Skip to main content
Jun 12, 2013

BYOD? How About CYOD (Choose Your Own Device)?

Businesses have witnessed a dramatic evolution in mobile computing in recent years. Many organizations have transitioned from purchasing and managing mobile devices used by employees (or reimbursing employees after they bought a smartphone or tablet) to a state where staff now elects to bring their own device (BYOD) into the workplace. But what about choose your own device (CYOD)? In a recent article by CIO Australia, Allan Davies, the CIO at Dematic Asia-Pacific and Tim Dillon, associate vice president at IDC, both pointed out how BYOD not only represents a change in how workers are bringing their own mobile devices into the workplace but how this poses additional risk for the enterprise while creating additional work for IT. The good news for IT and LOB professionals is that BYOD doesn't necessarily mean that every personal device that’s brought into the workplace has to be supported by the enterprise. A choose your device (CYOD) plan allows the ability to limit the types of hardware employees can use, allowing them to be easily replaced by the company if something were to happen to the device -- while still enabling employees to use their own if they choose. CYOD can also imply an organization will have their own corporate infrastructure so employees are not required to use an external device to carry out their work. Both BYOD and CYOD allow employees to use their personal devices to a certain degree, and the most important aspect of mobile management is the administration, deployment, and security of enterprise mobile apps and corporate data which are at the heart of a company’s business operations. That’s why a growing number of companies are opting for mobile application management (MAM) instead of mobile device management (MDM). Mobile application management enables IT to protect enterprise apps and corporate data throughout all phases of the mobile application lifecycle – from development to deployment to app signing to inspection for security flaws and malware – all while leaving personal apps and data on an employee’s device untouched. Meanwhile, instead of applying mobile device management to lock down an employee’s device and enforcing a command-and-control approach to mobile management, MAM can be used to wipe all enterprise mobile apps and corporate data remotely from a lost or stolen device or when an employee no longer works for a company. MAM enables companies to discretely remove proprietary apps and information from a former employee’s device while leaving their personal apps and data alone.  

Apperian

More from the Blog
Sep 19, 2018

Arr Matey, Hear a Tale about Cyber-Piracy

It’s Talk Like A Pirate Day.
Read more
Sep 18, 2018

The App Is The Endpoint

Traditional Endpoint Security is dead, that is to say that hardening the laptop, desktop, or device is not a panacea. ...
Read more
Aug 29, 2018

Using real-time threat analytics to thwart a serial app attacker

How Arxan helped shut down continuous reverse engineering attacks Operating in the Dark It started after releasing an app u ...
Read more