By Tom Kendra\n\n\nUntil recently, most enterprise mobility strategies were based on corporate-owned devices that gave IT complete control over who used it, what was on it, what was done with it and what it accessed. IT could even wipe it if the device was lost or stolen. Fast-forward a few years and mobility is all about bring your own device (BYOD) and ensuring employee satisfaction and productivity by supporting as many devices as possible. One of our customers refers to the current state of BYOD as the \u201cwild Wild West.\u201d As further proof, our Enterprise Mobility Management solution tests against over 6,000 phone\/operating system version combinations.\n\n\nThe first point of interest is the raw number of devices. You certainly do not want a different approach for every combination, so find heterogeneous solutions. Second, balance the needs of users against the burden on IT. Then balance users\u2019 desire for choice against the company\u2019s need for security and compliance. This is where context becomes king.\n\n\nAn organization might decide (and many do) that not all devices should be able to access all data resources anytime from anywhere. Successful BYOD programs limit access according to context: the user, type of information, related laws and regulations, the user\u2019s location and time of day. For example, if a U.S. company has no employees in or traveling to the Far East, it may choose to prevent access by any device attempting to log in from China. Or, if there are employees located in China, the enterprise may decide that users logging in from there have only two or three tries to get login information correct, while users in the United States have five.\n\n\nAnother important context covers private and sensitive data, such as medical records and M&A information. An enterprise may want to restrict any BYO device from storing this information locally because the risk to the enterprise of a compliance violation or information leak is simply too great. Other controls might be on the ability to copy and paste in between applications on the device.\n\n\nEnabling a context-aware BYOD strategy is relatively straightforward. If you already have a mobile platform, add an identity and access management (IAM) solution. If you don\u2019t have a mobility solution or have come to understand your existing solution is seriously incapable, look for a comprehensive solution that has IAM integrated into it.\n\n\nAlso consider the importance of utilizing a secure workspace strategy. Such a workspace installed on BYO devices gives IT complete control over data in the workspace without impacting personal information outside the workspace. The results is far more flexibility when it comes to context decisions. For example, with a secure workspace on a device, an enterprise may decide the risk of storing sensitive information locally is no greater than for a corporate-owned device. So users get the freedom of choice they demand and complete access to the information they want, while IT gains the security and compliance needed.\n\n\nEnterprises moving forward with a BYOD strategy\u2014or even just considering one\u2014must make the ability to set policies based on context the top consideration. The alternative is peril for the organization.