Deep Dive BYOD, COPE & MDM
Deep Dive BYOD, COPE and COD After the usage of BYOD has steadily been increasing, the COPE strategy might be the alternative to combine the advantages of BYOD and COD. COD COD = Corporate Owned Device Use of private data and applications on corporate owned devices is not wanted or even prohibited. The use of mobile devices is allowed solely for business purposes and the devices remain in the full ownership of the company. SYNERGY BYOD BYOD: Bring Your Own Device Permission for employees to use personally owned devices to perform official and personal tasks on their private device. Mobile device strategy which provides the biggest freedom to the enduser, but incorporates the highest amount of risks at the same time. COPE COPE: Corporate-Owned, Personally-Enabled The usage of corporate devices for personal tasks (e.g. installing preferred apps etc.) is allowed to employees. Security software which is automatically and equally installed by the company on all COPE devices enables a smooth device management and minimizes security risks. 2
Deep Dive BYOD, COPE and COD Advantages and disadvantages of BYOD, COPE and COD from a company`s point of view. COD BYOD COPE Devices host corporate data, mainly in a homogeneous way. Data maintenance, data restriction and data protection can therefore be guaranteed easily by mobile device administrators. Device costs remain at the company. Employees may feel not comfortable with the provided device. This might shorten productivity. Company`s image might be considered as not up to date. Company has to buy fewer devices (>reduced CAPEX) with the worker paying for most, companies save app. $80 per month per user. Employees become more productive if they are using devices they like and feel comfortable with. Security: Network is exposed to security risks and data might easily be accessed by untrusted parties in case of loss of the device. Complexity of new device models makes it very difficult to maintain technological capabilities. Causes efforts in release-mgmt. due to high dependency to OS providers and heterogeneous landscape Infrastructure might be not sufficient when using multiple devices at the same time. Potential conflicts with worker`s council regarding compensation 3 Detecon Company reserves the right to wipe devices or disconnect devices of the corporate network if necessary (e.g. as in case of a security breach) in order to keep the company`s network and information secure. Companies can install management software, apply patches and enroll devices in MDM systems more easily under COPE than under BYOD. Number of supported devices is determined by the company. As a result device management becomes more transparent and easier to handle. Allows employees to use corporate devices for personal tasks (e.g. by installing preferred apps etc). that may cause security risks. Device costs remain at the company.
Deep Dive BYOD, COPE and COD The trend for the highest levels of BYOD in high growth markets continues, while some of the lowest rates are seen in mature, western markets. % respondents who BYOD 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% 2012 2013 2014 Source Ovum: Employee Mobility Survey 2012 (N=4,038), 2013 (N=4,371) 2014 (N=5,187) 4 Global average rate of BYOD in 2014: 68.6% The rate of BYOD behavior is increasing across every geography, with Sweden the only country where it is down on 2012. Allocation of BYOD / COPE and COD usage has not yet been researched therefore the percentage of distribution cannot be represented.
Deep Dive BYOD, COPE and COD Overview of stumbling blocks while implementing a mobile device strategy. 1 Appropriate policies and systems should be implemented e.g. by defining a set of approved smartphones. These devices should be secured and managed appropriately, possibly with the addition of third-party software (see MDM slide). 2 Invests in IT infrastructure e.g. in fast network infrastructure with an appropriate bandwidth ensure the connection of several mobile devices / systems to connect wirelessly 3 4 5 A secure network is the base for BYOD/COPE strategies. Antivirus, spam software and the implementation of VPN allow secure access and transmission of data for staff that wish to use company servers remotely. Moreover the implementation of a Mobile Device Management is an essential need to maintain security within the company`s network. A clear user policy is essential to avoid litigation arising from compromised access of personal information especially by former employees. The policy should e.g. specify the internet sites that the employees have/do not have access to. Privacy and legal concerns should be stated clearly: Employees should be made aware that all the data (also private) that is stored on their devices, could be deleted if the device is stolen or if the employee leaves the organization. 5 Detecon
Deep Dive BYOD,. COPE and COD Mobile device management (MDM) allows companies to control and secure access to smartphones and tablets centrally - this is essential in case of BYOD / COPE strategy Benefits Mode of operation MDM ensures to secure, monitor, manage and support mobile devices, involving remote distribution of applications, data and configuration settings for all types of mobile devices centrally Manage apps Erase content of a mobile device Business security risks can be lowered by using MDM (e.g. by locking remotely mobile devices or completely erase sensitive company data from a stolen / lost mobile device MDM enables the management of apps: apps can be deployed, blocked or removed. This reduces the risk of dangerous mobile malware MDM allows the tracking of asset-related metrics e.g., device status, installed apps, utilization, etc., and expense management reports MDM realizes an unified, secured mobile network within a company Suppliers 6 Deploy updates Configure mobiles devices Report on assets and compliance Detecon
Deep Dive BYOD,. COPE and COD Advantages and recommendations of mobile device management software. 1 Reduce platforms: Helps to reduce deployment and operation costs. The MDM platform meets deployment complexities, security requirements and mobile growth within a single platform. Administrators have the ability to easily manage devices across the whole company. 2 Choose the right applications: Helps to focus on services that are really needed for the appropriate business services. Administrators can easily and individually configure policies that enable a dynamic application management or disable access if a device is compromised or noncompliant 3 Focus on release and lifecycle-management: Retiring outdated services based on a scheduled planning. By using MDM the company also benefits from service level guarantees, including uptime, backup and disaster recovery for business continuity without redundant installations 4 Ensures security on mobile devices by creating and managing granular level security policies for individuals, groups, devices, context, and location based on role or work style. 5 CONCLUSION: Cost savings, secured devices, remote service, software standardization (forced update policy), centralized administration.