Network World - New APIs in Apple's latest iPhone operating system make possible a new experience for network administrators: the ability to inventory, secure, and manage the iPhone and iPod touch as enterprise devices and to do so for hundreds or thousands of them.
With Monday's release of iOS 4, Apple provided hooks and on-board Mobile Device Management Service (MFMS) that, for the first time, let third-party device management applications access information directly on the iPhone 4, and exercise control over it.
[See also: First look at Apple iPhone 4 ]
In the past, there have been two basic options. One is the management and security provided by Microsoft Exchange Server, via Apple’s expanded but still limited support for Exchange Active Sync.
The second is Apple’s iPhone Configuration Utility 2.0, released in mid-2009. This version introduced some much needed figures but fell short of full-scale end-to-end system for managing the handsets, data, and users.
An Infoworld review of both tools found each one had some benefits the other lacked.
Today, three device management software vendors announced versions of their applications exploiting the new APIs. The applications are: Afaria, from Sybase; Mobile Device Manager, from AirWatch; and MobileIron Virtual Smartphone Platform, from MobileIron (a "Network World" 2010 Startup to Watch). All three are intended to provide centralized management for iOS 4 devices.
Most of these applications are adding or expanding iPhone management support to software that handles most of the leading mobile operating systems.
MobileIron is a server-based application for managing mobile devices. Administrators can create a usage or security policy on the server, assign it to individuals or groups, and then connect to the iOS mobile device management service. "We can pull information from MDMS or we can push information to the service," says Ojas Rege, vice president of products for MobileIron, Mountain View, Calif.
MobileIron and the other vendors initiate communications with the service through the Apple Push Notification Service (APNS). Once that notification is accepted, the server and device communicate directly via HTTPS, according to Rege.
The arrangement allows for an "agentless" approach – no iPhone application is needed. But MobileIron does offer one, downloaded from the App Store, that creates a management UI for the end user, when some kind of end user input or action is needed.
In some cases, functions that were done via Enterprise Active Sync can now be done directly via the third-party software and the handset, such as remotely wiping data from a lost or stolen iPhone.
Apple's iOS 4
- Facebook blocks access to hidden iPad app
- LTE iPhone unlikely this year, says analyst
- Apple slams Amazon's Android e-store as 'inferior'
- Apple iOS: Why it's the most secure OS, period
- Apple launches iWork productivity apps for iPhone
- Analysts split on iPhone over-the-air-update buzz
- Apple's iOS 4.3 a welcome update for iPad, iPhone
- iOS 4.3 boosts first-gen iPad browser speed by 18%
- Update: Apple jumps gun, delivers early iOS 4.3 update for AT&T iPhone, iPad
- iPhone dev knocks Apple over vague new sub rules
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Protection for Every Enterprise: How BlackBerry Security Works Get an IT-level review of BlackBerry® Security, addressing data leakage protection, certified encryption, containerization and much more.
- Future Focus: What's Coming in Enterprise Mobility Management (EMM) Find out why Enterprise Mobility Management (EMM) solutions that are truly future-ready must be designed to enable Machine-to-Machine (M2M) capabilities and much more.
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Workforce Mobilization for Improved Productivity A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Mobile/Wireless White Papers | Webcasts