SHARE



ABOUT THE AUTHOR


Dave Snow
Dave Snow has been in the network communication industry for over 20 years and is currently the Director of Dimension...
Read Full Bio >>
SHARE



Dave Snow | March 28, 2014 |

 
   

BYOD Versus Corporate-Liable: How do you COPE?

BYOD Versus Corporate-Liable: How do you COPE? In the new world, business realities and employee use cases need to drive the adoption of appropriate mobile policies.

In the new world, business realities and employee use cases need to drive the adoption of appropriate mobile policies.

Mobile device usage in the enterprise forever changed the landscape of enterprise networks and the way that employees and customers communicate or collaborate across those networks.

Several lessons have been learned during the very rapid rise of the mobile enterprise that can be effectively applied as guidelines for the future. Perhaps most importantly, the temptation to treat enterprise mobility as a device-centric environment to which we should apply and enforce policy has proven to be incorrect. Enterprises should consider a user-centric point of view that moves beyond today's conversations of BYOD versus Corporate-Liable and COPE (or corporate-enabled, personally owned).

Current state of the mobile enterprise
Some organizations continue to apply the corporate-liable model, where the corporation is responsible for ownership, expense, policy and security management, in order to optimize cost, usage, utility, and security. This is especially true in organizations that are exposed to SEC, GLB, HIPAA, PCI or Sarbanes-Oxley regulation. But in most cases, this model has been replaced by the BYOD model, which in turn has quickly created unexpected demand for support and enablement that many IT organizations are not ready for.

In a user survey of enterprises that had implemented BYOD, the majority reported that direct costs had actually increased over prior corporate-liable expenses. For instance, the support costs in an environment of multiple mobile operating systems and numerous device types have increased substantially. Mobile security concerns with the BYOD model have driven rapid adoption (as well as added costs) of first-generation mobile device management (MDM) solutions. Lastly, support that spans the entire device lifecycle for mobile users, from ordering, provisioning, device or application support and ultimately device recycling, have also created additional expenses for the enterprise.

For some companies, an effort to clean up the access control, security, support and unexpected cost issues surrounding BYOD, has led to COPE. In the COPE model (sometimes referred to a CYOD, or "choose your own device"), both the device and service provisioned are specified and paid for directly by the company. Under this model, the permutations and combinations of mobile operating systems, mobile devices and mobile service plans are reduced, and the corporation can benefit from negotiating bulk rates for voice and data services, known as pool plans. Employees can select from desirable (and supported) devices like iPhones, and are allowed certain texting, tweeting or gaming activities via mobile application management tools.

COPE provides an opportunity to capture the best features of both the BYOD and corporate-liable models, but still requires a fair amount of management and administration overhead to be effective, and is suboptimal in many cases.

First-generation MDM tools have addressed the initial mobile security concerns in the enterprise, but the overly simple approach to access control and remote wipe proved to be somewhat inept, causing concerns among end-users around personal data privacy and security. Enabling MDM on personally-owned devices has also been difficult when users don't accept overly invasive security measures, such as device-neutering--shutting down MicroSD storage or USB connectivity.

Where do we go from here?
Second-generation MDM solutions have begun to enable "containerization"--a real-time segregation of the enterprise workspace and data from the personal space, enabling personal apps, social networking and email. By segregating both the data and the workspaces in real-time and tagging the data as having originated from one space or the other, the personal "data leaking" channels (including IM/MMS, MicroSD and USB data channels) are effectively blocked from an enterprise perspective, but remain available for all personal use.

MDM can now be deployed, provisioned and managed via the cloud, so overall costs are significantly lowered and mobile security management agility increased. Effective cloud architectures, coupled with secure access, protect work data in transit and limit the amount of data stored at rest on the mobile device.

Increasingly, IT strategies that emphasize cloud processing and storage, collaboration and device independence are replacing old client-server models of copying data to a specific machine for local use. Since mobile apps tend to rely on the cloud, and mobile devices are increasingly consuming cloud services, enterprise IT architects would be wise to consider their mobile and cloud strategies holistically.

Advances in both MDM and cloud services virtually eliminate the need to actively consider COPE as a model for enterprise mobility and allow us to focus on optimization of BYOD or Corporate-Liable for the enterprise, most likely using both in a hybrid model based on specific use cases and end-user requirements.

Guidelines for the Future
The combined forces of the business use case for mobility and the requirements of the mobile end-user have changed the center of gravity for IT. In the new world we need to adapt to the notion of letting the business drive policy, not vice-versa, and to map individual user groups and use cases to the appropriate policy models. This allows for the fact that not all users or user groups are the same, and that there will likely be more than one user group that we need to enable and support.

Applying a method for constant optimization of usage, utilization by business application and overall cost is needed. By closely tracking and adjusting for actual usage, utilization and cost variables to create an optimum result, enterprises will have effectively created a feedback loop that enables true mobile lifecycle management for the mobile enterprise as it continues to grow and evolve.

Dave Snow has been in the network communication industry for over 20 years and is currently the Director of Dimension Data's Communications Lifecycle Management Practice. Follow Dave on Twitter @DaveSnow or learn more at clm.dimensiondata.com





COMMENTS



Enterprise Connect Orlando 2018
March 12-15 | Orlando, FL

Connect with the Entire Enterprise Communications & Collaboration Ecosystem


Stay Up-to-Date: Hear industry visionaries in Keynotes and General Sessions delivering the latest insight on UC, mobility, collaboration and cloud

Grow Your Network: Connect with the largest gathering of enterprise IT and business leaders and influencers

Learn From Industry Leaders: Attend a full range of Conference Sessions, Free Programs and Special Events

Evaluate All Your Options: Engage with 190+ of the leading equipment, software and service providers

Have Fun! Mingle with sponsors, exhibitors, attendees, guest speakers and industry players during evening receptions

Register now with code NOJITTEREB to save $200 Off Advance Rates or get a FREE Expo Pass!

November 1, 2017

Your customers (internal and external) demand that you offer them the ability to connect by any means. With the adoption of cloud communications tools you now have access to an expanded portfolio o

October 18, 2017

Microsofts recent Ignite event had some critically important announcements for enterprise communications. Namely, Microsofts new Team Collaboration offering, Teams, will be its primary communicatio

September 20, 2017

Customer experience can make or break your business. But how do you achieve outstanding customer service when you're dealing with outdated organizational structure, lagging technology, dated proces

September 22, 2017
In this podcast, we explore the future of work with Robert Brown, AVP of the Cognizant Center for the Future of Work, who helps us answer the question, "What do we do when machines do everything?"
September 8, 2017
Greg Collins, a technology analyst and strategist with Exact Ventures, delivers a status report on 5G implementation plans and tells enterprises why they shouldn't wait to move ahead on potential use ....
August 25, 2017
Find out what business considerations are driving the SIP trunking market today, and learn a bit about how satisfied enterprises are with their providers. We talk with John Malone, president of The Ea....
August 16, 2017
World Vision U.S. is finding lots of goodness in RingCentral's cloud communications service, but as Randy Boyd, infrastructure architect at the global humanitarian nonprofit, tells us, he and his team....
August 11, 2017
Alicia Gee, director of unified communications at Sutter Physician Services, oversees the technical team supporting a 1,000-agent contact center running on Genesys PureConnect. She catches us up on th....
August 4, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, has lately been working on integrating enterprise communications into Internet of Things ecosystems. He shares examples and off....
July 27, 2017
Industry watcher Elka Popova, a Frost & Sullivan program director, shares her perspective on this acquisition, discussing Mitel's market positioning, why the move makes sense, and more.
July 14, 2017
Lantre Barr, founder and CEO of Blacc Spot Media, urges any enterprise that's been on the fence about integrating real-time communications into business workflows to jump off and get started. Tune and....
June 28, 2017
Communications expert Tsahi Levent-Levi, author of the popular BlogGeek.me blog, keeps a running tally and comprehensive overview of communications platform-as-a-service offerings in his "Choosing a W....
June 9, 2017
If you think telecom expense management applies to nothing more than business phone lines, think again. Hyoun Park, founder and principal investigator with technology advisory Amalgam Insights, tells ....
June 2, 2017
Enterprises strategizing on mobility today, including for internal collaboration, don't have the luxury of learning as they go. Tony Rizzo, enterprise mobility specialist with Blue Hill Research, expl....
May 24, 2017
Mark Winther, head of IDC's global telecom consulting practice, gives us his take on how CPaaS providers evolve beyond the basic building blocks and address maturing enterprise needs.
May 18, 2017
Diane Myers, senior research director at IHS Markit, walks us through her 2017 UC-as-a-service report... and shares what might be to come in 2018.
April 28, 2017
Change isn't easy, but it is necessary. Tune in for advice and perspective from Zeus Kerravala, co-author of a "Digital Transformation for Dummies" special edition.
April 20, 2017
Robin Gareiss, president of Nemertes Research, shares insight gleaned from the firm's 12th annual UCC Total Cost of Operations study.
March 23, 2017
Tim Banting, of Current Analysis, gives us a peek into what the next three years will bring in advance of his Enterprise Connect session exploring the question: Will there be a new model for enterpris....
March 15, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, discusses the evolving role of the all-important session border controller.
March 9, 2017
Organizer Alan Quayle gives us the lowdown on programmable communications and all you need to know about participating in this pre-Enterprise Connect hackathon.
March 3, 2017
From protecting against new vulnerabilities to keeping security assessments up to date, security consultant Mark Collier shares tips on how best to protect your UC systems.
February 24, 2017
UC analyst Blair Pleasant sorts through the myriad cloud architectural models underlying UCaaS and CCaaS offerings, and explains why knowing the differences matter.
February 17, 2017
From the most basics of basics to the hidden gotchas, UC consultant Melissa Swartz helps demystify the complex world of SIP trunking.
February 7, 2017
UC&C consultant Kevin Kieller, a partner at enableUC, shares pointers for making the right architectural choices for your Skype for Business deployment.
February 1, 2017
Elka Popova, a Frost & Sullivan program director, shares a status report on the UCaaS market today and offers her perspective on what large enterprises need before committing to UC in the cloud.
January 26, 2017
Andrew Davis, co-founder of Wainhouse Research and chair of the Video track at Enterprise Connect 2017, sorts through the myriad cloud video service options and shares how to tell if your choice is en....
January 23, 2017
Sheila McGee-Smith, Contact Center/Customer Experience track chair for Enterprise Connect 2017, tells us what we need to know about the role cloud software is playing in contact centers today.