Why Read This
Apple's iPhone and the iPad have become increasingly popular. In 2007, IT dismissed the iPhone as insecure and unsuitable for enterprises. Three years later, the iPhone (and iPad) gives enterprises enough security options to enable them to say "yes" instead of "no." In this report, Forrester defines seven security policies every enterprise should implement to keep its email and corporate information safe on Apple mobile devices, whether or not the enterprise owns them. We also define additional security "high-water marks" — policies and processes you can implement — based on your risk profile and regulatory exposure. Finally, we acknowledge that while most enterprises can use Apple mobile devices securely, some require higher levels of authentication assurance, resistance to attack, manageability, and logging than the iPad or iPhone can provide. For these customers, Research In Motion's BlackBerry still rules the roost.
Tags: Client Computing Hardware, Client Security & Management, Client Systems, Enterprise Mobile Devices, Enterprise Mobility, Infrastructure Security, IT Infrastructure & Operations, Mobile Device Management, Mobile Security, Security Risk & Compliance, Smartphones & Mobile Phones, Tablets