Rethinking BYOD security: protecting data without trusting devices

BYOD (bring your own device) has always looked better on paper than it does in real life.

The promise is clear: let people use the gadgets they already own. Less friction, lower costs, and more freedom. But when security and privacy are non-negotiable, the conversation around BYOD usually ends quickly. Not because BYOD is a bad idea, but because the model behind it doesn’t quite work. With BYOD, you’d be trying to secure something that isn’t meant to be trusted.

By definition, a personal device is something you can’t control. It runs apps that you don’t know about, connects to networks that you don’t trust, and then gets lost, broken, or replaced. You can try to control it, limit it, or wrap it in rules, but in the end, your data has to be processed and often stored on it; within an environment you don’t fully control. And those issues never really go away.

Devices: the wrong place to fix the problem

The device is the main focus of most BYOD security plans. MDM (Mobile Device Management), dedicated partitions, policy enforcement, remote wipe, and so on. They all try to make the endpoint behave in different ways.

For example, think about work partitions. In practice, this usually means making a separate “work” space on the device itself, where corporate apps and data can live without being mixed up with other things. It sounds good. There is a line, rules, and a clear boundary between personal and work use.

But the important detail is easy to miss. That partition still runs on the device. The applications execute locally. The data is stored locally. It may be encrypted, restricted, and tightly controlled, but it is still on a personal device, which means you are still relying on a device you don’t fully control to do the right thing.

And in a lot of cases, these protections aren’t even always used. Not all devices are managed, not all users set things up the same way, and not all environments enforce strict isolation.

As such, the endpoint remains the weakest part of the system. It is where variability lives, and where assumptions break. And yet, it is also where sensitive data is allowed to exist. Instead of trying to make BYOD devices more secure, a more basic question comes up: why is that data even allowed to be on them? Is this really best practice BYOD security?

Moving the boundary

With remote mobile application streaming through platforms like Anbox Cloud, which runs Android apps in the cloud and streams them to devices, you can make a fundamental, positive security shift.

Rather than relying on the physical device to come through for you, you move as much as possible off of the physical device. You move the boundary of trust.

Your applications run in the cloud, and your data stays in the cloud. All execution happens in an environment you control, with the device used simply to access a remote session. Nothing is installed locally, nothing is stored locally, and nothing persists beyond the session. The remote instance is streamed to the user’s device using a simple browser.

It’s a simple move, but a significant change in posture.

What changes in practice?

Consider a simple scenario: a field operator in a defense context loses their personal phone during a deployment.

In a traditional BYOD security model, this would immediately trigger a response: remote wipe, access revocation, and usually a lingering question about what might have been exposed. Even with strong controls, there is always some uncertainty: emails, documents, cached data, and credentials may have been exposed.

With a remote instance using Anbox Cloud, the situation is different.The device contains no applications, no data, and no credentials tied to the organization. What was running was a remote session. The data itself lives in an entirely different location.

If no session was active, then there is nothing to recover, and no action is required. If a session is active, access can be revoked centrally and the session terminated immediately. There is no data to recover because the device never contained any data in the first place.

This doesn’t mean there is zero risk, but the risk is moved to the backend and significantly reduced. Instead of investigating what may have been exposed on a lost device, the focus is on controlling access from one single place.

Now let’s look at another scenario. Let’s say the device was not lost; rather, it was hacked. Malware is installed, or the OS itself is no longer trustworthy. In a traditional setup, this is a harder problem. Even with separated spaces or partitioning, you are still depending on the integrity of the underlying system to enforce isolation. The conversation quickly turns into assessing how much you can still trust the device, and for how long. With remote mobile streaming, offered by solutions like Anbox Cloud, the impact is contained by design. The compromised device can still display a session to a bad actor, but it has no local access to applications or data. There is nothing stored to extract and no application logic to reverse-engineer: the session is streamed using WebRTC. 

Even if the device contains an open session, it will still require authentication (account, password, multi-factor authentication) to access apps and data, and sessions can be terminated centrally at any time.

Overall, the device is untrusted, but that no longer changes the outcome. Once data and execution are removed from the device, a lot of situations that used to be complex become predictable.

BYOD, without compromise

What matters is where applications run, and where data lives. Through BYOD, organizations can simplify how they operate. The need to tightly control hardware starts to fade.

In that sense, this isn’t replacing BYOD; it’s evolving it into something that is finally compatible with strict security requirements. This is where removing data and execution from the device changes the equation for BYOD, and it stops being a compromise.

Rather than being something you tolerate for flexibility, it becomes a paradigm that can apply to both personal and corporate-managed devices. If the device holds no data and runs no sensitive logic, its security posture becomes far less critical. Whether it is corporate-managed or fully personal becomes a secondary concern.

A model aligned with high-security environments

In sectors like government or defense, the requirement is not just to reduce risk. It is to know, at all times, where data can exist.

Traditional approaches try to enforce that through policies on devices that are, by nature, difficult to fully control. It works to a point, but it rarely provides absolute assurance.

With remote access via Anbox Cloud, the model is explicit: data does not leave the controlled environment. Applications run in isolated instances; sessions are ephemeral, while access is centrally defined and auditable. You are not trying to contain data once it spreads. You are preventing it from spreading in the first place.

A familiar shift

We’ve seen this pattern before. Applications migrated from local machines to centralized environments – initially through virtual desktops, followed by cloud-native applications and containers – enhancing control, consistency, scalability, and security. Over time, the idea that a particular device should hold critical data became less relevant.

Mobile is following the same path. Decoupling applications and data from the device is not a radical idea; it is a natural continuation of that shift.

Where to go from here

If you’re rethinking your BYOD security strategy, the question is not which controls to add to the device. It’s whether the device should be part of your security model at all.

Start by identifying which applications and data truly need to be exposed to endpoints today and what would change if they didn’t.

Anbox Cloud is one way to make that shift practical. If this resonates, it’s worth exploring what a fully remote, device-agnostic mobile workspace could look like in your environment.

Give Anbox a try. If you have any questions, feedback, or need a helping hand along the way, our team is always happy to hear from you, we are just a message away. 

Further reading

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

Cloud-native Android™ infotainment: your CI pipeline shouldn’t depend on hardware

More and more often, infotainment systems are being developed and delivered like software, yet often they are still tested and validated using...

From cloud to dashboard: experience the future of infotainment development at CES 2026

This year, we’re excited to show a demo that combines the strengths of both Anbox Cloud and Rightware’s Kanzi, the industry-leading software for creating...

Anbox Cloud 1.28.0 is now available!

Enhanced Android device simulation, smarter diagnostics, and OIDC-enforced authentication The Anbox Cloud team has been working around the clock to release...