3 Alternatives to BYOD for 2017

boulevard-of-mobile-dreamsAs we embark on a new year, organizations across the globe are looking for a way to ensure their employees are using secure devices without implementing a Bring Your Own Device (BYOD) policy.

BYOD ripped through the enterprise years ago, gaining popularity quickly after its launch. Todat, just under 75 percent of enterprise mobility programs use a BYOD policy, as there are several benefits including a boost in productivity and cost savings. An employee utilizing their own device at work saves about 81 minutes a week. Plus, their employer saves about $1,300 a year, according to appstechnews.com. While those are great features to BYOD, there are drawbacks to these types of policies as well; including an increase in security threats.

Appstechnews.com reported that 35 percent of companies do not feel confident in BYOD. If you fall into that category, here are some alternatives that may be a fit for your business:

Corporate-owned, personally enabled/COPE

A corporate-owned, personally enabled (COPE) mobile policy may be more suitable for your company than BYOD. This type of policy allows an organization to own their devices, however, a staff member can still use them for personal calls and activity.

Employees are given a pre-approved device and operating system, meaning that both will comply with the company’s customized Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) solution.

A COPE policy also gives a company corporate data ownership, so they are able to manage and get rid of sensitive information if necessary.

COPE does cost more than a BYOD policy, but carrier discounts are available for businesses.  And keep in mind that a limited number of devices and operating systems often allows for a reduction in cost of enterprise mobility support.

Click here for more information on COPE.

Widget not in any sidebars

Direct-to-carrier stipends

Another option to consider is direct-to-carrier stipends; this gives employees the responsibility of buying their own device and carrier service. This type of policy takes most of the responsibility off the company, but employees are given a monthly credit. The amount of the credit is based on their role, and normally pays just a portion of the worker’s phone bill.

Companies save a lot of cash with this option, especially considering that they can separate personal and corporate data usage to sidestep certain taxes and fees. However, support from within the company and threat management are extremely difficult to get a handle on, given that an enormous amount of devices and operating systems have access to the company’s network.

Choose your own device

Choose Your Own Device, or CYOD, combines BYOD and COPE. A CYOD policy allows employees to choose from a pre-approved selection of devices and operating systems even though they are footing the bill.

This kind of policy means compatibility with an organization’s MDM or EMM solution given that devices have to be pre-approved, increasing security and decreasing the amount of worry that comes with a BYOD policy. However, issues can still come up when wiping company data.

According to appstechnews.com, while CYOD can eliminate some support issues, personal and business data isn’t separated and that can put an organization at risk.

So which one is it going to be? Tweet us @Solution_Review and let us know which option you went with! And remember that now, you need to choose a solution to go with it.

It turns out that asking yourself some simple questions can take you down the right path. Recently, at the Enterprise Mobility Exchange in Vegas, tons of attendants were lost when it came to making a decision, according to appstechnews.com.

The first suggested question to ask yourself is: What type of enterprise mobility user am I?

  • COPE: If you’re going with COPE devices, MDM should be your first choice of solution. However, MAM may also do the trick.
  • Corporate provisioned: If you use a corporate provisioned device, you’ll again want to pick an MDM solution for top-notch security.
  • BYOD: Are you bringing your own device to work? If so, MAM is often the best fit given that it secures data and apps, not just an individual device.
  • Third-party service provider: If you have a third-party service provider, you most likely already have an MDM tool in place from said provider.

Appstechnews.com reported that most professionals at the event said their business switched from one method to another, often various times, in the past. Whether your business has a solution in place or not, it’s important to figure out which type of user you are and then move on to the purchasing phase when looking to buy a new solution.

Ashley Troutman
Follow me!

Ashley Troutman

Ashley is an editor/writer for Solutions Review and sister site Techfresca.com. She has been honing her skills as a multimedia content creator for the last decade, including working in live television for a top 10 market station.
Ashley Troutman
Follow me!