Managing and securing iPads in one easy lesson [Apple]

Managing and securing iPads in one easy lesson

Tablets are de rigueur in the offices everywhere with executives and gadget junkies alike sizing up their options for tablets. However, with all the hoopla has also been a lot of debate about the tablet’s place in the enterprise with a particular eye on the iPad. Admittedly many of the hundreds of thousands of apps are designed for personal use, but increasingly business apps  are popping up making this once personal device a good candidate for business as well.

There are two key concerns for IT when sourcing a tablet: management and security. These can mean the difference between a great investment and a disaster (especially if it involves data leakage.)

First, remote management is essential if you want to protect confidential company data (especially if the iPad is in the possession of a member of your leadership team) in the event of loss or theft. Having the ability to remotely wipe a lost device can save a ton of headache for you in the future. Organizations on Microsoft Exchange can leverage ActiveSync to manage their mobile devices. Those looking for a richer solution should look at a Mobile Device Management (MDM) solution like Symantec Client Management Suite, McAfee EMM or Sophos Mobile Control. MDMs will let you manage any device brought into your environment, which means no extra training or set-up will be required if new devices are connected to your network.

Second, security is crucial for any device being brought into your environment and it’s a fallacy that iPads aren’t secure as other tablets as mentioned in a recent blog post. The latest offering of iOS brings a solid and secure platform for mobile devices with password protection, disk-level encryption  and a unique technology that “sandboxes” applications to ensure that they can’t access other apps unless they use core APIs provided by iOS. This means that apps downloaded by the user will not be able to run or interract with other apps unless they are “Apple approved.”

Softchoice is not only authorized to sell iPads in both US and Canada, but we have people who can help you secure your devices or just provide advice on which one to select. Reach out to Softchoice at 1-800-268-7638 .

How the Employee Choice model for mobile devices can be easily managed with the right partners [Apple]

The traditional model of “one computer fits all” within an organization is shifting. Even the effort of selecting a desktop or laptop standard per user role or department does not offer the flexibility that today’s tech-savvy worker is demanding from their employer. Started with mobile devices (smartphones and tabl… ok, let’s be honest: iPads) the phenomenon has trickled into the core client computing systems, manly laptops.

What’s the incentive for businesses to encourage this behaviour? Organizations that have adopted this model find more happy and productive workers when you allow them to choose the platform they want to work on. It’s also a strong recruitment tool to get the best and brightest talent onboard. The era of “This is your beige box, this is your black phone” from one company is being challenged with “Would you prefer a Mac or Windows computer? iPhone or Blackberry?” by their competition. And today’s Datacenter infrastructure definitely has the guts to run run virtual desktops and applications in these scenarios – just ask our own Jonathan White.

However beneficial this policy may be to recruit and retain talent, IT Managers and CIOs are frustrated with the lack of security on a “rogue” device entering their infrastructure. Counting on a personal computer’s uptime when the manufacturer is not the company’s standard can also be a pain; [Read more…]

The secret sauce in managing iPads and iPhones [Apple]

Mobile devices are making their way into the enterprise at an alarming rate which is not slowing down any time soon. The adoption is happening one of two ways:

Enterprise-lead adoption: A controlled roll out by the IT staff

User-lead adoption: Tech-savvy employees bringing in their own devices and connecting to the company network for email and access to other sensitive data.

The challenge for the IT department in either scenario is the same [Read more…]