Device Management In The Enterprise

Device Management

There are ways in which the roll out of BYOD initiatives can be successful and the key is in the way they are managed. With the proliferation of mobile devices and IT consumerisation, more employees will expect to work in companies that have a BYOD or CYOD policy. Today’s users want to have anytime, anywhere access to all the tools they need from day one. It is therefore vital for IT to educate end-users, particularly regarding security and corporate data.

However, IT should avoid being too heavy handed in enforcing these policies. A survey by JAMF Software revealed that 50% of users would abandon BYOD if the organisation had an enterprise mobility management scheme in place. This would indicate that there is a knowledge gap among users, where they may not appreciate the full implications of a security breach or corporate data loss as a result of BYOD, and how the business could actually protect the employee. This is where training is required and it needs to be on a regular basis.

As more companies allow employees to use their preferred devices for work or offer them a choice of device, which will invariably include an Apple device, there must be an increased focus on support to ensure company data remains secure without overstepping on user privacy and this is where the device management solution will take centre stage. Firstly, the IT department must understand their security requirements and then translate those requirements into tasks and tools to deploy, activate, and monitor.

For corporate-owned devices, this task set will include full disk encryption, password protection for organisational assets, and protection from software that may hide hacks and attacks. In some organisations with vulnerable users, IT may also need to regulate explicit content. By using third-party software tools, organisations can not only deploy the right software and settings to users, but can also monitor those settings and automatically make corrections as needed.

For personal-owned devices, organisations can also look into implementing a management solution that simplifies MDM and tames BYOD, but that also lets IT deliver the requisite levels of user enablement, productivity and self-sufficiency. These MDM tools can help IT departments maintain a measure of control of corporate data, with the ability to remotely wipe corporate data, enforce passwords and gather corporate inventory. Users feel that their device is protected and can have visibility of what IT has access to on their device. This trust between IT and users should form the basis for any BYOD or CYOD program.

Lastly, it is recommended that organisations look to a managed roll out of BYOD or CYOD initiatives. Businesses can look to a micro roll out to test-bed the success rate of a BYOD implementation with a small team and monitor uptake. This will enable the IT team to make any changes needed before moving to a department roll out and if proven successful, move to large scale implementation across the organisation.


Tad Johnson has built his career around technology and passionately believes in the ability for technology to improve people's lives. Tad has spent the past decade working in IT, first as a practitioner and now creating enterprise software for the IT industry. With JAMF Software, he's found a place to share his lifelong interest in Apple computers with the world.