Skip to main content
App management icon

This post is from the Apperian blog and has not been updated since the original publish date.

Last Updated Jun 12, 2013 — App Management expert

BYOD? How About CYOD (Choose Your Own Device)?

App Management

Businesses have witnessed a dramatic evolution in mobile computing in recent years. Many organizations have transitioned from purchasing and managing mobile devices used by employees (or reimbursing employees after they bought a smartphone or tablet) to a state where staff now elects to bring their own device (BYOD) into the workplace. But what about choose your own device (CYOD)? In a recent article by CIO Australia, Allan Davies, the CIO at Dematic Asia-Pacific and Tim Dillon, associate vice president at IDC, both pointed out how BYOD not only represents a change in how workers are bringing their own mobile devices into the workplace but how this poses additional risk for the enterprise while creating additional work for IT. The good news for IT and LOB professionals is that BYOD doesn't necessarily mean that every personal device that’s brought into the workplace has to be supported by the enterprise. A choose your device (CYOD) plan allows the ability to limit the types of hardware employees can use, allowing them to be easily replaced by the company if something were to happen to the device -- while still enabling employees to use their own if they choose.

CYOD can also imply an organization will have their own corporate infrastructure so employees are not required to use an external device to carry out their work. Both BYOD and CYOD allow employees to use their personal devices to a certain degree, and the most important aspect of mobile management is the administration, deployment, and security of enterprise mobile apps and corporate data which are at the heart of a company’s business operations. That’s why a growing number of companies are opting for mobile application management (MAM) instead of mobile device management (MDM). Mobile application management enables IT to protect enterprise apps and corporate data throughout all phases of the mobile application lifecycle – from development to deployment to app signing to inspection for security flaws and malware – all while leaving personal apps and data on an employee’s device untouched.

Meanwhile, instead of applying mobile device management to lock down an employee’s device and enforcing a command-and-control approach to mobile management, MAM can be used to wipe all enterprise mobile apps and corporate data remotely from a lost or stolen device or when an employee no longer works for a company. MAM enables companies to discretely remove proprietary apps and information from a former employee’s device while leaving their personal apps and data alone.  

More from the Blog

View more
Apr 30, 2020

Mobile Application Management: A Forward View

App Management
  IT Is Adapting in the Midst of the COVID-19 Pandemic The Coron ...
Read More
Nov 19, 2018

Breaking Down the New California IoT Law

Application Security
Recently California passed legislation regarding the security of all I ...
Read More
Nov 14, 2018

Securing mobile apps against reverse engineering and hacking [Podcast]

Application Security
Listen to Alissa Knight interview Ken Jochims about Arxan Technologies ...
Read More
Oct 25, 2018

Securing Connected Medical Device Apps [Infographic]

Application Security
Contact Us