BYOD is old news, the emergence of COPE

SunView Software, BYOD, COPE

It is Summertime and the livin' is easy. Fish are jumpin' and... Summer is a great time of year. But managing your BYOD may be making you feel the winter blues in July. 

For the past few years, especially since the iPhone first hit the cell phone market, companies have been reluctantly allowing personal devices for work. It sounds like the best thing to ever happen to the enterprise – people willingly using their personal devices for company business. Not so fast, with the trend towards the Consumerization of IT additional issues around security, personal vs. company rights, reimbursement, data wiping and more have come to "sun" light. 

If your company is still struggling with the management of all of the BYOD suddenly within your firewall, you should consider the implementation of an Asset and Configuration Management solution. A great place to start your research is with the offer below.



Well, just as we start to feel that BYOD is SOP, along comes COPE - corporate owned, personally enabled. In the Enterprise Mobility guest post by Scott Kraege, COPE Will Outshine BYOD in 2013, he helps us to understand the differences and similarities between the two.
COPE is best broken down into two phases. The “corporate owned” portion assists companies in keeping their networks and information secure, one of the biggest issues faced when using BYOD programs. “CO” means the company still owns the line of service, selects preferred devices and sets usage cost thresholds for employees to consider. By declaring this kind of ownership, the company reserves the right to wipe or disconnect devices on the corporate network when necessary (say, a security breach ensues), and ultimately offers the company pre-established security just like the pre-BYOD days. 
Although a recent study showsthat  77 percent of BYOD employees dislike the use of mobile device management (MDM) on their device, the “personally enabled,” or “PE,” aspect of COPE allows employees to choose the company-approved device they favor while also enabling them to use it personally and professionally. This second phase of COPE aligns the program more closely with BYOD, as it keeps the two usages tied together because employees can choose the company-approved device from the predetermined list and use the device for personal and professional matters – again, a common BYOD perk.
Similarly, in the excellent 2 part article by Robert Sheldon, he presents the benefits of COPE. 
But at its most untamed, BYOD leaves IT to manage and control a chaotic mix of apps, services and device types, forcing administrators to find ways to ensure compliance and data security. There have been great improvements in the area of BYOD management, but security still remains an immense concern. 
The COPE model aims to ease some security concerns by making it easier for IT to monitor and protect devices, because they're corporate-owned while still offering many of the benefits of BYOD. With COPE, employees can still select the devices, services and apps they want to use, but IT gets to limit what those choices are, how they're implemented and the cost thresholds associated with them. Rather than trying to carve out a space on a personal device for secure data and device management -- as IT would with a secure container or dual persona technology in a BYOD scenario -- COPE lets admins create space on a fully managed device for personal uses. 
The COPE model can also help IT work within legal and regulatory parameters. For example, some European countries prohibit companies from wiping data on personal devices; if an employee loses a device, IT can do nothing to prevent sensitive data from being compromised. COPE eliminates this concern because the device belongs to the organization, so IT has every right to remotely wipe it if and when such action becomes necessary.
So, will BYOD be going the way of the Dodo? Is COPE the next big thing? No matter which direction your company takes to address this trend, you must still implement a complete mobility policy and work with all of the stakeholders to make the access available and restricted at the same time. Yes, it is summertime and the Consumerization of IT is easy!


Image: MidCenturyFLA