There is a classic tension between technical requirements and user requirements - users care little about technical requirements, especially when they interrupt task completion. This tension is elevated within the burgeoning “Bring Your Own Device” (BYOD) model of enterprise mobility enablement - users care even less about technical requirements when they interrupt use of their personal mobile device, as is frequently the case with security requirements. In this paper we present a case study of a mobile virtualization solution for BYOD security. We detail the design and execution of an enterprise-scale pilot program of a container security solution on Android and iOS devices. Through the use of direct performance assessment and user satisfaction measures, we identify some of the universal factors mitigating the relationship between security and user freedom. In doing so we offer a hopeful manner for implementing a secure, widely adopted, enterprise BYOD program.