Skip to main content
Jun 12, 2013

BYOD? How About CYOD (Choose Your Own Device)?

Businesses have witnessed a dramatic evolution in mobile computing in recent years. Many organizations have transitioned from purchasing and managing mobile devices used by employees (or reimbursing employees after they bought a smartphone or tablet) to a state where staff now elects to bring their own device (BYOD) into the workplace. But what about choose your own device (CYOD)? In a recent article by CIO Australia, Allan Davies, the CIO at Dematic Asia-Pacific and Tim Dillon, associate vice president at IDC, both pointed out how BYOD not only represents a change in how workers are bringing their own mobile devices into the workplace but how this poses additional risk for the enterprise while creating additional work for IT. The good news for IT and LOB professionals is that BYOD doesn't necessarily mean that every personal device that’s brought into the workplace has to be supported by the enterprise. A choose your device (CYOD) plan allows the ability to limit the types of hardware employees can use, allowing them to be easily replaced by the company if something were to happen to the device -- while still enabling employees to use their own if they choose.

CYOD can also imply an organization will have their own corporate infrastructure so employees are not required to use an external device to carry out their work. Both BYOD and CYOD allow employees to use their personal devices to a certain degree, and the most important aspect of mobile management is the administration, deployment, and security of enterprise mobile apps and corporate data which are at the heart of a company’s business operations. That’s why a growing number of companies are opting for mobile application management (MAM) instead of mobile device management (MDM). Mobile application management enables IT to protect enterprise apps and corporate data throughout all phases of the mobile application lifecycle – from development to deployment to app signing to inspection for security flaws and malware – all while leaving personal apps and data on an employee’s device untouched.

Meanwhile, instead of applying mobile device management to lock down an employee’s device and enforcing a command-and-control approach to mobile management, MAM can be used to wipe all enterprise mobile apps and corporate data remotely from a lost or stolen device or when an employee no longer works for a company. MAM enables companies to discretely remove proprietary apps and information from a former employee’s device while leaving their personal apps and data alone.  


More from the Blog
May 27, 2020

Application Security: Testing is NOT Enough

In the software development world, developers are faced with a breakneck release schedule and tasked to produce applications ...
Read more
Apr 30, 2020

Mobile Application Management: A Forward View

IT Is Adapting in the Midst of the COVID-19 Pandemic The Coronavirus pandemic is a human tragedy, affecting hundreds of thou ...
Read more
Apr 16, 2020

The Next Step in the Arxan Journey

As many of you may have seen, we just announced that w
Read more