OpenSource For You

Device strategy

-

It is essential to have fine-grained and well-defined strategies for how devices are used in enterprise­s. Emerging hardware and software capabiliti­es of Android mobile devices have led to diverse device distributi­on gateways. Enterprise­s can select and plan according to their needs and security level enforcemen­t strategies. Each device distributi­on approach requires a technical support system, applicatio­n/ device management plan, admin console for administra­tion activities, and policies that need to be enforced. Popular enterprise device strategies are BYOD, CYOD and COPE, which are described below.

BYOD: Bring Your Own Device (BYOD) is a popular device strategy with enterprise­s, wherein users are allowed to access their own personal devices for enterprise applicatio­ns. As enterprise data and applicatio­ns are accessed via users’ personal devices, this strategy requires well planned and enforced security to protect the data.

CYOD: Choose Your Own Device (CYOD) is a limited version of BYOD. In this device strategy, enterprise­s can support selected Android devices for applicatio­n access, and users are requested to choose a device from a proposed device list. This strategy also demands security mechanisms and policies to protect enterprise data on Android devices.

COPE: The Corporate Owned Personally Enabled (COPE) device distributi­on policy is the way to ensure high levels of security for enterprise data. This is also one of the recommende­d ways for enterprise­s, if data is very sensitive, and its loss leads to high risks. Enterprise­s can use customised COPE Android devices that come with high security mechanisms and limited access for personal usage.

Newspapers in English

Newspapers from India