Four steps to successful Apple device management in your business

Apple devices are rising in popularity, so how can you deploy and manage them in your organisation?

As the number of Apple devices used in business environments around the world increases, many organisations are looking closely at investing in Mac, iPad, iPhone and Apple TV devices. But this can put a heavy burden on IT departments that are tasked with managing this influx of new devices, particularly for those who have long-established Windows environments.

From initial deployment to the end-user experience, it's critical to understand, manage and support the entire lifecycle of the devices in your business environment. This ensures both the security and maximised potential of your Apple devices.

Deployment and provisioning

Before configuring them for end users, devices must be enrolled into management within a Mobile Device Management (MDM) solution. Most Apple devices can understand and apply settings such as remote wipe or password restrictions thanks to the built-in MDM framework, which has configuration profiles and management commands as its two core components.

These components communicate to the device via Apple's Push Notification Server (APNS), which is kept private to your organisation through obtaining a secure certificate from Apple. Apple's server then maintains a constant connection to devices, allowing them to receive commands, settings, configurations or apps you define.

Advertisement
Advertisement - Article continues below

The most common MDM solution is the Device Enrollment Program (DEP), which provides an out-of-the-box experience to employees with everything configured as soon as the device is turned on. Another option for businesses is user-initiated enrollment via URL, where users visit a specific URL to configure their device.

Configuration & app management

When it comes to configuring Apple devices, there's a wide range of options. Businesses can personalise and tailor individual devices or groups of devices based on the needs of their end users, with configuration profiles, advanced management workflows, smart targeting and scripts.

The rich library of apps available in Apple's App Store will be familiar to most people, but popular office software such as Microsoft Office and Adobe Creative Suite for Mac aren't available through that portal, so it's important to have a Mac client management tool that's able to deploy custom software.

It's also possible to use an app management solution to ensure that users have all the apps they need and are properly secured within your environment, such as Apple's Volume Purchase Program (VPP) for enterprises. Deploying apps via VPP gives extra security and configuration options, including managed apps which can be flagged as owned' by an organisation, and Managed Open In which controls the flow of data from one app to another.

Inventory

MDM solutions are capable of querying an Apple device to collect a large amount of inventory data, ensuring device information is always up to date. Data collected can include device type, OS version, storage capacity, managed status, IP address, security status and more.

This data can be used for a wide range of business needs, including ensuring all devices are secure and running the latest versions of any software. Some management solutions even allow collection of extra inventory about specific hardware and software add-ons, such as which printer drivers are installed.

Security

The security and privacy of devices and access to corporate resources should be a top priority for any organisation. To address these worries, Apple has a number of security features built right into macOS, iOS and tvOS. Coupled with an MDM solution, it's straightforward to ensure that your devices are not only secure, but your apps and networks are as well.

Unix is the foundation for Apple's operating systems, and all their OSs are built with security in mind and have unique security settings added, all of which can be managed with an MDM solution. Security commands include being able to lock, locate and recover lost or stolen iOS devices, and implementing a conditional access path for Mac devices in organisations primarily running a Windows environment.

Picture: Shutterstock

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/business-strategy/33311/apple-launches-new-tv-gaming-and-finance-services
Business strategy

Apple launches new TV, gaming and finance services

25 Mar 2019
Visit/hardware/33929/jony-ive-a-retrospective
Hardware

Jony Ive: A retrospective

29 Nov 2019
Visit/hardware/34606/apple-ipad-102in-2019-review-the-ipad-grows-up
Hardware

Apple iPad 10.2in (2019) review: The iPad grows up

10 Oct 2019
Visit/hardware/30623/apple-imac-pro-review-the-return-of-the-king
Hardware

Apple iMac Pro review: The return of the king

2 Sep 2019

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/network-internet/wifi-hotspots/354283/industrial-wi-fi-6-trial-reveals-blistering-speeds
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019