Containers & Wrappers Once youve identified mobile security threats the next step in the mobile-aware enterprise enforcing mitigation strategies. Explore containers and wrappers from a Bring Your Own Device (BYOD) and Company-owned Device (COD) perspective.