Best Practices to Make BYOD, CYOD and COPE Simple and Secure

Employee choice has become a cornerstone of mainstream IT strategy and is essential to a digital workspace. By allowing people to choose the best devices for their needs,
organizations can improve productivity and flexibility as well as job satisfaction. During the first wave of consumerization, these initiatives focused on bring-your-own device (BYOD) programs and policies. Choose-your-own-device (CYOD) soon followed, allowing users to choose a company owned device from a small pool of company-issued devices to use for work purposes. More recently, corporate-owned, personallyenabled (COPE) programs let users to choose a companyowned device from an approved list and use their own apps as well as corporate apps on the device. While the nuances of BYOD, CYOD and COPE can vary, including their approach to cost sharing and compensation, they share most of the fundamental principles—including their security implications. Any time both personal and corporate content exists on a device, IT must ensure that effective policies and technologies
are in place to protect business information—without impeding the experience or productivity of the user.

 Security

Share content on email

Share