iphone security certificate
iPhone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods for access to corporate services, and for iPhone 3GS, hardware encryption for all data stored on the device. iPhone also provides secure protection through the use of passcode policies that can be enforced and delivered over-the-air. And if the device falls into the wrong hands, users and IT administrators can initiate a remote wipe command to help ensure that private information is erased.
When considering the security of iPhone for enterprise use, it is helpful to understand the following:
- Methods that prevent unauthorized use of the device
- Protecting data at rest, including when a device is lost or stolen
- Networking protocols and the encryption of data in transmission
- Secure platform foundation of iPhone OS
These capabilities work in concert to provide a secure mobile computing platform
Re: iphone security certificate
A device passcode prevents unauthorized users from accessing data stored on iPhone or otherwise gaining access to the device. iPhone OS allows you to select from an extensive set of passcode requirements to meet your security needs, including timeout periods, passcode strength, and how often the passcode must be changed.
The following Microsoft Exchange ActiveSync passcode policies are supported:
- Enforce password on device
- Minimum password length
- Maximum failed password attempts
- Require both numbers and letters
- Inactivity time in minutes