Category Filter

How to ensure security and privacy for iOS devices with MDM?

When business is done over the cloud, security becomes one of the prime concerns of organizations. The drastic measures that you implement to counter this and protect your business might wreck your employee privacy. Hexnode helps you to keep both in balance. The UEM offers a number of managerial policies to enhance the security and privacy of the iOS devices in which you do work.

Some of these policies are:

  • Enterprise-standard passcode policy: It allows you to lock the device with a secure password. You can also configure this policy to automatically lock the device when kept idle.
  • Basic and advanced restrictions policy: It enables you to limit the device functionalities and secure the corporate data on the device. For instance, enable Fraud Warning to warn users while accessing a “not-so-safe-to-browse” page on Safari, disable users from adding or removing Face ID/Touch ID on the devices, etc.
  • Global HTTP Proxy policy: It ensures that all HTTP traffic passes through the configured proxy server. This improves data security as all personal and corporate data are filtered through the proxy server.
  • Blacklist/Whitelist apps and websites: It limits users from accessing unauthorized data and keeps your corporate data safe from malicious attacks.
  • Kiosk lockdown policy: This restricts the device to a single app, a few selected apps, or web apps, preventing unwanted pop-ups and notifications in the foreground.
  • Geofencing policy: It allows you to set a virtual geographical boundary around an area. You can associate policies with the devices when they are inside the specified location; these policies will be disassociated once they move out of this boundary. This helps to improve corporate data security.
  • Mandatory apps policy: It helps you to remotely push apps and their updates to the devices privately.
  • Remove apps on policy disassociation: Apps deployed via mandatory apps policy can be configured to uninstall from the device upon policy disassociation or when the app is deleted from Hexnode. This enables the users to reinstate the initial device condition when it’s no longer used for work purposes.
  • VPN policy: It redirects the data through a private network, thereby minimizing the threats caused by data interception. You can also configure VPN On Demand to automatically establish VPN connections for specific domains.
  • Certificates and SCEP policy: It allows you to securely push sensitive data like VPN credentials, Wi-Fi identity certificates, etc., to user’s devices.
  • Managed domains policy: It enables users to distinctly identify the documents in the enterprise domain, thereby ensuring better data segregation.
  • Business Container policy: It lets you control the data flow between personal and corporate apps.
  • Delay OS updates: You can delay iOS software updates up to 90 days. This gives you additional time to test and rectify the security issues associated with the latest OS releases.
  • Compliance setup: This enables you to monitor device health and its compliance with the corporate policies at all times. You can even configure it to alert the concerned parties when the device turns non-compliant.
  • Location tracking: This feature allows you to track the device’s locations at specific intervals of time so that you can keep track of the devices without any hassle.
  • Block cellular data: To tighten the security on iOS devices, you can block your corporate apps from using cellular data networks. You can also block app-wise cellular data usage on roaming to prevent data intrusion.

Actions based on security and privacy,

  • Use device wipe action to wipe the whole device; it prevents corporate data from being compromised when the device is lost/stolen. Use corporate wipe to remotely wipe the corporate data from personal devices.
  • The lost mode in iOS devices displays a custom message and a phone number on the device screen. When the phone goes missing, you can activate this mode, thereby preventing others from accessing its contents.
  • Enable remote ring to find a lost device. This will play a sound on the device even if it’s muted.
  • Use the lock device action to instantaneously lock the device. The device can only be unlocked by a person who knows the device’s passcode.
  • Instantaneously track the location of a device through the scan device location action.