© Eric Butow 2018
Eric ButowPro iOS Security and Forensicshttps://doi.org/10.1007/978-1-4842-3757-1_4

4. Creating Policies

Eric Butow1 
(1)
Jackson, California, USA
 

The previous chapter discussed network connection situations that you and your employees may encounter with your iPhones and the security considerations for each. Once you’ve made your decisions about iPhone security to ensure that your company data is safe, you need to set iPhone management policies in three key areas.

The first is to determine whether your company will supply company iPhones and require them for work use or will allow employees to use their personal iPhones with company data. Each solution presents its own policy challenges. For example, you will be limited in how you ...

Get Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.