Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Securing Apple devices in a corporate environment

Posted on 2011-03-10
2
Medium Priority
?
458 Views
Last Modified: 2012-05-11
Dear all

Since the rapid uptake of Apple devices in our company I have noticed how few of the management team turn on the auto lock feature saying how annoying it is each time they want to use the device. As far as I’m concerned this is the first line of defense for these devices.

After questioning the GM’s some have installed apps to find the phone if need be and wipe it if they decide but In most cases this would be too late, sensitive information would almost certainly have been stolen.

Has anyone out there come across an app similar to Windows AD policies that enforce using the auto lock for instance and other functions and obviously stop the user from turning it off

Regards

Stephen Millard
0
Comment
Question by:stefmil
2 Comments
 
LVL 41

Accepted Solution

by:
Eoin OSullivan earned 500 total points
ID: 35105934
Have you looked at the AppleConfiguration Utility?
http://www.apple.com/support/iphone/enterprise/

It allows you to create preset configurations and deploy across multiple iphones and these include the autolock timeouts and all the other main settings including mailboxes etc.
0
 
LVL 3

Expert Comment

by:lloydforth1
ID: 35106175
Lion Server 10.7 which is not yet out but still in development will have these features built in according to early reports. Until then the iPhone / iPad Configuration utility is the only way to go.

Also take a look here

http://www.apple.com/uk/support/ipad/enterprise/
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simp…
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question