Category filter
App Containerization Logic: Isolate Work Data on BYOD (Personal) Devices
In the modern “Hybrid Workforce,” the Bring Your Own Device (BYOD) model has become the standard, offering employees flexibility while presenting IT departments with a complex security paradox. To bridge the gap between corporate data protection and individual user privacy, Hexnode UEM utilizes App Containerization Logic.
This approach moves beyond traditional, invasive Mobile Device Management (MDM) by creating a secure, encrypted “Guest” environment within the user’s personal “Host” operating system. By virtually partitioning the device, Hexnode ensures that sensitive corporate assets such as internal emails, proprietary files, and managed credentials are isolated from personal social media, photos, and unmanaged applications.
1. The Strategic “Air Gap” Logic
Hexnode distinguishes between device-level control and data-level control:
- Logical Partitioning: Rather than a hardware partition, Hexnode utilizes OS-native APIs to create an encrypted “Work Profile” (Android) or “Business Container” (iOS).
- Corporate Wipe (Selective Wipe): Unlike a “Complete Wipe” (factory reset), a Corporate Wipe removes only the policies, apps, and data deployed via Hexnode. Personal photos, messages, and unmanaged apps remain untouched.
- Data Leak Prevention (DLP): Admins can restrict the movement of data between managed and unmanaged apps (e.g., blocking “Copy” from Outlook to a personal Notes app).
2. Implementation Framework (Cross-Platform)
A. Android Enterprise: Work Profile
Android remains the most robust for physical separation.
- Architecture: Hexnode uses Profile Owner mode to create a dedicated user space.
- Visual Badge: Managed apps are identified by a Blue Briefcase icon.
- Hexnode Path: Enroll > Platform-Specific > Android > Android Enterprise.
- Privacy: Hexnode cannot see personal app lists, SMS, or call logs outside the work profile.
B. iOS/iPadOS: User Enrollment
Apple’s BYOD-specific enrollment focuses on Managed Apple Accounts.
- Managed Open-In: Hexnode configures restrictions that prevent data from managed sources (apps installed via Hexnode) from being opened in unmanaged destinations (personal apps).
- APFS Volume: Work data is stored on a separate, cryptographically tied APFS volume.
- Hexnode Path: Policies > iOS > Restrictions > Allow documents from managed sources in unmanaged destinations (Set to False).
C. Windows: Application Compliance & Security
For BYOD laptops, Hexnode secures data through app-level management and restrictions.
- App Compliance: Hexnode checks for “Blocklisted” apps and marks the device non-compliant if they exist, without deleting personal software.
- Windows Information Protection (WIP): Although Microsoft has shifted focus toward Purview, Hexnode still supports WIP policies to tag data as “Work” vs “Personal” for local data protection.
- Hexnode Path: Policies > Windows > App Management > Application Compliance.
3. Comparison: Complete vs. Corporate Wipe
| Feature | Complete Wipe (MDM) | Corporate Wipe (MAM/BYOD) |
| Data Deleted | Everything (Factory Reset) | Only Corporate Apps/Configs/Data |
| Personal Data | Erased | 100% Intact |
| UEM Status | Device is disenrolled | Device is disenrolled/managed apps removed |
| Typical Use | Lost/Stolen or Corporate-owned | Employee Resignation/BYOD |
4. Key Security Guardrails in Hexnode
- Managed Browser: Force corporate web traffic through the Hexnode Browser to ensure “Managed Open-In” rules apply to web downloads.
- Screenshot Restriction: (Android/iOS) Policies > Restrictions > Allow Screen Capture (Set to False for the work profile).
- Work Profile Password: Admins can enforce a separate, complex password specifically for the work container, different from the device’s lock screen.