Solved

IPHONE in the Enterprise

Posted on 2013-01-13
4
250 Views
Last Modified: 2013-03-12
Has anyone seen a MDM suite that is compatible with Android and IOS that allows the same set of functionality as a BES. Apple claims the IPhone is ready for the enterprise but is very far behind BES.
Would be great to give an IPhone access to internal resources (a simple intranet page for example) without having to create a VPN. From the MDM suites I have trialed so far, none of them offer this.

In BES, you could configure the proxy settings so that a blackberry could access an intranet page once it was enterprise activated.
0
Comment
Question by:steve0409
  • 2
  • 2
4 Comments
 
LVL 37

Accepted Solution

by:
Neil Russell earned 500 total points
ID: 38773524
Have a look at MobileIron. New features in the latest version allow secure tunnel by application, including web browser, without having to use seperate VPN software.
Very good at pushing all kinds of policies at IOS too.

http://www.mobileiron.com/
0
 

Author Comment

by:steve0409
ID: 38975537
Not readily available and something so basic. Looking at other solutions. Mobile Iron and similar products do not even offer this basic function.
0
 

Author Comment

by:steve0409
ID: 38975545
I've requested that this question be closed as follows:

Accepted answer: 500 points for Neilsr's comment #a38773524
Assisted answer: 0 points for steve0409's comment #a38975537

for the following reason:

no solution
0
 
LVL 37

Expert Comment

by:Neil Russell
ID: 38977673
Not readily available? Its a commercial product sold worldwide!
Basic? You need to read a little more! Mobile iron is about as complete as it gets for iOS control.
Push Apps, push ALL profiles, configure profiles, set Apps to use secure tunnels without need for user to start VPN first.....
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now