{"id":58826,"date":"2022-09-09T09:00:00","date_gmt":"2022-09-09T13:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=58826"},"modified":"2024-11-14T19:19:08","modified_gmt":"2024-11-15T00:19:08","slug":"defining-byod-cope-cobo-cyod","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/defining-byod-cope-cobo-cyod","title":{"rendered":"Device Management: BYOD, COPE, COBO, and CYOD"},"content":{"rendered":"\n
Device diversity has been a long-standing issue in the workplace \u2014 cross-OS devices, tablets and mobile devices<\/a>, and personal devices all add distinct layers of difficulty into the device management process for IT. Due to ever-increasing device heterogeneity in the workplace on top of the COVID-19 pandemic and subsequent popularization of remote work, many organizations have been forced to rethink the way devices are distributed and managed. <\/p>\n\n\n\n More specifically, 2021 brought with it a widespread BYOD trend<\/a>. According to B<\/a>itglass<\/a>, in 2021, 47% of organizations saw an increase in the use of personal devices for work purposes. <\/strong>What\u2019s important about this is that personal devices used for work purposes can\u2019t be managed in the same way as corporate-owned devices.\u00a0<\/p>\n\n\n\n This trend, and more importantly how we work today, has opened up new challenges (and opportunities) for IT orgs. The key here is to understand what devices exist in an organization, categorize them based on who owns and\/or manages them and what their purpose is, and then decide how holistically they can be managed. Mapping all of this out helps you avoid confusion while minimizing unintentional attack vectors.<\/p>\n\n\n\n To do this properly, you need to first gain a full understanding of what device management options exist. This article defines and explains the following device acronyms: BYOD, COD, COPE, COBO, and CYOD. Once you have a clear understanding of the differences between each, you can take the next step in your device management journey by creating policies to manage and secure devices in each relevant category.<\/p>\n\n\n\n There are two primary categories of devices used in the workplace: personal devices<\/strong> and corporate-owned devices (COD)<\/strong>. What\u2019s more, the COD category can be further broken down into even more specific groups. The variables that differentiate each type of device are:<\/p>\n\n\n\n You can use this list in two ways. The first way is to figure out which types of devices are currently used in your organization and create a policy for each. The second way is to use your preferences to answer these questions, figure out which device type is associated with your answers, and choose to only allow that type in the workplace.<\/p>\n\n\n\n Let\u2019s dive into the acronyms associated with each.<\/p>\n\n\n\n BYOD stands for bring your own device<\/a>.<\/strong><\/p>\n\n\n BYOD refers to the trend of employees using personal devices to access work-related systems and resources. These personal devices can be anything from laptops to tablets to smartphones to USB drives and more. <\/p>\n\n\n\n BYOD in the workplace typically requires that you draw a hard line regarding what will or will not be monitored to maintain employee trust<\/a>. If you choose to install an agent on personal devices to monitor usage, implement conditional access policies, or something else, it needs to be clear what you can see and what you can\u2019t. Monitoring personal use of the device is outside of the organization\u2019s scope.<\/p>\n\n\n\n It\u2019s also important to consider all of the advantages of BYOD<\/a>, as well as the disadvantages before implementing it in your organization. And, if you choose to allow it, consider narrowing it down (e.g. the only BYOD allowed are laptops \u2014 no phones, tablets, or any other non-COD).<\/p>\n\n\n\n COPE stands for corporate-owned, personally-enabled.<\/strong><\/p>\n\n\n COPE devices are provided to an individual by the organization. They are used primarily for organizational purposes, but the individual is also allowed to use them in a personal capacity. It\u2019s important to note that with COPE devices, privacy can be compromised, as the organization has visibility into everything happening on the device. However, privacy concerns can be mitigated with the proper containerization tools that separate work-related data and personal data.<\/p>\n\n\n\n One example of this is a role that requires the use of a smartphone. A COPE phone allows employees to carry a single phone on them during work hours, rather than two. The phone will be set up with work-related apps and abilities, but the user is able to make voice calls, send texts, check a personal email account, and download personal apps from it. <\/p>\n\n\n\n COPE devices can be a good compromise between a too strict COD policy and a too lenient BYOD policy. However, it\u2019s still important to consider all of the pros and cons of COPE devices before making a decision.<\/p>\n\n\n\n COBO stands for corporate-owned, business-only.<\/strong><\/p>\n\n\n COBO takes things a step further than COPE by prohibiting personal use on the device. COBO devices often come in the form of kiosk tablets, Zoom Room controllers, and other devices that are used by the business at large, rather than by individuals. However, it is possible for individuals to have COBO devices, such as a company-issued smartphone with policies prohibiting personal use.<\/p>\n\n\n\n While COBO devices are great for organizational security and productivity monitoring, they significantly restrict users and remove the user\u2019s ability to to use a single device for work and personal purposes. COBO is an adequate solution for organizations looking to step up security and compliance and\/or organizations that lack the ability to keep personal and work data separate.<\/p>\n\n\n\n Learn more about some of the primary advantages and disadvantages of COBO devices:<\/p>\n\n\n\n CYOD stands for choose your own device.<\/strong><\/p>\n\n\n CYOD allows employees to choose from a list of devices specified by the organization. This gives employees more freedom and flexibility to choose the device(s) that works best for them, while staying under the umbrella of device management that IT has already established. This controlled approach keeps support costs low. Support technicians only need to be trained on certain devices, and fewer device types and configurations used means cheaper and easier to support.<\/p>\n\n\n\n In some cases, employees have the option to select and pay for the chosen device, which transfers ownership over to them. This approach is used as a compromise between the traditional BYOD and COD strategies. (This approach is not reflected in the table above.)<\/p>\n\n\n\n Let\u2019s get a little deeper into some of the advantages and disadvantages of a CYOD approach.<\/p>\n\n\n\n Use the tables above and the graph below to determine what level of flexibility you want to allow, as well as what level of ownership you want over the devices used in your organization. COPE and CYOD can vary in flexibility depending on the policies you enact, and BYOD can have more corporate control over it with the right device management tool in place.<\/p>\n\n\n Keep in mind that you don\u2019t just have to choose one type of device to allow. The rules can change from department to department, but don\u2019t bite off more than IT can chew. No matter what direction you choose to go, create specific policies around devices to protect your organization and your employees. Be sure to also put a holistic device management<\/a> tool in place to ensure that you remain as secure, compliant, and productive as possible, no matter what devices are in the mix.<\/p>\n\n\n\n JumpCloud offers cross-platform device management<\/a> capabilities: Learn more and try JumpCloud free today<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" Learn how BYOD, COPE, COBO, and CYOD are defined, and determine your organization’s device landscape using these acronyms.<\/p>\n","protected":false},"author":143,"featured_media":49201,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,2337],"tags":[],"collection":[2778],"platform":[],"funnel_stage":[3016],"coauthors":[2533],"acf":[],"yoast_head":"\nUnderstanding Device Terminology<\/h2>\n\n\n\n
\n
What is BYOD?<\/h2>\n\n\n\n
<\/figcaption><\/figure><\/div>\n\n<\/figure><\/div>\n\n\n
Advantages of BYOD<\/h3>\n\n\n\n
\n
Disadvantages of BYOD<\/h3>\n\n\n\n
\n
Shadow IT<\/a> is another security issue with BYOD. For example, 80%<\/a> of workers admit to using SaaS apps at work without getting approval from IT. It’s even more likely that those using personal devices will go down this path, because they have the freedom to download and use what they want, compared to using a more heavily configured and restrictive corporate-owned device.<\/li>\n\n\n\n
Software installation can also be difficult, because the software chosen by the organization might not be suitable for certain systems or the user might experience problems with installation that they don\u2019t know how to solve on their own.<\/li>\n\n\n\n
Supporting every device employees own can also be extremely time-consuming and costly, because it\u2019s impossible to have a specific process in place for each, especially in large companies with hundreds to thousands of different devices.<\/li>\n\n\n\nWhat is COPE?<\/h3>\n\n\n\n
<\/figure><\/div>\n\n\n
Advantages of COPE<\/h3>\n\n\n\n
\n
Disadvantages of COPE<\/h3>\n\n\n\n
\n
What is COBO?<\/h3>\n\n\n\n
<\/figure><\/div>\n\n
<\/figure><\/div>\n\n\n
Advantages of COBO<\/h3>\n\n\n\n
\n
Disadvantages of COBO<\/h3>\n\n\n\n
\n
What is CYOD?<\/h3>\n\n\n\n
<\/figure><\/div>\n\n
Advantages of CYOD<\/h3>\n\n\n\n
\n
Disadvantages of CYOD<\/h3>\n\n\n\n
\n
Managing BYOD and COD<\/h2>\n\n\n\n
<\/figure><\/div>\n\n\n