From the course: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,000 courses taught by industry experts.

Mobile deployment models

Mobile deployment models

- [Instructor] Organizations use many different approaches to deploy mobile devices that are owned by either the company or employees. While the BYOD approach works for some organizations, others seek more control over the devices, or don't want employees to bear the burden of purchasing and maintaining their own mobile devices. For this reason, some alternative strategies have cropped up to supplement BYOD and the traditional company-owned device model. The choose your own device, or CYOD strategy, recognizes that different employees have different personal preferences when it comes to devices. Some may want to use an iPhone, while others want Android devices. Some may prefer the smallest form factor possible, while others would like a larger screen. Employees might prefer smartphones or cellular enabled tablets. In a CYOD strategy, employees select the equipment that they would prefer to use, and then the company purchases it and manages it for them. Some organizations following the…

Contents