iPhone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods for access to corporate services, and for iPhone 3GS, hardware encryption for all data stored on the device. iPhone also provides secure protection through the use of passcode policies that can be enforced and delivered over-the-air. And if the device falls into the wrong hands, users and IT administrators can initiate a remote wipe command to help ensure that private information is erased.
When considering the security of iPhone for enterprise use, it is helpful to understand the following:
- Methods that prevent unauthorized use of the device
- Protecting data at rest, including when a device is lost or stolen
- Networking protocols and the encryption of data in transmission
- Secure platform foundation of iPhone OS
These capabilities work in concert to provide a secure mobile computing platform
Bookmarks