Apple's iPhone and iPad are sleek, hip, in-demand devices, but they can be hard for IT to manage.
When the devices first came out, they didn't have much going for them in the way of enterprise features. But since iPhones and iPads have made their way into businesses, Apple has heard your cries for iOS management capabilities and made some strides.
With the iPhone Configuration Utility, mobile device management (MDM) application program interfaces (APIs) for iOS, Apple Configurator and some new iOS 6 features that have IT in mind, iOS management is slowly getting easier. But it's not a breeze yet. Until the day that managing 1,000 iPads is a snap, consult this guide to enterprise iOS management.
In this part:
iOS 5 MDM eases enterprise iOS management
New Apple MDM features make managing corporate and employee-owned iOS 5 devices easier. MDM breaks the device/desktop dependency and lets IT enforce passcodes and device restrictions, manage email, calendar and Exchange accounts and more.
How to stop an iOS virus
Thanks to Apple's strict App Store restrictions and strong sandboxing, no viruses attack iOS devices -- yet. Employees' iOS devices can carry viruses and channel them onto your network. From there, iOS viruses can wreak havoc: Protect corporate data and devices that may be at risk of infection.
Top 6 iOS 6 features
Apple's iOS is built for consumers, so the newest version of iOS has features employees will love. But that doesn't mean you'll love them too. Watch for problems with Lost mode, plus high data charges from FaceTime 3G use. Other iOS 6 features -- networking enhancements and Kiosk mode -- could be steps in the enterprise direction.
Restricting enterprise iCloud access
Apple iCloud's automatic backup feature is great for users, but you have to worry about the corporate data that they might back up to the cloud. Use Apple's APIs to make managing and restricting iCloud access easier.
iOS biometrics on the way?
Apple's AuthenTec acquisition could be a ploy to take an Android mobile device security tool away from Samsung, but the acquisition could also be a harbinger of fingerprint and other biometric technology for iOS devices to come.
Enterprise iOS management and security quiz
The iPad and iPhone are consumer devices, but users expect you to manage them. Test your knowledge about managing Apple devices in the enterprise by taking our Apple enterprise management quiz.
Android/iOS security battle
It's hard to say who wins the Android and iOS security features fight. Each OS has different options. Apple's sandboxing plus native remote wipe options and Android's hardware/software encryption show that the OSes can go toe-to-toe.
Free enterprise iOS management
A free app, Apple Configurator makes managing iOS devices a whole lot easier. It isn't a full MDM product, but it lets you deploy, manage and configure iOS devices.
When, not if: iOS security attacks
Apple has a reputation for security, but experts say it's only a matter of time before iOS devices suffer security attacks. There aren't many options for protecting iOS from viruses and malware right now, and if devices are user-owned, you won't be able to force employees to download an anti-malware app.
iPhone 5: A blessing and a curse for IT
With the iPhone 5's LTE and 5 GHz support, users will have better and faster access to the corporate network than ever. But if your company foots employees' wireless bills, you'll have to keep track of the data charges users rack up.
Easing the iPhone into the enterprise
Adopting the iPhone has been a challenge for many organizations. You have to figure out ways to handle the costs of supporting the device, grapple with risk exposure and find ways to seamlessly assimilate the device in your company. But things improve with each new version of the device and its OS.
Enterprise iPhone security issues
Apple's iPhone poses security risks, and with a growing user base of enterprise employees, you have to worry about securing corporate data. Guard against the various ways that a device and its data can be compromised, such as remote injection attacks and poor security practices on the user's end.
Top 5 iPhone and Exchange ActiveSync problems
The iPhone is designed to connect to Exchange Server through ActiveSync, but sometimes you'll run into problems. Heartbeat intervals, firewall time-outs and IP address setting issues can give you trouble. If your iPhone users are having trouble connecting to Exchange, check out the five most common iPhone/Exchange problems and their solutions before you try anything else.
Your iPad + remote administration tools = BFFs
The iPad isn't just for consumers anymore. You and your admin friends can get work done on this popular device, too. With the right remote administrations tools, you can go from playing Fruit Ninja to troubleshooting data center problems in a short series of taps. Check out apps such as TeamViewer, the VMware vSphere Client for iPad and SSH Term Pro.
Does not compute: Active Directory management and iPad
Managing iPads with Active Directory (AD) is nearly impossible because the two are just not made to work together. The iPad is a consumer device, and AD is for managing enterprise assets. Instead of spinning your wheels trying to manage iPads with AD, focus on what you can do. Implement ActiveSync and Exchange System Manager to get a handle on password management.
Top 10 iPad business apps
Apps for businesses can help employees be more productive, but some apps can raise red flags. Keynote, Numbers, TeamViewer HD and Skype make reading and editing files and video conferencing a snap. Watch out for Dropbox: Even though it's a great way for employees to store and access files, it can pose security threats if users aren't careful.
iPad admins love configuration profiles
If you're looking for a way to allow iPads but you're worried about maintaining control, then iPad configuration profiles will turn your frown upside down. Configuration profiles let you define which items iOS devices can interact with, including switches, routers and access points. You can also use the profiles to determine which apps can be installed; plus, configuration profiles let you manage security credentials.