The IT service provider Prego Services has observed that many medium-sized companies shy away from the risks of "bring your own device" (BYOD) and prefer to provide their own equipment to their employees. But "Choose Your Own Device" (CYOD) also carries some dangers.
The use and deployment of Enterprise Mobility usually leads in the IT way. The use of mobile devices makes the company more flexible and business processes more efficient. Nevertheless, according to the IT services provider Prego Services, which specializes in medium-sized companies, companies are still insufficiently concerned with the topic "bring your own device" (BYOD). Especially the middle class should also hold back when it comes to the professional use of the private mobile devices of its employees.
"Choose Your Own Device" (CYOD)
Due to the known risks associated with BYOD, many SMEs provide their own equipment to their employees. "Choose Your Own Device" (CYOD) is an alternative concept to BYOD. The willingness of companies to provide their employees with more mobile devices is growing steadily. With CYOD, the IT companies meet the wishes of their employees. Employees can select their personal mobile device from a list of shared devices - however, the company retains ownership of the devices. Advantages of CYOD are that the company has control over the contents of the devices and the resulting legal certainty . But CYOD also carries some risks.
How small and medium-sized companies can protect themselves against pitfalls, Pregio Services has summarized in seven tips:1. Select mobile information
Companies should thoroughly and predictively consider in advance which information they would like to make available to their employees on a mobile basis. This decision sets the course for further action. Is it about syncing groupware data, like emails, calendar and contact information, with mobile devices? Or should - perhaps even later - company apps be added, for example, for permits, time tracking or travel expenses?
2. Select devices deliberately
Which mobile devices can be provided depends significantly on the answer to the first question. When it comes to official e-mails, companies have, in principle, free choice. However, if certain business processes are to be placed on smartphones and tablets, this may restrict the selection under certain circumstances.
3. Carry out risk assessment
The information that is to be mobilized must undergo a thorough risk assessment, from which appropriate safeguards can be derived. For example, if order data is handled mobile, it is recommended to encapsulate this data. This is using a so-called container - App possible isolated corporate data. This ensures that other mobile applications can not access it.
4. Allow the employees freedom
When securing devices, companies should not overshoot. If you restrict the use of mobile devices too much, they lose their added value for the employees. For example, if they can only receive official e-mails on iPhones and use some professional apps, they probably will not enjoy it. Therefore, it is important to weigh carefully between security and freedom.
5. Mobile Device Management (MDM) is mandatory
For centralized management of mobile devices, there is no way around an MDM solution (Mobile Device Management). These systems allow enterprise policies to be applied to devices and configured remotely. For example, it can be ensured that manipulated mobile devices or those without a security certificate can not connect to the corporate network. In addition, data can be deleted remotely in an emergency.
6. Consider Enterprise Mobility Management (EMM)
Depending on the data provided on the mobile devices, it may be useful to expand the MDM into a comprehensive Enterprise Mobility Management (EMM) that also includes Mobile Application Management (MAM). For example, if mobile devices access the corporate environment, an MAM can automatically provide the information needed for license management. It may be advisable to integrate the EMM into a comprehensive workplace management system that manages the entire workplace, including its mobile devices.
7. Choose infrastructure wisely
There are MDM, MAM and EMM solutions on the market that can be operated in-house as well as cloud-based or in hybrid environments. Cloud solutions have indisputable benefits. If they are to be deployed, companies must look closely at the underlying infrastructure and whether their own data remain in the country or leave Germany.
More CYOD instead of BYOD
The IDC study "Enterprise Mobility in Germany 2014/2015" shows that CYOD has more resonance than BYOD. Every second company now has a CYOD concept, while BYOD has only about 40 percent. CYOD is a compromise between the needs of users and the demands of IT, which is favored by many IT decision makers. CYOD costs companies more, but provides more control and security than BYOD.