Our site uses cookies to make it work and to help us give you the best possible user experience. By using our site, you agree to our use of cookies. To find out more about cookies and how you can disable them, please read our cookies statement. 

Cookie Settings

You can manage your cookie settings by turning cookies on and off.

Click on the different cookie  headings to find out more about the types of cookies we use on this site and to change your settings. Please be aware that if you choose to turn off  cookies, certain areas of our site may not work and your browsing experience may be impacted.

For further information on how we use cookies, please see our cookies statement. 

Strictly Necessary Cookies

(Req)

These cookies are essential for the technical operation of and proper functioning of our site  and enable you to register and login, to easily move around our site, and to access secure areas. Without these cookies our site won't function properly.  

These cookies are required

Performance Cookies

Performance cookies allow us to collect aggregated and anonymous data on how our site is used, such as the number of visitors to our site, how you navigate around and the time spent on our site and also to identify any errors in functionality. These cookies also help us to improve the way our site works by ensuring that you can find what you’re looking for easily, to better understand what you are interested in and to measure the effectiveness of the content of our site. 

Marketing Cookies

These cookies allow us to advertise our products to you and allow us to pass this information on to our trusted third parties so that they can advertise our products to you on our behalf. All information these cookies collect is aggregated and therefore anonymous. No personal information is shared to third parties. Any personal information collected while using our website could be used for direct marketing from Dimension Data only.

How to COPE with a growing employee device ecosystem

Blog

It was only 10 years ago that the iPhone – arguably the first modern smartphone – was introduced. Today, virtually every device we interact with, from our PCs to our kitchen appliances, is Internet-connected and even using the word ‘smart’ to describe them seems dated.

As we’ve grown accustomed to an intelligent device ecosystem in our homes, we’ve also come to expect a similar experience at the office. Employees now use a growing range of devices to do their jobs, putting new pressure on businesses to support this way of working.

This has driven the rise of BYOD (bring your own device) policies, by which employees use their own mobile devices, Macs (or laptops), iPads, and other connected technologies at work. Recent research from Markets and Markets suggests the BYOD market will be worth USD 73 billion by 2021, roughly twice as much as in 2016.

The advantage for businesses is clear. They benefit from the efficiencies of digital devices without having to cover the cost. The downside of BYOD is that it’s difficult to ensure data security and governance while managing the rapid proliferation of devices and user habits. Whether intentional or not, most security risks are a result of human error, which is why companies are now exploring device policies like COPE (company owned, personally enabled) - that allow them to govern data more closely.

How is COPE different from a BYOD approach?

In a BYOD ecosystem, IT teams often battle to find enough space to introduce secure data and device management measures – for example, through a secure container approach or dual persona technology – on employees’ personal devices. Under COPE, it’s easier for administrators to create space that’s required, as they’re working with the company’s own, fully managed devices. This makes COPE a simpler and often more robust approach.

The ability to ensure the full lifecycle management of these devices, while also ensuring compliance on a secure platform, and the ability to deliver a consistent user experience is driving more and more CIOs to shift from BYOD to a COPE model. COPE effectively gives businesses the ability to manage, move, add, and change the mobile super computers in our pockets and purses in the same way that they manage traditional desktop telephones.

Whether they choose a BYOD or COPE approach, companies must find a way of embracing digital transformation and empowering their employees to perform at the highest level, all while protecting their own interests. I believe that the scales will increasingly tip towards COPE, not only because of the advantages outlined above but because of the rise of integrated cloud-based workplace applications. These are the foundations upon which IT teams can build a consistent device ecosystem – which encourages employee adoption – while also maintaining oversight of how these technologies are being used across the organisation.

Of course, with companies now paying for employees’ endpoint devices they need the right management strategies and technologies in place to get the most from their investment. Learn more about how Dimension Data’s endpoint lifecycle management solutions and our new dedicated Apple practice can help your business achieve this and elevate the user experience of your device ecosystem from ‘good enough’ to great.

Previous Article: Petya ransomware attack and what you need to know Next Article: Gain more when you share control of your SAP Hybrid IT estate

You may be interested in

Blog

Are customers at the heart of your business strategy?

It’s an accepted truth that the organisations that will thrive are those who put their customers at the centre of their business strategy - but why?

Read blog
Blog

Performance management gets personal

Understanding the end user’s experience is key to the future of business agility.

Read blog
Blog

IT Trends 2018: Transforming customer experiences and business outcomes with the Internet of Things

It was in 1909 that Harry Gordon Selfridge, founder of Selfridges, coined the phrase ‘the customer is always right’ and went on to embed the philosophy across his retail empire.

Read blog
Blog

Kiss customer authentication issues goodbye

Your voice is your password with biometric authentication. There’s an exciting trend in customer analytics and it’s gaining massive traction.

Read blog