[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

How do Schools/Businesses track iDevices

Posted on 2012-09-19
1
Medium Priority
?
974 Views
Last Modified: 2012-09-24
I'm getting ready to configured over 100+ iPads at a High School and the question came up how to track down an iPad if stolen.

I've tried to find some stuff on google but I'm not able to find anything solid.

I was wondering how other schools or companies handle this situation when doing large scale deployments of iDevices.

Any advise is appreciated!
0
Comment
Question by:TonyL82PR
1 Comment
 
LVL 15

Accepted Solution

by:
Hamidreza Vakilian earned 900 total points
ID: 38415239
The best solution is to use Find iPhone application. I direct you to some useful articles for more information about this:
How To Use Find My iPhone To Get Your Stolen iPhone Back
www.makeuseof.com/tag/find-iphone-stolen-iphone/

4 Ways to Find a Stolen or Lost iPhone
http://ipod.about.com/od/iphonetroubleshooting/tp/14-Ways-To-Find-A-Lost-Or-Stolen-Iphone.htm

If the device is jailbroken you can try Tracesaver from cydia:
http://www.spicytricks.com/2011/09/tracesaver-track-your-iphone-4-iphone.html
0

Featured Post

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Securing your business data in current era should be your biggest priority. Numerous people are unaware of the fact that insiders commit more than 60 percent of security breaches. You need to figure out the underlying cause and invoke your potential…
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question