Four steps to successful Apple device management in your business

Apple devices are rising in popularity, so how can you deploy and manage them in your organisation?

As the number of Apple devices used in business environments around the world increases, many organisations are looking closely at investing in Mac, iPad, iPhone and Apple TV devices. But this can put a heavy burden on IT departments that are tasked with managing this influx of new devices, particularly for those who have long-established Windows environments.

From initial deployment to the end-user experience, it's critical to understand, manage and support the entire lifecycle of the devices in your business environment. This ensures both the security and maximised potential of your Apple devices.

Deployment and provisioning

Before configuring them for end users, devices must be enrolled into management within a Mobile Device Management (MDM) solution. Most Apple devices can understand and apply settings such as remote wipe or password restrictions thanks to the built-in MDM framework, which has configuration profiles and management commands as its two core components.

These components communicate to the device via Apple's Push Notification Server (APNS), which is kept private to your organisation through obtaining a secure certificate from Apple. Apple's server then maintains a constant connection to devices, allowing them to receive commands, settings, configurations or apps you define.

The most common MDM solution is the Device Enrollment Program (DEP), which provides an out-of-the-box experience to employees with everything configured as soon as the device is turned on. Another option for businesses is user-initiated enrollment via URL, where users visit a specific URL to configure their device.

Configuration & app management

When it comes to configuring Apple devices, there's a wide range of options. Businesses can personalise and tailor individual devices or groups of devices based on the needs of their end users, with configuration profiles, advanced management workflows, smart targeting and scripts.

The rich library of apps available in Apple's App Store will be familiar to most people, but popular office software such as Microsoft Office and Adobe Creative Suite for Mac aren't available through that portal, so it's important to have a Mac client management tool that's able to deploy custom software.

It's also possible to use an app management solution to ensure that users have all the apps they need and are properly secured within your environment, such as Apple's Volume Purchase Program (VPP) for enterprises. Deploying apps via VPP gives extra security and configuration options, including managed apps which can be flagged as owned' by an organisation, and Managed Open In which controls the flow of data from one app to another.

Inventory

MDM solutions are capable of querying an Apple device to collect a large amount of inventory data, ensuring device information is always up to date. Data collected can include device type, OS version, storage capacity, managed status, IP address, security status and more.

This data can be used for a wide range of business needs, including ensuring all devices are secure and running the latest versions of any software. Some management solutions even allow collection of extra inventory about specific hardware and software add-ons, such as which printer drivers are installed.

Security

The security and privacy of devices and access to corporate resources should be a top priority for any organisation. To address these worries, Apple has a number of security features built right into macOS, iOS and tvOS. Coupled with an MDM solution, it's straightforward to ensure that your devices are not only secure, but your apps and networks are as well.

Unix is the foundation for Apple's operating systems, and all their OSs are built with security in mind and have unique security settings added, all of which can be managed with an MDM solution. Security commands include being able to lock, locate and recover lost or stolen iOS devices, and implementing a conditional access path for Mac devices in organisations primarily running a Windows environment.

Picture: Shutterstock

Featured Resources

B2B under quarantine

Key B2C e-commerce features B2B need to adopt to survive

Download now

The top three IT pains of the new reality and how to solve them

Driving more resiliency with unified operations and service management

Download now

The five essentials from your endpoint security partner

Empower your MSP business to operate efficiently

Download now

How fashion retailers are redesigning their digital future

Fashion retail guide

Download now

Recommended

Apple reportedly planning all-5G iPhone lineup for 2022
Hardware

Apple reportedly planning all-5G iPhone lineup for 2022

21 Jul 2021
Apple reportedly delays return to the office amid rising COVID cases
Careers & training

Apple reportedly delays return to the office amid rising COVID cases

20 Jul 2021
Apple's M2 chip to debut in early 2022, leaker claims
Hardware

Apple's M2 chip to debut in early 2022, leaker claims

6 Jul 2021
Apple plans return to office despite employee complaints
flexible working

Apple plans return to office despite employee complaints

30 Jun 2021

Most Popular

The benefits of workload optimisation
Sponsored

The benefits of workload optimisation

16 Jul 2021
Samsung Galaxy S21 5G review: A rose-tinted experience
Mobile Phones

Samsung Galaxy S21 5G review: A rose-tinted experience

14 Jul 2021
RMIT to be first Australian university to implement AWS supercomputing facility
high-performance computing (HPC)

RMIT to be first Australian university to implement AWS supercomputing facility

28 Jul 2021