Apple Beefs Up iPhone Business Security Features - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

07:49 PM
Jake Widman
Jake Widman

Apple Beefs Up iPhone Business Security Features

The new iPhone 3.0 OS and Configuration Utility 2.0 add several features aimed at satisfying enterprise IT departments. Some of them may be overkill for SMBs, but others will prove attractive to any business whose employees use iPhones for business.

The new iPhone 3.0 OS and Configuration Utility 2.0 add several features aimed at satisfying enterprise IT departments. Some of them may be overkill for SMBs, but others will prove attractive to any business whose employees use iPhones for business.Almost lost in the hubbub about the iPhone 3GS and the slick new user features in iPhone OS 3.0--the landscape keyboard, the multimedia messaging, the addition of copy and paste--are less glamorous enhancements to the device's role in a business environment.

Among the features that make the Blackberry such a good corporate citizen are those that enable an IT department to impose security and usage restrictions and manage them centrally. The iPhone has had some similar capabilities, but not nearly to the same level. The new iPhone OS 3.0 and the associated iPhone Configuration Utility 2.0, however, extend those abilities further--probably further than most SMBs need. But security-conscious businesses with iPhone-toting employees should still consider implementing some of the new features, if only the ones that wipe all the data off a lost or stolen device.

For example, the Configuration Utility enables you to create configuration profiles that comprise payloads. A payload is a particular type of setting, such as e-mail configurations, VPN setup, or calendar subscriptions, and a configuration profile collects groups of those settings. The profiles can be installed centrally or distributed via e-mail, and distributing different groups of profiles lets employees have different levels of access.

Among the available configuration settings are those controlling the device's passwords. You can use the Configuration Utility to establish what kind of password (length, complexity) is required, and you can set the device to wipe all data after a certain number of incorrect password attempts.

Besides the tools available with the Configuration Utility, SMBs with Microsoft Exchange servers can use Exchange ActiveSync to enforce security policies as well. Again, for example, Exchange ActiveSync can determine how many failed passwords result in wiping the iPhone clean.

ActiveSync also allows you to use the Exchange Management Console, Outlook Web Access, or Exchange ActiveSync Mobile Administration Web Tool (Exchange Server 2007), or the ActiveSync Mobile Administration Web Tool (Exchange Server 2003) to remotely wipe all the contents from an iPhone or iPod Touch.

The iPhone Configuration Utility is a free download from Apple. From that same page, you can download the iPhone Enterprise Deployment Guide (PDF), an 80-page tour of the management features available in iPhone OS 3.0 and Configuration Utility 2.0.

And for an extensive examination of how the features work and how they compare with what's available on the Blackberry, check out this overview from InfoWorld's Test Center.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
If DevOps Is So Awesome, Why Is Your Initiative Failing?
Guest Commentary, Guest Commentary,  12/2/2019
White Papers
Register for InformationWeek Newsletters
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Current Issue
Getting Started With Emerging Technologies
Looking to help your enterprise IT team ease the stress of putting new/emerging technologies such as AI, machine learning and IoT to work for their organizations? There are a few ways to get off on the right foot. In this report we share some expert advice on how to approach some of these seemingly daunting tech challenges.
Flash Poll