When you decide to add enterprise mobility solutions to your company’s infrastructure, you can’t simply bring in a bunch of mobile devices and start using them right away. You need a plan in place that outlines responsibilities for maintaining device security, protecting company data, and paying service costs. Common plan types include BYOD (bring your own device), CYOD (choose your own device), and COPE (corporate-owned, personally-enabled).
Your enterprise might wonder: what do BYOD, CYOD, and COPE mean? What’s the difference between them? Which one is right for my business? Each of these models has their own set of regulations and offerings, and they set different provisions for both organizations and users. Knowing the differences between BYOD, CYOD, and COPE will help your company decide which policy it should enact. Below, we explain the unique features of BYOD, CYOD, and COPE, and how each model can benefit your business.
Regardless of the model your business adopts, you need some way to protect and manage those devices. That’s where enterprise mobility management (EMM) and mobile device management (MDM) come in. If you want to learn more about the benefits of EMM and MDM, you should check out our free 2019 MDM Buyer’s Guide. We profile the top vendors in the mobile device management field, their key capabilities, and our Bottom Line for each.
BYOD (Bring Your Own Device)
BYOD (bring your own device) is undoubtedly the most well-known policy on this list, and the most popular deployment model for businesses. Under a BYOD policy, employees bring their personal devices to the office and use them for work-related tasks. After the device is approved by the enterprise, the company must then install an agent or application that allows them to manage the security of the device from a central management system (such as an enterprise mobility management solution).
With a BYOD model in place, employees are fully responsible for keeping the device safe by preventing it from being lost or stolen. This also includes avoiding public WiFi networks and not bringing malicious programs and applications onto the device. Because the security of the device itself is ultimately in the user’s hands, it can be difficult for enterprises to enforce security policies. That’s why a device management solution is so important for enterprises, especially for BYOD-friendly organizations.
However, a successful BYOD policy can be the most cost-effective solution for businesses while also satisfying employees. It’s likely that your users will be more familiar with their personal device than any device your business could provide for them. Thus, letting them use those devices for mission-critical tasks can lead to higher productivity. Also, since the device is owned by them, employees will also pay for the mobile plan, saving money for the business in the long run.
CYOD (Choose Your Own Device)
In a CYOD (choose your own device) policy, an enterprise will provide a set of pre-approved mobile devices and allow them to choose one. These devices are typically configured with security protocols and business applications before the worker selects them. Depending on the CYOD policy, the user might own the device after selecting it and pay for it upfront, or the enterprise might offer employees a stipend to cover costs while maintaining ownership.
CYOD is often seen as a middle ground between the BYOD and other policies, since it still grants employees a degree of freedom in selecting their device. Since the enterprise chooses which types of devices will be deployed, they can maintain device compatibility and install security features before employees start using them. That can help them ensure the devices and the data contained within are protected. Unfortunately, employees might not be necessarily be happy with the device selection available. Even if you approve a wide variety of devices, employees might not be able to become fully comfortable with the hardware they’re given.
COPE (Corporate-Owned, Personally-Enabled)
At the end of the spectrum, a COPE (corporate-owned, personally-enabled) policy grants users access to mobile devices that are fully owned by the company. Your enterprise will maintain full ownership of the mobile device and will pay for its operation costs. However, the user who works with the device is still given options to personalize it; they can still download non-work related apps and customize the interface to their liking.
Enterprises have the most control over their devices under a COPE policy. They don’t relinquish ownership of the mobile devices, and they can pre-configure them to maintain device and data security. This means that COPE-managed devices are the easiest to secure, since the enterprise can lock them down effectively beforehand. It also means that the user has the least degree of freedom in selecting a devices that suits their needs, which might generate unhappiness among your workforce. In addition, COPE can be the most expensive for your business because it’s responsible for all ownership costs.
Which model is right for your business?
When it comes to determining which policy model your company will enact, you need to consider the advantages of disadvantages that each one brings to both your business and employees. Does your company want to prioritize user satisfaction and productivity or device security and data protection? It may want to compromise between those two ideas to attempt to make both sides happy. The best way to avoid falling into the downsides of the policy you choose is to make that policy your own. Your enterprise has full reign to design their mobility model around the features you want, finding the right balance between enterprise and user control.
Another factor to consider is that BYOD, CYOD, and COPE are not the only models out there. Two other infrequent policy models are COBO (corporate-owned, business-only), where the device can only be used for work-related purposes; and CLEO (corporate-liable, employee-owned), where employees own the device but the company is responsible for service costs. While these policies are not as common anymore as BYOD, CYOD, and COPE offer more flexibility and security, they’re still a valid option for enterprises examining mobility solutions.
If you want to learn more about the benefits of enterprise mobility management, you should check out our free 2019 MDM Buyer’s Guide. We profile the top vendors in the mobile device management field, their key capabilities, and our Bottom Line for each.
Latest posts by Daniel Hein (see all)
- The Best 5G Network Security Books for Your Bookshelf - May 7, 2021
- The Best Mobile Security Courses for IT Professionals - April 30, 2021
- VMware Anywhere Workspace Combines UEM with Native Security Solutions - April 22, 2021