While an increasing number of corporations are evaluating BYOD/PC policies for personal devices or laptops, issues around security, management, support, data retention for legal purposes, and compliance have dampened the enthusiasm. A choose-your-own-device or PC (CYOD/PC) program is a viable alternative strategy for those companies looking to satisfy employee demand for better, more mobile devices and laptops without sacrificing IT control and oversight.

Like BYOD, CYOD challenges IT to embrace a strategy for managing data across a variety of devices – albeit in a slightly more limited and controlled way – depending on how your company implements the program. A typical CYOD/PC program enables IT to offer a relatively large number of different models of laptops, so that employees have greater variety in the kinds of computing devices they have to work with, while ensuring IT has the proper mechanisms in place to manage them. Unlike BYOD/PC programs, the devices themselves remain the property of the company - not the employee, thereby ensuring a level of control and oversight not possible on personal devices.

As with a BYOD/PC program, the key to success is providing a secure, containerized workspace for easy IT management, security policy enforcement, and offline capability. Moka5 for CYOD/PC delivers all these must-haves in a rapidly deployed, lightweight platform.

Moka5 for CYOD/PC enables IT to manage employees’ devices from one unified management console. With more than 130 policy settings, you can configure appropriate levels of security and access company-wide, for a single department, or individual workers. No more toolset schizophrenia because some of your employees have chosen Windows and some Macs. Using Moka5 for CYOD/PC ensures all your endpoints are up to date and secure. And, with full remote wiping capability, lost devices are never a problem with Moka5.

Benefits of the Moka5 for CYOD/PC Solution:

  • Single image management. Manage and secure a single corporate workspace instead of 100’s, 1,000s, or 10,000s of endpoints, regardless of who owns the device and whether it is a Windows or a Mac PC.
  • Self-service provisioning. Users download the corporate workspace from anywhere through a secure web portal and can be initially provisioned and authenticated without network access (since they won’t have their secure corporate workspace to access the network until after the provisioning).
  • Locally executed. Unlike VDI, everything takes place on the user’s computer for better performance and seamless transitions between online and offline use.
  • Revoke / wipe. IT can remotely disable access or wipe LivePC containers or set a “time bomb” to automatically revoke access to or completely wipe a container.
  • Reliable access control. LDAP/AD integration, two-factor authentication support ensures that you can use your existing access control processes.
  • Built-in data leak prevention. Policy-enforced container keeps corporate data separate from personal files, including the ability to prevent copy/paste, white list USB devices, and control printing.