German

What’s in a Name? The ABCs of Mobile Device Management

by VPNHaus | 11/12/2015 |Mobile

BYOD? CYOD? Given the slew of acronyms flying around mobile device management (which, of course, goes by the acronym “MDM”), you’d be forgiven for losing track of what some of these actually stand for, much less the concepts they represent.

As offices increasingly embrace digital technology and enable more employees to work remotely, mobile devices like phones and tablets, not to mention laptops, have increasingly phased out the traditional desktop computer. But this paradigm shift is also opening a lot of sore spots and potential security vulnerabilities around corporate data– after all, it may be more convenient for employees to be able to send work emails from their personal phones, but what kind of liability does that create for the company when their sensitive material is stored in an employee’s private cloud storage?

This raises further questions about where exactly a company should expect to draw the line between personal and business use on a mobile device. The business should allow a certain degree of convenience for the employee using their device, but at the same time, it’s important to ensure there are adequate security protocols in place. To that end, it’s worth dissecting just what exactly your MDM options are:


  • BYOD: Under a Bring-Your-Own-Device policy, employees use their own personal phones or tablets for business purposes. This policy provides the greatest flexibility to employees in terms of familiarity – it’s their own phone, after all – but it also raises some privacy concerns, for both the company and the user. In fact, 57 percent of employees polled in a Bitglass survey said they opted out of their company’s BYOD program because they didn’t want their employers to have access to their personal information and apps.

  • CYOD: A Choose-Your-Own-Device policy looks to correct privacy concerns by instead allowing employees to choose from a selection of pre-approved devices to use. This way, employees have more of a say in what mobile device they use for work, and because they’re corporate-owned devices, users don’t have to worry about their employer looking into their personal data.

  • COPE: Corporate-Owned, Personal-Use policies marry these two concepts together – company-owned devices that employees can use for both business and personal use. The drawback to this policy, though, is in when to grant rights for downloading and installing new apps, which could either hamper the user experience or raise security liabilities for the employer.

But as Nigel Johnson, vice president for ZixCorp, tells CIO.com, odds are that the future of mobile device management won’t adhere to any one of these policies exclusively. Rather, companies in the near-future should look to blend them together into a hybrid approach that more easily adapts to the needs of employers and employees alike in any given situation.

However businesses choose to mix and match from BYOD, CYOD, COPE and containerization policies going forward, implementing a secure remote access VPN and other security solutions will be key for mitigating potential security risks while still granting the freedom that employees need to work remotely using their device of choice.

Read More:

The BYOD Backlash: Enterprises Search for a New Mobile Device Management Standard</a>

 

Managing Secure Communications in M2M Environments</em>, we cover:

- How to choose a connection method that’s right for your application.
- How to configure end devices so they can perform authentication steps.
- How to manage VPN configurations and updates without human interaction.

Download Now

Managing Secure Communications in M2M Environments</em>, we cover:

- How to choose a connection method that’s right for your application.
- How to configure end devices so they can perform authentication steps.
- How to manage VPN configurations and updates without human interaction.

Download Now

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK