© Charles Edge and Rich Trouton 2020
C. Edge, R. TroutonApple Device Managementhttps://doi.org/10.1007/978-1-4842-5388-5_7

7. Endpoint Encryption

Charles Edge1  and Rich Trouton2
(1)
Minneapolis, MN, USA
(2)
Middletown, MD, USA
 

The data stored on your computer or mobile device is important to at least one person, and that is the person using the device. Along with it being important, there is always at least some data that you would prefer other people not see. This data could include passwords, financial data, browser history, or that text conversation between you and your significant other which is really just for your eyes only. Encryption helps protect that data from being accessed by others and Apple has invested considerable effort to make sure ...

Get Apple Device Management: A Unified Theory of Managing Macs, iPads, iPhones, and AppleTVs now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.