SlideShare a Scribd company logo
1 of 2
Variables to
consider
BYOD BYOD Hybrid CYOD/ Company owned
Description Employee provides own device and own
connectivity to do bank business
Employee provides own device (as
aforementioned scenario), consumes
company owned connectivity
(LAN/WI-FI/3G).
Company provides a bank owned device
supplemented with bank owned connectivity
(LAN/WI-FI/3G).
Access to
Connectivity
(LAN/Wi-Fi/3G)
Yes –
uncontrolled / unmonitored
Yes –
semi controlled / semi monitored
Yes full control and authentication of user
access with MDM.
Access to
business Apps
Yes - only via MDM workspace based on
user profiling
Yes - only via MDM based on user profiling Yes - only via MDM based on user profiling
Access to content
applications
Yes – limited only via MDM workspace
based on user profiling
Yes – limited only via MDM workspace based
on user profiling
Yes - only via MDM based on user profile in
Microsoft AD
Access to support Limited – support is limited to corporate
applications and connectivity
Limited – support is limited to corporate
applications and connectivity
Full support including connectivity, OS & app
upgrades.
Device / User
Management
Requirements
(Security)
Required
Mobile Device Management (MDM)
AD authentication via AD
Identity Management
Content management
Reality: Workspace only
Required
Mobile Device Management (MDM)
AD authentication via AD
Identity Management
Content management
Reality: Workspace only
Mobile Device Management (MDM)
Full MDM implementation and monitoring of
the device.
SIM Control &
Data
Management
No control and/or management of SIM Company can control and management SIM
card
Access control to company data via secure
access
Full management and control of SIM card
Access control to company data via secure
access
Variables to
consider
BYOD BYOD Hybrid CYOD/ Company owned
Cost Management None –
Uses can claim unlimited data costs for
business use.
Users can have access to company Wi-FI
User is not refunded for monthly contract
costs (incl. device).
Yes – Connectivity costs controlled via company
Wi-Fi and a secure 3G APN.
Excessive data usage monitored and managed.
User is not refunded for monthly contract costs
(incl. device).
Yes – Monthly contract costs include:
Connectivity costs controlled via bank Wi-Fi and a
secure 3G APN.
Excessive data usage monitored and managed.
User acceptance
and satisfaction
Low - Users reluctant to use own devices due
to upfront costs.
Limited to claim categories (business only)
High - Users know their devices and don’t
have to adjust to another
Medium - Users reluctant to use own devices
due to upfront hardware costs; happy with
sponsored connectivity.
High - Users know their devices and don’t have
to adjust to another; happy with sponsored
connectivity
Medium – Some users may not like the company
sponsored device
High - Most user satisfaction because they are not
liable for contracts and costs
Support and loan
stock
Loss of device results in loss of productivity.
No loan stock available.
Loss of device results in loss of productivity.
No loan stock available.
Loss of device results in loss of productivity until
loan unit is made available via internal process.
Risks User is responsible for securing device (OS &
apps)
Access to network without proper security
Claims are not business defined / justified
Users will not load any security protocols on
own device
User resists encryption and remote wipe
policy
OS upgrades and corporate apps aren’t in sync
User expectations for support on personal
devices
User is responsible for securing device (OS &
apps)
Access to network without security
Users will not load any security protocols on
own device
User resists encryption and remote wipe policy
OS upgrades and corporate apps aren’t in sync
User expectations for support on personal
devices
None

More Related Content

Viewers also liked

Viewers also liked (12)

Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016
 
Making BYOD Work for Your Organization
Making BYOD Work for Your OrganizationMaking BYOD Work for Your Organization
Making BYOD Work for Your Organization
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Intro to SDN - Part III
Intro to SDN - Part IIIIntro to SDN - Part III
Intro to SDN - Part III
 
Google at London Tech Week- Connectivity at the Core
Google at London Tech Week- Connectivity at the CoreGoogle at London Tech Week- Connectivity at the Core
Google at London Tech Week- Connectivity at the Core
 
Intro to SDN - Part IV
Intro to SDN - Part IVIntro to SDN - Part IV
Intro to SDN - Part IV
 
NSWDEC BYOD Checklist
NSWDEC BYOD ChecklistNSWDEC BYOD Checklist
NSWDEC BYOD Checklist
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD Plan
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 

Similar to BYOD & company owned comparison

OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
Jim Sutter
 

Similar to BYOD & company owned comparison (20)

Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
2014 - Mobile device management - mdm - case study - news agency
2014 - Mobile device management - mdm - case study - news agency2014 - Mobile device management - mdm - case study - news agency
2014 - Mobile device management - mdm - case study - news agency
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Tip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupTip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundup
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Rytangle28 feb 2016
Rytangle28 feb 2016Rytangle28 feb 2016
Rytangle28 feb 2016
 
Smart home over IoT
Smart home over IoTSmart home over IoT
Smart home over IoT
 
Bring Your Own Devices
Bring Your Own Devices Bring Your Own Devices
Bring Your Own Devices
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Cloudflare Access
Cloudflare AccessCloudflare Access
Cloudflare Access
 
IRJET- Li-Fi Based Interactive Intelligent Shopping System with Auto Paym...
IRJET-  	  Li-Fi Based Interactive Intelligent Shopping System with Auto Paym...IRJET-  	  Li-Fi Based Interactive Intelligent Shopping System with Auto Paym...
IRJET- Li-Fi Based Interactive Intelligent Shopping System with Auto Paym...
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018Securing Internal Applications with Cloudflare Access - April 2018
Securing Internal Applications with Cloudflare Access - April 2018
 
Securing Internal Applications with Cloudflare Access
Securing Internal Applications with Cloudflare AccessSecuring Internal Applications with Cloudflare Access
Securing Internal Applications with Cloudflare Access
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 

More from Peter Hewer

More from Peter Hewer (11)

5 tips for digital transformation success
5 tips for digital transformation success5 tips for digital transformation success
5 tips for digital transformation success
 
How enterprise mobility improves productivty
How enterprise mobility improves productivtyHow enterprise mobility improves productivty
How enterprise mobility improves productivty
 
Changing operating system guidelines
Changing operating system guidelinesChanging operating system guidelines
Changing operating system guidelines
 
7 tips for a successful apps
7 tips for a successful apps7 tips for a successful apps
7 tips for a successful apps
 
3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook3 data leak possibilities that are easy to overlook
3 data leak possibilities that are easy to overlook
 
Advantages of voice search in mobile apps
Advantages of voice search in mobile appsAdvantages of voice search in mobile apps
Advantages of voice search in mobile apps
 
9 basic MDM settings to get you started
9 basic MDM settings to get you started9 basic MDM settings to get you started
9 basic MDM settings to get you started
 
Enterprise Mobility trends for 2019
Enterprise Mobility trends for 2019Enterprise Mobility trends for 2019
Enterprise Mobility trends for 2019
 
Reimagine Enterprise Mobility with 5g
Reimagine Enterprise Mobility with 5gReimagine Enterprise Mobility with 5g
Reimagine Enterprise Mobility with 5g
 
Enterprise mobility enablement
Enterprise mobility enablementEnterprise mobility enablement
Enterprise mobility enablement
 
Essential MDM configurations
Essential MDM configurationsEssential MDM configurations
Essential MDM configurations
 

Recently uploaded

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (6)

Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdf
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 

BYOD & company owned comparison

  • 1. Variables to consider BYOD BYOD Hybrid CYOD/ Company owned Description Employee provides own device and own connectivity to do bank business Employee provides own device (as aforementioned scenario), consumes company owned connectivity (LAN/WI-FI/3G). Company provides a bank owned device supplemented with bank owned connectivity (LAN/WI-FI/3G). Access to Connectivity (LAN/Wi-Fi/3G) Yes – uncontrolled / unmonitored Yes – semi controlled / semi monitored Yes full control and authentication of user access with MDM. Access to business Apps Yes - only via MDM workspace based on user profiling Yes - only via MDM based on user profiling Yes - only via MDM based on user profiling Access to content applications Yes – limited only via MDM workspace based on user profiling Yes – limited only via MDM workspace based on user profiling Yes - only via MDM based on user profile in Microsoft AD Access to support Limited – support is limited to corporate applications and connectivity Limited – support is limited to corporate applications and connectivity Full support including connectivity, OS & app upgrades. Device / User Management Requirements (Security) Required Mobile Device Management (MDM) AD authentication via AD Identity Management Content management Reality: Workspace only Required Mobile Device Management (MDM) AD authentication via AD Identity Management Content management Reality: Workspace only Mobile Device Management (MDM) Full MDM implementation and monitoring of the device. SIM Control & Data Management No control and/or management of SIM Company can control and management SIM card Access control to company data via secure access Full management and control of SIM card Access control to company data via secure access
  • 2. Variables to consider BYOD BYOD Hybrid CYOD/ Company owned Cost Management None – Uses can claim unlimited data costs for business use. Users can have access to company Wi-FI User is not refunded for monthly contract costs (incl. device). Yes – Connectivity costs controlled via company Wi-Fi and a secure 3G APN. Excessive data usage monitored and managed. User is not refunded for monthly contract costs (incl. device). Yes – Monthly contract costs include: Connectivity costs controlled via bank Wi-Fi and a secure 3G APN. Excessive data usage monitored and managed. User acceptance and satisfaction Low - Users reluctant to use own devices due to upfront costs. Limited to claim categories (business only) High - Users know their devices and don’t have to adjust to another Medium - Users reluctant to use own devices due to upfront hardware costs; happy with sponsored connectivity. High - Users know their devices and don’t have to adjust to another; happy with sponsored connectivity Medium – Some users may not like the company sponsored device High - Most user satisfaction because they are not liable for contracts and costs Support and loan stock Loss of device results in loss of productivity. No loan stock available. Loss of device results in loss of productivity. No loan stock available. Loss of device results in loss of productivity until loan unit is made available via internal process. Risks User is responsible for securing device (OS & apps) Access to network without proper security Claims are not business defined / justified Users will not load any security protocols on own device User resists encryption and remote wipe policy OS upgrades and corporate apps aren’t in sync User expectations for support on personal devices User is responsible for securing device (OS & apps) Access to network without security Users will not load any security protocols on own device User resists encryption and remote wipe policy OS upgrades and corporate apps aren’t in sync User expectations for support on personal devices None