Your planned program, where employees are offered a choice of company-owned devices, can improve end user satisfaction and flexibility, at the same time as ensuring data and device security. With device management under IT's control, risk exposure is greatly reduced.
Manageability will be easier with IT controlling the program in-house. Because devices are approved by the company, IT can recommend suitable PCs for each user type, so that applications run more efficiently. And if all devices have the same connections, it's easier for IT to set up meeting rooms and hot desks that are compatible for every user. Which means your users will also experience better collaboration and increased productivity.
Recommendations for Your New Program
As you ramp up your new program, Lenovo recommends the following:
- Audit job roles in your organization to get user input on preferred device types. Today there are many types of device available, each with their own advantages for different worker roles. Gain user buy-in ahead of time to ease the transition to your new program.
- Select a vendor that can meet the hardware needs of all financial services users - whether mobile workers with frequent travel, office-based employees or those with advanced computing needs that require more powerful workstations. Your vendor should also provide an ecosystem of services and accessories, to help users make the most of their new devices.
- Include only business -grade devices in your portfolio. These devices have the highest level of build quality, support services, security features and connectivity options. For example, access prioritized tech support and on-site servicing. In an industry where data security is so important, only business-grade devices have hardened security features that meet the latest financial regulatory standards, which features like data encryption, multi-factor authentication and real-time threat assessment of public WiFi networks.
- Plan and implement a comprehensive mobile protection strategy, factoring in features such as Windows 10 Pro mobile device management (MDM) which can be configured to prevent sensitive financial data from being copied into personal emails or other applications.
- Put in place a process for recycling old devices, ensuring that confidential data is properly and verifiably destroyed, and that assets are disposed of in an environmentally responsible way. This can be outsourced, for example with Lenovo Asset Recovery Service. Such services can also provide cash for your old devices, which can help to reduce the overall cost of new device acquisition.
With your new program, you should have a mobile device policy in place. Some best practices include:
- Factoring in a mix of business and personal use. Set restrictions on corporate data and intellectual property using a mobile device management (MDM) solution.
- Having a viable process for handling old devices. Do they get reassigned to another employee? What happens to stored data that might be confidential?
- Considering the latest solutions for remote erase of data on devices which are lost or stolen.