Logo bconnex

COBO, COPE, WPoCoD, COSU, BYOD, CYOD : understanding and choosing the right mobile fleet management strategy

24 April 2024

COBO, COPE, WPoCoD, COSU, BYOD, CYOD, etc.: these emerging terms define the way in which organisations manage mobile devices (smartphones, tablets, laptops, etc.) and their use by employees.

Although these acronyms may seem obscure, they play a crucial role in the way organisations tackle issues such as cybersecurity, the protection of their data and that of their employees, or their CSR and digital responsibility.

In fact, these terms reflect 2 types of strategy that every organisation needs to understand, weigh up and define precisely in order to choose the overall mobile fleet management strategy that suits it best :

  1. Terminal supply and IT asset management strategies (with the associated responsibilities): does the organisation supply the terminals? Do employees bring their own devices? How does the organisation manage its IT equipment (including mobile devices) ?
  1. Strategies for the ‘technical’ (or IT) management of terminals: does the organisation want to retain control over the use of the device or allow more flexible personal use? Does the organisation want to keep control of cybersecurity management ?

Explanations 👇🏻 

The different terminal supply and IT asset management strategies

Terminals are provided by the company: the company provides IT devices to employees

The first strategy for supplying mobile devices is for the company to supply mobile devices (smartphones, tablets, laptops, etc.) according to employee profiles (for example, an iPhone for a salesperson, a rugged phone for the field, a warehouse, etc.). 

Terminals can be supplied :

  • In ‘forced’ mode on a limited number of models
  • CYOD (Choose Your Own Device) mode with a catalogue offered by the company: a ‘compromise’ solution where the company offers employees the choice of their mobile from a pre-established list of devices, and bears the cost of acquiring and maintaining the equipment, while retaining control of updates and application installation.

In all cases, when the company chooses to provide its employees with IT terminals, it acquires or rents and configures the employees' IT equipment. In particular, it must replace or repair the terminals in the event of breakdown, breakage or theft, and can delete all data (professional and personal) if necessary.

Depending on the strategy chosen, the flexibility of the user is more or less restricted (personal use strictly forbidden or authorised but controlled by the company, etc.), to the benefit, for the organisation, of centralised management of terminals, cybersecurity and compliance. 


✅ Benefits : 

  • Centralised asset management with precise tracking of devices and their configurations
  • Preventive maintenance of all devices, saving time for the IT department and employees 
  • Control of service continuity in the event of loss, breakage or theft 
  • Possibility of integrating a responsible digital and CSR approach to IT assets (reconditioned equipment, repairs, recycling, etc.) 
  • Reinforces the feeling of belonging to the company 
  • Automatic upgrading when the fleet is renewed 
  • In some cases (CYOD), increased flexibility for employees in terms of choice of devices, allowing them to use familiar devices
  • Possibility of lower employee satisfaction if options do not fully match their preferences

❌ Disadvantages: 

  • High cost for the company to purchase and maintain the devices 
  • No personal flexibility for employees and possibility of lower satisfaction 

This strategy is ideal for companies that prioritise security and control, and are prepared to invest in the infrastructure needed to manage a homogeneous fleet of devices. 

Terminals are provided by employees: employees come to the company with their own IT terminals.

A second terminal provision strategy is where employees provide their own devices.

This is the BYOD (Bring Your Own Device) policy, which allows employees to use their own personal electronic devices (such as smartphones, tablets and laptops) to carry out work-related tasks.

This policy implies that the device is the sole responsibility of the employee: it is the employee who is responsible for their personal data and back-ups, and it is the employee who is responsible for replacing or repairing the phone if necessary, which can have a negative impact on service continuity depending on their responsiveness. To compensate for this, some companies offer to cover part of the cost of repairs.

Cybersecurity is also difficult to guarantee in a BYOD strategy, since it too is the responsibility of the employee. However, UEM and MTD solutions make it possible to secure professional use of these devices.


✅ Advantages of BYOD :  

  • Reduced costs associated with hardware purchases
  • Improved employee satisfaction by allowing them to use familiar devices 
  • Total flexibility for employees when it comes to choosing devices 

❌ Disadvantages of BYOD : 

  • Fleet management possible, but more complex 
  • No monitoring of equipment and preventive maintenance 
  • Loss of employee efficiency in the event of equipment loss, breakage or incident 
  • Little or no CSR or responsible digital approach (reconditioned equipment, repairs, recycling, etc.) 

The different ‘technical’ (or IT) terminal management strategies : COPE, COBO, WPoCoD vs Work Profile (BYOD)

Management in COBO, COPE, WPoCoD and COSU mode: available on terminals supplied by the company

In Corporate Owned Devices strategies, the company provides mobile devices (smartphones, tablets, laptops, etc.) according to employee profiles (for example, an iPhone for a salesperson, a rugged phone for the field, the warehouse, etc.). 

Personal use is formally prohibited (in the case of COBO (Corporate Owned, Business Only)) or authorised on a restricted basis (in the case of COPE (Corporate Owned, Personally Enabled)).

COBO (Corporate Owned, Business Only): the 100% professional device

In the COBO model, the company has total control over the devices, which are strictly intended for professional use.  

Personal use is completely excluded in this context, the devices are enrolled in MDM, EMM or UEM software, and the company can delete all the data if necessary (loss, theft, return).  

The COBO model corresponds to the highest level of control, because the devices are entirely controlled by the company. This involves centralised management of the IT estate and updates (OS and applications), complete encryption of devices, strict restrictions on the installation of applications and access to data, as well as constant monitoring of security threats (with MTD software) and, for certain devices such as laptops, the installation of firewalls and antivirus software to ensure complete protection of the company's data.

In concrete terms : application downloads via the Google Play Store are blocked, the use of a personal Google Drive account is blocked, and so on. In short, users have (virtually) no way of using their work mobile for personal purposes.


✅ Advantages of COBO :  

  • Centralised fleet management with precise tracking of devices and their configurations 
  • Internal cybersecurity management (choice of MDM, MTD, etc.) 

❌ Disadvantages of COBO : 

  • No personal flexibility for employees and possibility of lower satisfaction.

COPE (Corporate Owned, Personally Enabled): very professional, a little personal

In this configuration too, companies choose, acquire and configure their employees' IT equipment. The terminals are enrolled in MDM, EMM or UEM software and are the entire responsibility of the company. In particular, the company is responsible for replacing or repairing terminals in the event of breakdown, breakage or theft, and can delete all data if necessary. 

Unlike the COBO policy, in this configuration employees have the right to use the Google Play Store or App Store and download applications, whether for personal or professional use. However, the company can prohibit and block the use of specific applications. 

This is the most common and comfortable case for the company: the mobile device remains the property and responsibility of the company, and the latter has the right to delete the data in case of need (theft, loss, return,…). Since personal use is permitted, it is the responsibility of the employee to save his or her personal data. The downside here is, however, that the mix of personal and business data implies that data backups necessarily incorporate business data. 

In the COPE model, although the company controls the device, measures are necessary to protect employees' privacy. The implementation of VPNs, data encryption and rigorous access management are crucial. The company must also ensure that security updates are applied regularly and monitor devices for suspicious activity.


✅ Advantages of COPE :  

  • Preventive maintenance of all equipment, saving time for the IT department and the employee 
  • Control of service continuity in the event of loss, breakage or theft 
  • Internal management of cybersecurity (choice of MDM, MTD, etc.) 

❌ Disadvantages of COPE : 

  • Reduced personal flexibility for employees and the possibility of lower satisfaction. 
  • Backup of professional data during personal backups.

WPoCoD (Work Profile on Company Owned Device)

In this configuration too, companies choose, acquire (or rent) and configure their employees' IT equipment. The terminals are enrolled in MDM, EMM or UEM software and are the sole responsibility of the company. In particular, the company is responsible for replacing or repairing terminals in the event of breakdown, breakage or theft, and can delete all data if necessary. 

With WPoCoD, companies provide employees with devices and can configure a work profile on these devices to secure and separate work data from personal data. 

This configuration allows organisations to retain ownership of devices and assign corporate policies to devices, while preserving the privacy of employees who can safely use these devices for personal activities without compromising their confidentiality. 

Companies can apply selected policies to the whole device (such as wiping data from the device, USB blocking) and restrictions to the personal profile (such as blocking certain applications), but personal applications, data and usage are not accessible to organisations.


✅ Advantages of WPoCoD : 

  • Total control over the types of equipment deployed (brands, models) 
  • Total control over device lifecycle management (purchase or rental, repairs, recycling, reconditioning, etc.)
  • Total control over cybersecurity management, since it is managed in-house
  • Separation of professional and personal profiles, and their respective applications, data and restrictions
  • Potential for higher user satisfaction due to high flexibility of use

❌ Disadvantages of WPoCoD : 

  • MDM tools have fewer ‘rights’ than in a COPE configuration.

COSU (Corporate-Owned, Singe-Use) or kiosk mode

It is sometimes necessary to retain total control over mobile terminals and operate them in a very restricted mode: kiosk mode (or COSU) is precisely designed to lock down the use of devices, making it possible both to secure business data and to control access rights. 

The COSU configuration corresponds to a configuration in which so-called ‘dedicated’ devices are supplied and fully managed by the company and serve a specific, generally unique, professional use, for example :

  • Internally’ on the employee side: stock management, field service management, transport and logistics, etc.
  • In contact with customers: self-service devices, interactive terminals, digital signage, etc. 

By activating kiosk mode, access to mobile terminals will be limited to applications authorised by the administrator only, and users will not be able to perform any actions other than those predefined. The administrator configures a personalised desktop adapted to each type of usage scenario.

Furthermore, as devices used in kiosk mode are devices that can be left unsupervised or used for critical tasks, it is essential to secure them in a robust and strategic way.

In addition, to prevent misuse, dedicated devices are fully managed and owned by the administrator, who usually also manages the users.

In a COSU configuration, in kiosk mode, companies choose, acquire or rent and configure employees' IT equipment. The devices are enrolled in MDM, EMM or UEM software and are the sole responsibility of the company. The company is responsible for replacing or repairing terminals in the event of breakdown, breakage or theft, and can delete all data if necessary. 


✅ Advantages of COSU :  

  • Total control over the types of equipment deployed (brands, models) 
  • Total control over equipment lifecycle management (purchase or rental, repairs, recycling, reconditioning, etc.)
  • Total control over cybersecurity management
  • Avoids handling errors
  • Offers a tailored customer or employee experience

❌ Disadvantages of COSU : 

  • No flexibility for users in the use of devices.

Work Profile mode management: available on terminals provided by employees (BYOD)

BYOD (Bring Your Own Device): very personal, a little professional

Under the BYOD (Bring Your Own Device) policy, employees use their own personal electronic devices (such as smartphones, tablets and laptops) to carry out work-related tasks. 

This policy implies that the device is the sole responsibility of the employee: it is the employee who is responsible for their personal data and back-ups, and it is the employee who is responsible for replacing or repairing the phone if necessary, which can have a negative impact on service continuity depending on their responsiveness.

However, the company implements security measures and management software to secure business data while respecting employees' privacy.

In the case of BYOD, the company does not supply the device, but instead provides a business SIM card to the employee, who uses it in his or her personal phone. The device is registered in the company's MDM. The company can then create a business partition on the personal mobile device, into which business applications, among other things, can be downloaded.

Here, employees are responsible for their own updates (system and applications). But they often fail to do so, leaving the device vulnerable to threats.

In this case, the MDM can only be used on the professional side. The company will be able to delete the data on the professional side (Office suite or Google suite, for example), but there is no guarantee that the employee has not opened their professional e-mails via a ‘personal’ web browser instead of the dedicated application, or that they have not downloaded attachments to the personal side of the phone. 

The separation between the professional and personal parts can therefore easily be breached, putting the company's cyber security at risk. Setting up other solutions (conditional access, ZTNA, etc.) can prevent users from accessing their professional data from the personal part of their equipment.

Software such as Lookout, for example, can be used to manage device compliance by taking into account both the professional and personal aspects. In this way, a device that has a non-compliant application on its personal side will be treated as ‘at risk’ and may be blocked on its business side.

The principle of BYOD is therefore simple on paper, but its implementation and day-to-day management are often more complex than they appear. From a cyber security point of view, the threats and risks involved are significant.


✅ Advantages of BYOD :  

  • Reduced costs associated with hardware purchases.

❌ Disadvantages of BYOD : 

  • Security and compliance challenges associated with managing business data on personal devices

⚠️ Dangers of BYOD : 

  • Risk of losing control over the security of company and employee data, which can be reduced by additional building blocks (ZTNA, conditional access...)

The bconnex recommendation: provide your employees with mobile terminals 

Simplify the management of your computer terminals (and not just mobile devices!) 

Julien, co-founder of bconnex and a former CIO, explains: ‘BYOD brings real flexibility to businesses. But it also brings its share of problems for fleet managers’. He adds: ‘In theory, BYOD is magic. But only in theory. Fortunately, technical solutions exist to limit the risks and complexities.  

For example, some employees will not want to use the e-mail application provided by the company, but rather the ‘personal’ application they use on a daily basis, which they know better, and which they prefer to use even for professional purposes.  

Also, not all solutions are compatible with all devices or all OSes, which will bring another set of exceptions and potential problems.  

BYOD then requires a fleet manager and/or a support team to be available to assist employees on a daily basis with all these ‘exceptions’, which quickly becomes time-consuming and uneconomical in the long term. 

Of course, we can't recommend that you avoid BYOD at all costs and leave yourself hanging when it comes to managing your mobile fleet. Because that's exactly why we created MobileHub, an interconnected platform for managing your IT fleet efficiently and headache-free, whatever method you choose, and why we offer a range of complementary services. 

 Focus on real cyber security 

IT security is a central aspect of mobile fleet management and must also be taken into account when choosing your management model. This is another point that prompts us to recommend that you provide your employees with IT devices, and thus avoid BYOD. 

Users rarely separate their professional and personal lives on their IT equipment (smartphones, tablets, laptops, etc.), and this is even truer in the case of BYOD. However, the COBO, COPE and CYOD models enable companies to control the protection and deletion of device data.

This applies not only in the event of theft or loss of the device, but also when employees leave.   

Because when an employee leaves your company, what happens to the company data on their personal device? What guarantee do you have that the employee has actually deleted the company data when they leave, and that they have done so correctly ?   

What's more, with the development of teleworking and hybrid working, your employees are probably only allowed to work from their work computer and probably only allowed to connect via a secure connection (VPN). Why would they use their personal smartphone or tablet alongside their work computer ? 

The bottom line is that you should be able to guarantee the security of company data, whatever the mobile device and whatever the situation, and the best strategies for this are those of Corporate Owned Devices... 

Think about the well-being of your employees

The separation of professional and personal spheres and the disconnection outside work have become central concerns for employees. Some employees also question the security of their personal data in case of BYOD.

So why not make two shots in one stone by providing your employees with professional IT equipment? 😊

To conclude: the choice of mobile fleet management strategy, a holistic decision

There are several possibilities for organizations, whether in terms of IT terminals and mobile devices supply strategy or in terms of «technical» equipment management strategy.

The decision to adopt a COBO, COPE, WPoCoD, COSU, BYOD or CYOD strategy must be based on an in-depth analysis of the company’s specific needs in terms of cybersecurity, cost management and employee preferences.

Choosing the right mobile fleet management strategy for an organization requires a holistic view of the entire terminal life cycle and its related internal needs. 

You would like to be accompanied in choosing the management model that best suits you?

Contact us! 👇🏻

Some readings for you

bconnex

Offer a single point of entry for the secure and responsible provision and management of the user work environment
Be connected
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram