If you’re rolling out mobile devices for the first time, there are a few things you need to bear in mind. How will you keep your files secure? How are you going to make sure everyone has access to the files they need? Don’t worry – we’ve rounded up the answers into our pre-rollout checklist.
Step one: Stop panicking about security
iPad was the first tablet to introduce 256-bit encryption, and includes four levels of security. Protection at device, network, data and platform level mean that iOS is now one of the securest platforms available. Testament to its security, iPad and iPhone been given clearance for Impact level 3 work by CESG, meaning it can be used for restricted work. (To find out more, take a look at our whitepaper on iOS security and mobile device management here.)
As with the Mac, Apple make both the hardware and the software. On a hardware level, features such as app sandboxing, ASLR and the 256-bit encryption engine help protect against malware and viruses, whereas tools within iOS further secure data and personal information.
Within the operating system, apps requesting information or data from Calendar, Contacts, Reminders and Photos will ask for your permission in order for them to proceed. Support for a passcode means that you can prevent unauthorised access to the device, and it can even be set up so that too many failed attempts results in data on the device being deleted.
iOS is also completely compatible with a range of mobile device management solutions. While Apple Configurator will allow you to deploy profiles and the Find my iPhone functionality lets you locate and wipe lost devices, with MDM, you can ensure that all devices have encryption turned on, can monitor usage and restrict access to different apps. It’s also possible to partially wipe only information rather than the entire contents.
Step two: Get an MDM solution in place.
Speaking of MDM, there are over 200 MDM options currently in the marketplace, and we do advise that you set some time aside to find one that suits your business processes.
You should aim to use an MDM solution that allows standardised administration policies, permits admin to create role-based rules, and lets you assign privileges and restrictions that make the device safe for the manipulation of sensitive data. Apple technology already has half baked-in MDM features that will help you cover off the basics, and if you’re already using an established device management system like Absolute Manage to deal with desktop Macs, there may well by a mobile version available.
Solutions by JAMF, Absolute Software and VMware’s AirWatch, however, allow more granular control than you’ll get from relying on Apple alone, with additional functionality around monitoring device usage and app management. JAMF’s Casper Suite is purely for iOS and OS X, Absolute Manage adds Android and Windows management, while AirWatch covers all mobile device platforms.
If you don’t have the resources to manage your mobile devices – perhaps the skills aren’t currently in your technical team’s arsenal, and you don’t have the time or money to re-train them – we can provide mobile device management as a managed service. This means you decide all the processes and permissions you’d like enforcing, and we take care of the day to day running of the solution.
Step three: Make sure everyone can share files easily
There are two problems here. Historically, the Mac platform has come up against incompatibility issues when running alongside Windows. One of the most common is being able to access files that are saved on Windows servers.
ExtremeZ-IP by Acronis taps into the Mac’s native Apple Filing Protocol (AFP) and lets Mac users access Windows file and print servers as if they were PC users, without coming up against inaccessible and corrupted files. Essentially it sits on the server to improve the user experience.
On the iPad side of things, it’s a similar solution. Access allows you to give iOS users secure and managed access to files that are stored on corporate servers by logging in with their AD credentials.
To find out more about both ExtremeZ-IP and Access, head over to our Acronis store page.
Step four: Work out who will need access to Windows from their Mac
On a basic level, Boot Camp, which comes built into Mac OS X, allows users to choose between an OS X environment and a Windows one at startup. However, that said, it’s not the most effective option out there. The two environments are completely separate, and you have to reboot to move between them.
With Parallels or VMware Fusion, you can provide your team with Windows applications directly on a Mac. Whether you opt for desktop virtualisation whereby both platforms are loaded to your machine for you to access, or virtualised applications that are streamed to client devices will depend on your exact setup. Get in touch with us to find out which is the best choice for you, but both will allow your end users to access both OS X and Windows applications without having to log out and restart the computer. You can even share files between the two platforms. To find out more about Parallels, head to the Jigsaw24 store page here.
Remember: there’s always time for a pilot scheme.
If you’re rolling out any new device for the first time, we’d recommend running a pilot scheme with a single department or with individuals in different departments beforehand, so any potential issues can be identified early on. We can help you design and implement a pilot scheme even if you’re locked into a purchasing scheme with another supplier, and can provide tech support throughout so you can be sure of the best possible advice pre-launch.
Head over to Jigsaw24.com to find out more about our iPad trial scheme, b7, which gives sales teams the chance to trial Apple’s tablet and a customised business app prior to rollout.
Want to know more about rolling out iOS devices in your organisation? Give us a call on 03332 409 306 or email B2B@Jigsaw24.com. For all the latest news, follow @WeAreJigsaw24 on Twitter or ‘Like’ us on Facebook.
By Liz Sunter