What is Android Enterprise Recommended?
Understand how Android Enterprise Recommended devices offer superior security and manageability for your field workforce.
Get fresh insights, pro tips, and thought starters–only the best of posts for you.
In markets like Johannesburg and Lagos, a lost phone is rarely just “lost.” It is often the result of a targeted “snatch and grab.” For IT teams operating in African logistics, finance, or field services, mobile device security isn’t a hypothetical risk it’s a daily operational reality. When a delivery driver’s tablet disappears in traffic or a fintech agent’s terminal is taken, the hardware cost is the least of your worries.
The real danger isn’t the lost device; it is a gateway to your customer database, your logistics routes, and your mobile money credentials.
You cannot stop a thief from taking a device, but effective mobile device security can stop them from profiting from it.
Hexnode changes the equation by acting as a remote Kill Switch. We transform your mobile fleet from vulnerable endpoints into secure bricks. If a device goes missing, you don’t cross your fingers; you execute a protocol that renders the device useless and the data invisible, instantly.
A delivery driver in Nairobi reports their tablet snatched from the cab. The thief’s immediate goal is usually to wipe the device for resale or, worse, to access the corporate apps to transfer funds or steal customer data.
You don’t need to hope the thief has a conscience. You just need to log into the Hexnode console. With a single click, you activate Lost Mode, effectively turning the smart device into a useless brick.
Instant Lockdown: Executing “Enable Lost Mode” overrides everything on the device. It forces the screen into a locked state that the thief cannot bypass. They cannot access the home screen, settings, or any apps. The device is frozen.
The “Return to Owner” Message: While the device is locked, you control the only thing displayed on the screen. You can configure a custom message, such as: “This property is stolen and monitored.” Please call [Company Number] for a reward.” This removes the resale value of the device while offering a path for recovery if it was merely lost.
Persistence: Thieves often try to restart the device to bypass security. On Supervised iOS and Android Enterprise devices, Hexnode’s Lost Mode is persistent. Even if they hard-reboot the phone, it wakes up immediately back in the locked state. Without your admin credentials, the screen remains impassable.
In logistics and field operations, location is everything. If a delivery tablet assigned to a specific district in Cape Town suddenly pings on a highway heading out of the city, you don’t need a notification an hour later you need to know now. That movement is often the first indicator of theft or unauthorized usage.
Hexnode turns your map into a security grid. By establishing virtual boundaries, you ensure that devices are only functional where they are supposed to be.
Virtual Perimeters (Geofencing): You can draw a digital perimeter around your warehouse, office, or a specific city district. Hexnode supports both simple Circular Geofences (radius-based) and complex Polygon Geofences, allowing you to trace exact delivery routes or neighborhood boundaries.
Automated Triggers (The Digital Tripwire): This is where tracking becomes active in security. You can configure a policy so that the moment a device crosses that geofence line, an automated reaction is triggered.
Location History: If a device goes missing, real-time tracking might not be enough if the battery dies, or the SIM is pulled. Hexnode’s Location History keeps a detailed breadcrumb trail of where the device has been. You can pull out a report showing the exact route and timestamps, providing critical evidence for police reports or internal investigations to aid in recovery.
Learn how to secure your supply chain and track your fleet in real-time.
Explore Logistics MDMSometimes, you have to accept the loss. If the tracking shows the device is in a high-risk area or has gone offline for 48 hours, the priority shifts from device recovery to data protection. At this stage, the goal is simple: ensure that whoever holds that device holds nothing of value.
When recovery is impossible, Hexnode gives you the “Nuclear Option.” You can initiate a command that scrubs the device clean, ensuring that your customer lists, banking apps, and internal emails do not end up on the black market.
Complete Wipe (Factory Reset): For corporate-owned devices, you can execute a Complete Wipe. This does not just delete business emails; it performs a full factory reset. Every contact, photo, app, and file is erased. The device returns to the state it was in when it first left the box, ensuring absolutely zero data remains for the thief to extract.
Factory Reset Protection (FRP) – The “Brick” Effect: A common tactic for thieves is to steal a phone, factory reset it themselves and resell it as a “clean” device. Hexnode stops this cold on Android Enterprise devices.
Even after the device is wiped (either by you or the thief), Factory Reset Protection (FRP) remains active.
The Result: When the thief tries to set up the “fresh” device, they are blocked by a screen demanding the original corporate Google account credentials to proceed. Without your IT team’s login, the device is completely unusable, effectively turning a valuable smartphone into a useless paperweight.
In many African markets, providing a corporate device for every delivery driver or field agent isn’t financially viable. The alternative is BYOD (Bring Your Own Device).
However, employees often resist this, fearing that installing “corporate software” gives their boss the ability to read their personal WhatsApp messages or delete their family photos.
Hexnode solves the privacy deadlock by leveraging the Android Enterprise Work Profile. This technology allows you to manage data, not the device. We create a secure, encrypted “container” on the employee’s personal phone that sits completely separate from their personal life.
Yes.
However, real-time tracking and immediate remote actions require internet access.
No. Once a Complete Wipe (Factory Reset) is executed:
This action should only be used when recovery is unlikely.
Removing the SIM card:
However:
Lost Mode primarily locks the device and displays a custom message. Location tracking must already be enabled or separately configured. Administrators can manually request the latest location while the device is online.
In dynamic markets like logistics and field finance, your “office” is no longer a building with four walls and a security guard; it is a delivery bike in Lagos or a sales terminal in Johannesburg. In this environment, you cannot rely on physical control to protect your assets. Hexnode provides the digital infrastructure to secure your data even when the physical device is compromised.
Try Hexnode's Lost Mode and Geofencing free for 14 days.
Start Free Trial