Manage Learn to apply best practices and optimize your operations.

Details for implementing iPad and iPhone security policy

In this excerpt from Enterprise iPhone and iPad Administrator’s Guide, author Charles Edge covers iPhone security policy and third-party products for Apple device security.

This page is part of the resource guide, Securing mobile devices: A resource guide for solution providers.

The following is an excerpt from the book, Enterprise iPhone and iPad Administrator’s Guide, written by Charles Edge, director of technology at Los Angeles-based 318 Inc., which specializes in securely integrating Apple products into the enterprise. This excerpt is intended for solution providers who are creating iPad and iPhone security guides for their customers.

The excerpt covers third-party tools that may be helpful in securing mobile devices, including:

  • Virtual Smartphone Platform and Sentry from MobileIron
  • Afaria from Sybase Inc.
  • TARMAC from equinox USA Inc.
  • KACE appliances from Dell Inc.
  • AirWatch from AirWatch LLC
  • Casper Suite from JAMF Software LLC

The excerpt comes from Chapter 9 (.pdf), Mass-Deploying Devices,, which focuses on  Apple mobile device security settings, an integral element of a successful iPad and iPhone security policy. You may download the entire chapter or read the excerpt below.

Enterprise iPhone and iPad Administrator’s Guide excerpt
If you’ve got a project where you need to deploy 100, 1,000, or 10,000 of these little buggers, then you’re going to want the setup for each iOS device to be as automated as possible. In order to streamline deployment, Apple has developed the iPhone Configuration Utility. Once this utility is installed, you can begin to build your configuration profiles.

The iPhone Configuration Utility can be used to develop configurations that can then be pushed out to iPhones and iPod touches. To begin, look in /Applications/Utilities on Mac OS X or by default in C:\Program Files\iPhone Configuration Utility, where you will find the application bundle. Go ahead and open it up, and you will see the initial configuration utility screen. Click Configuration Profiles, and then click the New icon in the iPhone Configuration Utility toolbar. You will now see a screen that allows you to configure a number of settings for the iPhone. In the following sections, we discuss the various tabs that appear on this page.

The General tab is used to describe the profile you are creating. Here, you can enter a name, unique identifier (using reverse domain notation), an organization name, and finally a description of the profile you are creating. Here, we recommend a good naming convention. If you are going to build profiles per -user, then consider placing the user name, followed by the time frame or version of the profile in the name field. If you are going to use a generic profile, then consider entering a miniature description and/or a version number/date. In our example, we are creating a profile for our executive’s phones. We specify a configuration name, MyCo Executives, our configuration identifier using reverse domain notation, com.myco.executives.profile, and then we enter relevant information for the Organization and Description.

Download the entire chapter.

Excerpted with permission from Apress, Inc. Copyright 2010. Enterprise iPhone and iPad Administrator’s Guide by Charles Edge, available at Apress Inc.

Dig Deeper on Managed network security services

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.