aren’t up to speed. It’s going to happen anyway, so IT is better off attempting to manage the use of personal devices in the workplace than trying to prevent it.
The good news is that IT managers seem to be aware of this trend. As VP of Gartner, David Willis, said, “We're finally reaching the point where IT officially recognises what has always been going on: people use their business' IT devices for non-work purposes. They often use a personal device in business. Once you realise that, you'll understand you need to protect data in another way besides locking down the full device”.
What else is on offer?
In a previous blog we explained how Bring Your Own Device (BYOD) strategies can be used to manage the manage the influx of personal devices in the workplace, but unless you use a cloud solution such as Desktop as a Service (DaaS), these can be fraught with security risks.
Even with the security afforded by the cloud, BYOD isn’t for everyone. Most businesses want to offer employees choice whilst staying within their comfort zone. If it’s your first foray into enterprise mobility, then it’s probably not best to start in the deep end. Organisations in this situation can choose from two alternative models: ‘Company Owned Personally Enabled’ (COPE) and ‘Choose Your Own Device’ (CYOD).
Having an IT Mobility Model
With COPE strategies, employees are supplied a device chosen and paid for by the company, but they are free to use it for personal activities. It’s up to the IT department to decide how much choice and freedom employees get. This is the closest model to the traditional method of device supply, Corporate Owned Business Only (COBO), and the one that gives IT the most control. Rather than trying to create space on a personal device for secure data and device management – as IT would in a BYOD scenario – COPE lets admins create space on a fully managed device for personal use.
The CYOD model, on the other hand, still gives employees the freedom of choice, but narrows the options to a pre-approved list. It’s been labelled ‘the corporatisation of the consumerisation of IT’ and ‘the more manageable BYOD’, since it makes concessions for user choice without IT having to relinquish control.
While COPE is the favourite among larger enterprises due to the level of control, CYOD is the most widely adopted as it strikes a good balance between the needs of employers and employees. One CTO quoted CIO Dive sums it up nicely: “CYOD is … the best of both worlds; a controlled network environment that still offers employees the benefit of a single work or home device of their choice. CYOD is also less of a cultural leap for the organisation, since maintaining ownership of the contract is much closer to the status quo of corporate provision”.
However, for all of its advantages, CYOD is not a failsafe alternative to BYOD. As a CompTIA report states, even when companies ban BYOD in favour of the choice model, “ambitious employees will find ways to utilise personal devices and applications even if they are forbidden”. This is because CYOD shrinks what BYOD is supposed to provide in the first place – freedom to choose which device suits the user best, including devices that are at the forefront of technology. CYOD strategies therefore mean less freedom for employees and may not provide as high satisfaction as a BYOD model would.
The bottom line
BYOD, CYOD and COPE are different methods of addressing consumerisation of technology in the workplace. As they each have their pros and cons, the model you choose will depend on your organisation’s needs. When exploring the options, take into account your organisation’s security needs, budget, resources, and – crucially – the culture and working style, to effectively decide which model is best suited for your enterprise mobility strategy.
To learn more about how you can create better internal IT investments, Download our eBook below!