Mobile Device Deployment Models 2.5 Flashcards

1
Q

Bring Your Own Device (BYOD)

A

Employee brings in their device as long as it meets company criteria. These are difficult to secure. Determine how to protect the data and what happens to the data when the device is sold/traded in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Corporate Owned, Personally Enabled (COPE)

A

Company buys the device. Used as corporate and personal device. All information on the device is protected by the organization because of corporate policy. This means the information on the phone can be deleted at any time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Choose Your Own Device (CYOD)

A

Similar to choose your own device but the employee gets to pick the device they want the corp. to buy for them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Corporate-Owned

A

Company owns the device, no personal use. This is for only the tightest security needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virtual Desktop Infrastructure (VDI) / Virtual Mobile Infrastructure (VMI)

A

The apps are separated from the mobile devices and are running on remote servers. The data is also separated from the mobile device securely. A lot of risk in minimized if the device is lost. Additionally a centralized applications can be made on the server for all devices to use. This also means that there is no need to update all the mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly