Optimizing Your Device Choice Program

In both commercial businesses and the public sector, employees increasingly want the freedom to use their own devices to perform their work. But instead of allowing employees to use personal devices for work, most organizations are doing exactly as you have done - enabling workers to choose from a range of IT-provisioned devices. We believe this approach will help you streamline collaboration, harden security and free up IT’s time to support other initiatives, instead of policing and supporting the proliferation of personal devices at work.

Emphasize “Choice”

From your users' perspective, one drawback of your program is that it doesn’t offer the unlimited variety of a bring your own device (BYOD) policy. To offset this, Lenovo suggests populating your device portfolio with a range of device types. You can also customize each user’s options according to their job role. Moving forward, you’ll want your portfolio to include:

  • Business-grade build quality, support services, security features and connectivity options. For example, access prioritized tech support and on-site servicing. Or achieve the highest security standards with hardware-based fingerprint readers which are much harder to hack.
  • A range of device types based on an audit of job roles in your organization. Today there are many choices, each with their own advantages for different worker roles. Gain user buy-in ahead of time to ease the transition to your new program.
  • Intel® Active Management Technology, which enables IT managers to discover, repair and help protect networked computing assets. They can also remotely erase all the data on a device which has been lost or stolen.
  • Windows 10 Pro security features that help to protect data in the event of a human error or if a device is lost or stolen. For example, Windows Information Protection helps prevent unauthorized or accidental sharing of company information and allows you to remotely delete data from a lost or stolen device. BitLocker data encryption, supported by many ThinkPad and ThinkCentre devices, will encrypt all data on a device, ensuring it cannot be accessed by unauthorized users.

Additionally, you can simplify PC deployment with a solution like Advanced Deployment Services. This is a customizable self-install wizard that enables final configuration steps to be performed by your end users instead of a technician. Whether joining a domain, installing software, setting up printers or migrating data, you can empower your end users to self-serve and reduce the burden on IT admins.

How Can You Improve Your Program?

New technology, users and budget challenges force you to continually evolve. Here are a few tips from Lenovo:

  • Include only business-class PCs in your portfolio (avoid low-security, hard-to-manage consumer PCs)
  • Audit job roles in your organization to get user input on preferred device types
  • Review the portfolio annually to determine your refresh needs. Make sure it includes device options for every user; don’t open the door to shadow IT and increased risk
  • Include managed business applications and containerization services during device provisioning to ensure better security and manageability
Optimizing Your Device Choice Program

It is really about allowing users to be more productive along with being able to enforce IT security. It is not about trying to regain any control; it is actually loosening the reins a bit to increase end user productivity.

Chad Holstead, President of Business Knowledge Systems


  • Offer employees more choice with our wide range of devices. Each has the support services and security features needed for work. For example, users can access prioritized tech support and on-site servicing.
  • Our commercial-grade devices are optimized to work with Windows 10 Pro security features like BitLocker data encryption, which encrypts all data on a device, ensuring it cannot be accessed by unauthorized users.