Chapter 20
Managing and Securing the Deployment
What's in this Chapter?
- Using Exchange ActiveSync to enforce security policies
- Understanding how Apple's iOS MDM APIs work
- Third-party MDM vendors that support Apple's iOS APIs
- How do the MDM vendors provide differentiation?
- Evaluating MDM vendors based on your specific needs
In the last several chapters, you've examined the process of planning a deployment and selecting the proper approaches. You've looked into the details of provisioning and configuring the devices, as well as the different methods to deploy applications to the mobile device.
Now in this chapter, and to round out the section of the book on deployment, you're going to examine the details about managing and securing a deployment of iOS devices like the iPad.
First, you're going to look at the two primary ways to manage iOS devices by enforcing security policies and performing actions upon them, like remotely wiping the devices when lost or stolen. These basic management capabilities can be provided by both Exchange ActiveSync (EAS) as well as Apple's iOS MDM application programming interfaces (APIs). EAS provides more basic features, while MDM offers more advanced capabilities.
You'll dig into the details of Apple's iOS MDM capabilities and how it actually works, as well as take a look at a list of some of the dozens of third-party vendors that have offerings in this industry. Since the vendors are limited by the APIs that Apple provides them, most of the features ...