Solved

Securing Apple devices in a corporate environment

Posted on 2011-03-10
2
453 Views
Last Modified: 2012-05-11
Dear all

Since the rapid uptake of Apple devices in our company I have noticed how few of the management team turn on the auto lock feature saying how annoying it is each time they want to use the device. As far as I’m concerned this is the first line of defense for these devices.

After questioning the GM’s some have installed apps to find the phone if need be and wipe it if they decide but In most cases this would be too late, sensitive information would almost certainly have been stolen.

Has anyone out there come across an app similar to Windows AD policies that enforce using the auto lock for instance and other functions and obviously stop the user from turning it off

Regards

Stephen Millard
0
Comment
Question by:stefmil
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 40

Accepted Solution

by:
Eoin OSullivan earned 125 total points
ID: 35105934
Have you looked at the AppleConfiguration Utility?
http://www.apple.com/support/iphone/enterprise/

It allows you to create preset configurations and deploy across multiple iphones and these include the autolock timeouts and all the other main settings including mailboxes etc.
0
 
LVL 3

Expert Comment

by:lloydforth1
ID: 35106175
Lion Server 10.7 which is not yet out but still in development will have these features built in according to early reports. Until then the iPhone / iPad Configuration utility is the only way to go.

Also take a look here

http://www.apple.com/uk/support/ipad/enterprise/
0

Featured Post

Space-Age Communications Transitions to DevOps

ViaSat, a global provider of satellite and wireless communications, securely connects businesses, governments, and organizations to the Internet. Learn how ViaSat’s Network Solutions Engineer, drove the transition from a traditional network support to a DevOps-centric model.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
Users will learn how to set proper sequence settings, scale images, paste attributes, add transitions, fades, and music. Open up Final Cut Pro 7 and Create a new Project: Set the Sequence Settings. a) Click File > Easy Setup > Format > Apple ProRe…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question