Skip to main content
Jun 12, 2013

BYOD? How About CYOD (Choose Your Own Device)?

Businesses have witnessed a dramatic evolution in mobile computing in recent years. Many organizations have transitioned from purchasing and managing mobile devices used by employees (or reimbursing employees after they bought a smartphone or tablet) to a state where staff now elects to bring their own device (BYOD) into the workplace. But what about choose your own device (CYOD)? In a recent article by CIO Australia, Allan Davies, the CIO at Dematic Asia-Pacific and Tim Dillon, associate vice president at IDC, both pointed out how BYOD not only represents a change in how workers are bringing their own mobile devices into the workplace but how this poses additional risk for the enterprise while creating additional work for IT. The good news for IT and LOB professionals is that BYOD doesn't necessarily mean that every personal device that’s brought into the workplace has to be supported by the enterprise. A choose your device (CYOD) plan allows the ability to limit the types of hardware employees can use, allowing them to be easily replaced by the company if something were to happen to the device -- while still enabling employees to use their own if they choose.

CYOD can also imply an organization will have their own corporate infrastructure so employees are not required to use an external device to carry out their work. Both BYOD and CYOD allow employees to use their personal devices to a certain degree, and the most important aspect of mobile management is the administration, deployment, and security of enterprise mobile apps and corporate data which are at the heart of a company’s business operations. That’s why a growing number of companies are opting for mobile application management (MAM) instead of mobile device management (MDM). Mobile application management enables IT to protect enterprise apps and corporate data throughout all phases of the mobile application lifecycle – from development to deployment to app signing to inspection for security flaws and malware – all while leaving personal apps and data on an employee’s device untouched.

Meanwhile, instead of applying mobile device management to lock down an employee’s device and enforcing a command-and-control approach to mobile management, MAM can be used to wipe all enterprise mobile apps and corporate data remotely from a lost or stolen device or when an employee no longer works for a company. MAM enables companies to discretely remove proprietary apps and information from a former employee’s device while leaving their personal apps and data alone.  

Apperian

More from the Blog
Aug 08, 2019

Mind the Gap: Applications Are Your Biggest Weakness

Something Has To Change There has been a lot of talk this year about the need to better protect applications, particularly m ...
Read more
Aug 07, 2019

Here Comes CCPA

Ready Or Not, Here It Comes! As of publication, there are 147 days left until CCPA and SB-327 come into effect.
Read more
Aug 01, 2019

A Wake-up Call to the Financial Services Industry and Legislators: It’s Time to Regulate Mobile Apps

The time for resting on laurels is over.
Read more