This page is part of the SearchSecurityChannel.com resource guide, Securing mobile devices: A resource guide for solution providers.
The following is an excerpt
The excerpt covers third-party tools that may be helpful in securing mobile devices, including:
- Virtual Smartphone Platform and Sentry from MobileIron
- Afaria from Sybase Inc.
- TARMAC from equinox USA Inc.
- KACE appliances from Dell Inc.
- AirWatch from AirWatch LLC
- Casper Suite from JAMF Software LLC
The excerpt comes from Chapter 9 (.pdf), Mass-Deploying Devices,, which focuses on Apple mobile device security settings, an integral element of a successful iPad and iPhone security policy. You may download the entire chapter or read the excerpt below.
Enterprise iPhone and iPad Administrator’s Guide excerpt
If you’ve got a project where you need to deploy 100, 1,000, or 10,000 of these little buggers, then you’re going to want the setup for each iOS device to be as automated as possible. In order to streamline deployment, Apple has developed the iPhone Configuration Utility. Once this utility is installed, you can begin to build your configuration profiles.
The iPhone Configuration Utility can be used to develop configurations that can then be pushed out to iPhones and iPod touches. To begin, look in /Applications/Utilities on Mac OS X or by default in C:\Program Files\iPhone Configuration Utility, where you will find the application bundle. Go ahead and open it up, and you will see the initial configuration utility screen. Click Configuration Profiles, and then click the New icon in the iPhone Configuration Utility toolbar. You will now see a screen that allows you to configure a number of settings for the iPhone. In the following sections, we discuss the various tabs that appear on this page.
The General tab is used to describe the profile you are creating. Here, you can enter a name, unique identifier (using reverse domain notation), an organization name, and finally a description of the profile you are creating. Here, we recommend a good naming convention. If you are going to build profiles per -user, then consider placing the user name, followed by the time frame or version of the profile in the name field. If you are going to use a generic profile, then consider entering a miniature description and/or a version number/date. In our example, we are creating a profile for our executive’s phones. We specify a configuration name, MyCo Executives, our configuration identifier using reverse domain notation, com.myco.executives.profile, and then we enter relevant information for the Organization and Description.
Excerpted with permission from Apress, Inc. Copyright 2010. Enterprise iPhone and iPad Administrator’s Guide by Charles Edge, available at Apress Inc.
This was first published in March 2011