An increasingly mobile workforce demands not only access to corporate data, but also the equipment required to make such access possible. To speed up deployment of mobile devoices without significant capital expenditure many businesses have been adopting Bring Your Own Device (BYOD) policies.
For heavily regulated industries, connecting personal devices to the corporate network is an unsatisfactory solution. So instead they choose a COPE – Corporate Owned, Personal Enabled – strategy. In this scenario, the business chooses and purchases a standard device that is then issued to all mobile employees.
By standardizing on a single device, businesses can be sure that the user experience is consistent for all mobile users, and that configuration and deployment is a relatively straightforward, templated process. In the event of a problem, the company is well within their rights to demand the return of the device, or to perform a remote wipe.
COPE policies also allow users to install additional apps and data onto their own handset, raising personal productivity. As such many employees are happier to use a corporate device because they have greater freedom over its use.
However COPE strategies are still subject to some of the same pitfalls as BYOD. A lost device could contain sensitive business information for instance. Or one of the apps installed by the user could be stealing business information. Just because your business owns the device does not mean it is exempt from the same problems that plague personal handsets.
The answer therefore is not down to device ownership, but management. Whether a business adopts a COPE, BYOD or CYOD strategy, managing how the device access corporate resources and the data stored on it is key.
An Enterprise Mobile Management (EMM) solution helps to rapidly provision devices and control access to resources. If the device is lost or stolen, your central EMM console can quickly block access and even remote wipe the device.
Even more important is to implement a cost-effective solution that can prevent data being stolen or shared from the handset itself. Excitor’s DME™ solution creates a secure corporate partition on any device to ensure that business data is kept completely separate from personal apps.
Only by logging into the corporate apps installed in the container can your mobile workforce access company data via secure connection back to your datacentre. And once inside the container, corporate data cannot be removed or shared.
Using this containerization approach, your business can be sure that devices issued under a COPE strategy are completely secure without compromising the personalization options available to your users.
For more information about Excitor’s approach to complete mobile device security, and how we can help with your COPE strategy, give us a call today on (+45) 70 21 68 00.