go here On the hardware side, the new Apple iPhone 5s includes fingerprint biometric authentication. Some to-and-fro between Apple and the hacking community will ensue until the gaps are closed and we can all get on with life.
Users love the ease and facility of fingerprint swiping. There is no doubt that it is much easier to authenticate using a swipe than it is to input a complex password. And you can never forget your fingerprint in the same way that codes often slip the mind.
However, EAS mailbox access policies allow organizations to require users to input a password of minimum length and can also lock a phone after a certain period of inactivity. The idea here is to protect the confidential data that exists on the device should the device be lost. You might consider this to be a problem. I am not so worried because fingerprints are a pretty good method to authenticate people. All Exchange cares about is that the device reports that a policy has been provisioned to it and is now being observed.
The fact that a fingerprint swipe is being used is not reported to Exchange. Getting back to BYOD, the introduction of new devices and operating systems requires administrators to keep a close eye on implementation details so that the new devices and OS can be supported with Exchange.
Tony Redmond's Exchange Unwashed Blog brought to you by. TAGS: Office Hide comments. More information about text formats.
Android has become a very attractive choice for all kinds of customers, with the most extensive growth in the past year. Front End Web Development. If Location Sharing has been enabled, it is managed from the Lync desktop client. Creating a generic Configuration Profile. From Wikipedia, the free encyclopedia.
Apple has also addressed one of the biggest complaints IT administrators have with iPhones in the enterprise: iTunes. Granted, users will still need iTunes in order to sync or update the iPhone or iPad.
But, Apple has provided an ability to customize iTunes to restrict or disable services like the iTunes Music Store, or shared media libraries, and enable IT administrators to control access to software updates. For road warriors and workers on the go, a VPN is a requirement for secure access to the data and resources on the business network.
Particularly when using public Wi-Fi networks which generally don't provide any security, the encrypted tunnel of a VPN is necessary for ensuring the data can not be intercepted or eavesdropped. These three VPN protocols are compatible with the vast majority of VPN solutions and allow the iPhone or iPad to connect with the business network without any additional network configuration or third-party applications.
Apple also provides support for certificate-based and two-factor authentication for improved security.
Third-party solutions have been developed that enable business professionals to use the iPhone and iPad with the company network as well. Good for Enterprise enables IT administrators to provision, manage, and update a variety of smartphone platforms which is beneficial for small and medium companies that do not have an established smartphone standard.
The Array Networks Desktop Direct app for the iPhone and iPad , and the Citrix Receiver software let users remotely access their desktops and use the software and tools they are used to securely while outside of the office.
There is no denying that the iPhone and the iPad are both primarily consumer devices, but the fact that so many consumers have them or will have them in the case of the iPad , and that consumers are also employees, means that the devices will be in the workplace and businesses need to find a way to integrate and manage them. Privacy Encryption Antivirus. Upgrade to massive, fast, Editors' Choice award-winning storage for cheap today.