51
Security
Overview
iOS and OS X are built with multiple layers of security, so Apple devices can securely access
network services and protect important data. iOS and OS X also provide secure protection
through the use of passcode and password policies that can be delivered and enforced with
MDM. And if an Apple device falls into the wrong hands, a user or IT administrator can use a
remote command to erase all private information.
Ensuring the security of Apple devices for enterprise use involves the following:
•
Methods that prevent unauthorized use of the device
•
Protecting data at rest, even when the device is lost or stolen
•
Networking protocols and the encryption of data in transmission
•
Enabling apps to run securely and without compromising platform integrity
These capabilities work together to provide a secure mobile computing platform. To learn more
about security with iOS, see iOS and the new IT.
Device and data security
Overview
Establishing strong policies for access to Apple devices is critical to protecting your organization’s
information. Strong iOS device passcodes are the frontline of defense against unauthorized
access, and they can be congured and enforced with MDM.
iOS devices use the unique passcode established by each user to generate a strong encryption
key that’s used to further protect mail and sensitive app data on the device. iOS also provides
secure methods to congure devices in an IT environment, where specic settings, policies, and
restrictions must be in place. These methods provide exible options for establishing a standard
level of protection for authorized users.
Passcode policies
An iOS device passcode keeps unauthorized users from accessing data on the device. iOS lets
you choose from an extensive set of passcode policies to meet your security needs.
These passcode policies include:
•
Require passcode on iOS device
•
Require alphanumeric value
•
Minimum passcode length
•
Minimum number of complex characters
•
Maximum passcode age
•
Time before auto-lock
100% resize factor
6