BYOD or CYOD: Which EMM Model Works Best?
A new report says IT admis should understand who its end users are before selecting a mobility model.
The debate between bring your own device (BYOD) and choose your own device (CYOD) continues among IT administrators looking to address endpoint management challenges
Virtual computer technology developer Moka5, a Redwood, California-based company, this week revealed released a whitepaper titled, “BYOD or CYOD? Finding Common Ground — and Building a Secure Foundation For Business Services.”
In the report, the company explains the strengths, weaknesses and challenges of both mobility models. It also reviews how IT can achieve the best of both models, while avoiding the worst.
One example of how IT administrators can leverage the strengths of both models is through secure containers, a way to separate a business-specific environment created on a host device, the report says. A secure container can then be governed by a standard set of business policies.
The whitepaper points to several benefits of secure containers, including an increase in employee satisfaction and productivity, and the separation of personal data and business data.
The report also proposes a simple answer to the debate: “It largely depends on how comfortable IT feels with its end-user community and their ability to assume a minimal level of self-sufficiency and restraint.”
“Weighing those pros and cons carefully will help enterprise IT make the right decision for their specific security posture and compliance requirements, while ensuring end-user satisfaction,” the report says.
Follow CJ Arlotta on Twitter @cjarlotta and Google+ for further updates on the story above.
About the Author
You May Also Like