© Charles Edge and Rich Trouton 2020
Charles Edge and Rich TroutonApple Device Managementhttps://doi.org/10.1007/978-1-4842-5388-5_7

7. Endpoint Encryption

Charles Edge and Rich Trouton2
(1)
Minneapolis, MN, USA
(2)
Middletown, MD, USA
 
The data stored on your computer or mobile device is important to at least one person, and that is the person using the device. Along with it being important, there is always at least some data that you would prefer other people not see. This data could include passwords, financial data, browser history, or that text conversation between you and your significant other which is really just for your eyes only. Encryption helps protect that data from being accessed by others and Apple has invested considerable effort to ...

Get Apple Device Management: A Unified Theory of Managing Macs, iPads, iPhones, and AppleTVs now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.