Calling All Managers – which model is best for your company? BYOD vs COPE
Bring Your Own Device (BYOD) has been a cause for hot debate since the enterprise mobility strategy was first introduced into the corporate environment. Professionals argue over whether the significant social and monetary benefits outweigh the substantial risks involved regarding privacy, security and increased support.
Corporate-owned, Personally-Enabled (COPE) is an alternative for those companies who want to escape from the BYOD chaos and rely on a more user-friendly, IT-manageable approach. This particular business model allows the organisations themselves to provide their employees with devices, such as notebooks, tablets and smartphones, and consents for them to be used for personal use as well as work, but there are restrictions.
So which model is better for your company?
Benefits of BYOD
BYOD has been around for a few years now, first appearing as personal smartphones, tablets and notebooks became more popular tools for work. Personal devices were easier to use as employees already knew how their phones worked and could just log in to their accounts when they wanted – which for the majority was simpler than switching devices whenever they had to deal with emails or check accounts.
IT departments quickly caught on to the fact that fighting this rising trend was a losing battle and instead used their resources to assimilate these devices in the corporate environment and implement relevant support and security measures.
From a social point of view, this flexible model worked. Users could choose the device which best suited their needs both personally and professionally, and allowed them the freedom to decide on the apps and services they preferred. There was no need to try understanding another device for the sole purpose of completing tasks their own phone or tablet could perform.
Productivity was increasing as work could be done wherever and whenever (even in the Cloud), instead of in a static place from 9 –5 and it’s this flexibility that led to happier employees, with improved morale and a healthier work/life balance.
Some companies saw apparent cost savings on hardware, with the advantage of having the employee pay for their own device and data plan up to a certain cost threshold.
Drawbacks of BYOD
However, there is another side to this coin! Savings may have been made on hardware, but they were rapidly negated as companies found themselves spending more on support as IT personnel either needed training on how to deal with the different types of devices out there, or had to employ those who already knew.
Costs of Voice and Data plans also need to be negotiated. With the user spending more time writing emails, downloading data, making calls and roaming on the internet, they may need help with the larger bill at the end of the month. There are options for cost-sharing, but these need to be agreed with the users beforehand and stuck to.
There is also the argument about who pays for repairs if the device is damaged, plus major security concerns if usage is violated or the device is lost. Features that allow companies to track the activity (such as location) and web searches of employees and delete personal data remotely if the device is lost or stolen, can result in users denying IT full Mobile Device Management (MDM) control which limits the beneficial effects of the Enterprise Mobility Management (EMM) platform.
Mobile Application Management (MAM) has a lighter-handed approach, giving IT control over corporate assets only. This may have more appeal for employees, but if MDM features such as those mentioned above are needed for more security regulated companies, BYOD may not be the answer. MAM also has the issue of privacy and legal problems as arguments arise regarding what is considered ‘personal’ and ‘business’.
Security however is the biggest concern. With certain measures, BYOD expects IT to manage and control an unlimited number of devices, applications, services and data plans. This creates pressure on those trying to ensure compliance and security measures,
What do you think ? stay tuned for more of the debate !
Thanks to Emma griffin for the post!