Do You Allow Employees To Use Their Own Devices For Work?  
The evolution of personal mobile devices and the rise of how necessary they are to business success these days are forcing many small business owners to make a choice - “Bring Your Own Device” (BYOD) vs. “Corporate Owned, Personally Enabled” (COPE). The Typical Solution? BYOD.

Here are some interesting statistics:

According to Microsoft, 67% of workers use their personal devices in the workplace. (Source: CBS MoneyWatch)

  • By 2017, 50% of companies will require employees to provide their own devices for their jobs. (Source: reported by Gartner)

  • Between 2013 and 2018, the global BYOD security market is projected to grow 31.95%. (Source: Market Research Reports)
How do you support and secure all of these devices, when small-business employees use their personal mobile devices for work.  The scary thing is that most small businesses don’t even try!
An earlier CDW survey found that only 1 in 5 small businesses have deployed (or plan to deploy) any systems for managing and securing employees’ personal devices.

The Alternative? A COPE (Corporate Owned, Personally Enabled) (“COPE”) policy instead. Here, employers buy their employees’ mobile devices, secure them, and then let employees load additional personal applications that they want or need.  With regard to control, the employers control what types of apps can be added and the “personally enabled” aspect of COPE allows employees to choose the company-approved device they prefer while permitting them to use it both personally and professionally.

COPE is certainly more controlled and secure, but for a business with a limited budget, buying devices for every employee can add up pretty quick. If you go the COPE route and are large enough to buy in volume, you can likely negotiate substantial discounts. However, if you are like most small to mid-size businesses, you typically have a BYOD policy and need to address Security Concerns.

However, if you have client information that must be kept secure or other industry specific regulations regarding the security of client data, then COPE is likely your best approach. It takes out any gray area of whose data is whose. Plus, there is a certain comfort level in being able to recover or confiscate any device for any reason at any time to protect your company without any worries of device ownership.
If you are struggling to figure out which option is best for your business? We can help!

About Tech 2020 Solutions
Tech 2020 Solutions offers complete turn-key solutions for the technologies that drive your business, stores and secures your data and helps you communicate in and outside of your company.

Offering offer multiple levels of on-site and remote support, monitoring and maintenance for your data, IT, phones and peripheral equipment needs including: general IT Support and Services, Cloud Storage and Applications, Network Security, Back Up, Mobile Solutions, VoIP Phone Systems, Unified Communications, Business Continuity, Disaster Recovery and other Scalable Technologies.
Visit to learn more about Tech 2020 Solutions, Inc. or call 516-876-8761 or email

Power Up with John Hassler is a blog distributed by Tech 2020 Solutions, Inc. and written by John Hassler, President and Founder of the company.  To reach John, contact him at 516.876.8761 or via email at  Connect on Linked In and Facebook.