Category filter

Getting Started with Bring Your Own Device (BYOD) Management

Organizations are now comfortable, allowing users to work with the devices of their choice. Even though this improves the user’s convenience and reduces the company’s hardware expenditure, there is an increased risk associated with security and compliance. This is where an UEM solution like Hexnode can help.

With Hexnode UEM’s Bring Your Own Device (BYOD) Management, employees can use their personal devices to securely access the corporate network and resources in it. However, the corporate data should be secured without compromising employee’s privacy.

Containerization establishes discrete, encrypted containers on personal devices, separating work apps and data from personal apps and data. Hexnode permits the admin to manage only the apps and data within the container on a personal device.

Key features of Hexnode’s BYOD management

  1. Personal and work data segregation
  2. Security and compliance
  3. App Management
  4. Corporate Wipe

Android BYOD Management

Personal devices used for work-related purposes are recommended to be enrolled as Profile Owner in the Android Enterprise. It gives the employees the flexibility to use the device as their personal device and work device (without the apps and data in either of them getting mixed). The restrictions, apps, and content pushed to the device will only be accessible through the work container created on the device.


Ensure that your organization is enrolled in Android Enterprise program.

Profile Owner

  1. A separate encrypted work container will be created on enrollment.
  2. Work-profile apps and notifications can be identified with a work badge (briefcase icon), thus distinguishing them from personal apps.
  3. If you are using an app for both personal and business use, for example, the Play Store app, the app icon will be shown on the device twice – One in the unmanaged personal space and the other in the work container. The work app can otherwise be identified using the briefcase icon.

Some of the key features for managing Android BYO devices:

  1. Managed Google Play Store for the users to access the work approved Play Store apps
  2. App deployment policies to distribute enterprise and store apps to the devices
  3. Remotely set up app configurations and permissions using policies
  4. Android Enterprise restrictions for managing BYO devices (only the restrictions available for devices enrolled as Profile Owner will apply here)
  5. Work container deactivation on password non-compliance
  6. Passcode profile for the work container to protect the work apps
  7. Device Wipe to remove the work profile from the devices
  8. File Management to securely distribute corporate files to devices

iOS BYOD Management

The apps and configurations that are pushed to an iOS device via the UEM are considered as managed. Hexnode has a comprehensive set of policies that helps to ensure better security for such data.

Some of the key BYOD policies for iOS are:

  1. Standard Data Loss Prevention (DLP) passcode policy
  2. Business Container policy to restrict the data flow between the personal and corporate space
  3. Managed Domain policy to ensure secure access to corporate documents
  4. VPN policy for network security
  5. App Catalog policy to create a customized App Store on the device
  6. Web Clips to easily access websites

Windows BYOD Management

Hexnode provides a range of policies for managing the Windows 10 and Windows 11 BYO devices without compromising personal or corporate data sensitivity and device security.

Some of the key BYOD Policies for Windows include:

  1. Email policy to remotely configure work mail
  2. App deployment and management policies

macOS BYOD Management

Hexnode has a number of policies in place to build a secure and productive workspace for your employees using their macOS devices.

Some key macOS features you should include in your BYOD policy to manage the devices better include:

  1. Remotely configure accounts like Email and Exchange ActiveSync on your devices using policies
  2. App deployment and configurations
  3. App Catalog policy to create a customized App Store on the device
  4. VPN policy for network security
  5. Firewall policy to protect Mac from external attacks
  • Get Started