Good Technology unveils iPhone management tools
Businesses now have access to mobile management tools for the iPhone and other Apple devices, thanks to new software from Good Technology.
IT professionals can now manage iPhone, iPad and iPod Touch devices as a "whole device" with new software released this week by Good Technology.
As part of Good for Enterprise, the iPhone Management toolkit includes a Compliance Manager function and is available using the same web-based Good Mobile Control console used to administer other Android, Windows Mobile and Symbian devices.
John Herrema, chief marketing officer for Good, said the new additions to Good for Enterprise provide IT departments with an easy way to secure and manage their mobile assets without needing to purchase additional hardware.
"Good for Enterprise allows IT decision makers to embrace the fast growing 'Bring Your Own Device' trend by combining the security, management and control that IT requires with the device choice and exceptional messaging and collaboration experience that end users demand," Herrema said in a statement.
iPhone Management provides features such as the ability to define password policies, control Wi-Fi/VPN settings and restrict application usage.
The software also allows organisations to select which iPhone, iPad and iPod Touch models, OS versions and Good client versions can access their network. This restricts enterprise network, application and data access to non-compliant devices.
Andrew Borg, senior research analyst, of the Aberdeen Group's wireless and mobility arm said the analyst firm has seen an increase in organisations allowing employees to pick mobile phones from different platforms, like the iPhone.
"Combined with the rise in employee-owned devices used for work purposes, this underscores the need for comprehensive multi-platform support, along with strong compliance management and enforcement," he added in a statement.
Navigating the new normal: A fast guide to remote working
A smooth transition will support operations for years to comeDownload now
Putting a spotlight on cyber security
An examination of the current cyber security landscapeDownload now
The economics of infrastructure scalability
Find the most cost-effective and least risky way to scaleDownload now
IT operations overload hinders digital transformation
Clearing the path towards a modernised system of agreementDownload now