1 / 23

iPads in the Enterprise: How to Put Them to Work for You!

iPads in the Enterprise: How to Put Them to Work for You!. John A. O’Neill Sr. Chief Technologist AWS Solutions. Who am I?. Consultant, speaker, educator, and author. AwesomeWildStuff.com/AWS Solutions Consulting and teaching for today’s IT Pro’s.

waldo
Download Presentation

iPads in the Enterprise: How to Put Them to Work for You!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. iPads in the Enterprise: How to Put Them to Work for You! John A. O’Neill Sr. Chief Technologist AWS Solutions

  2. Who am I? • Consultant, speaker, educator, and author. • AwesomeWildStuff.com/AWS Solutions • Consulting and teaching for today’s IT Pro’s. • Out-of-the-box solutions to modern business IT problems. • Cool, wildly unique products.

  3. Intro • The iPad has been the benchmark for tablet computing since its introduction in 2010. • Large, hi-res display, robust security, light weight, and apps for everything = awesome success! • Works great at home, work, or school.

  4. Intro (Continued) • More than 55 million iPads sold in just two years! • Tim Cook states over 80% of the Fortune 100 have deployed (or are testing) iPads for employee use. • Not a matter of if, it’s a matter of when and how we see iPads in our organizations.

  5. Things to consider • Our goal is to protect IT assets while still giving our users the best experience. • IT Administrators are already slammed with work. • We need to meet our goal in the easiest way possible. • Take advantage of iOS’s built in functionality! • Use free tools available from Apple such as the iPhone Configuration Utility and Apple Configurator.

  6. Common Uses & Apps • Web Surfing (Safari, Puffin, and Atomic) • File Management (FileBrowserEX and DropBox) • Video Conferencing (Facetime, Skype, and Fring) • e-Mail (Exchange/IMAP/POP3) • Document Viewing & Editing (iWork Suite and QuickOffice) • Printing (AirPrint, PrintCentral Pro, and HP ePrint)

  7. Student Uses & Apps • Reading (iBooks, Kindle, Kno, and inkling) • Reference (Dictionary.com, Star Walk for iPad, and World Atlas HD) • Educational Videos (YouTube and iTunesU) • Time Management (Things for iPad and iStudiez Pro)

  8. Business Pro Uses & Apps • WebConferencing (GoToMeeting and WebEx) • Presentations (Keynote and PresentationLink) • Marketing (WordPress, Twitter, and Facebook) • Project Management (SG Project Pro and Project Planner HD) • Data Analysis (MicroStrategyMobile) • HD Pic’s and Videos (iPhoto, iMovie, and Photoshop Express) • CAD Files (AutoCAD WS and TurboViewer)

  9. IT Uses & Apps • Remote Support (GoToManage for iPad and Splashtop) • Network Monitoring (IT Tools and Mailscape) • Device Management (Get Console) • Remote Control (iSSH, PocketCloud, and iTap) • Reference (iPowerShell) • Training (Cisco M-Learning Viewer) • Virtualization (VMWare View, Citrix Receiver, and Thinkgrid)

  10. Is the Network Ready? • iPad supports 802.11n at 2.4GHz and 5GHz. • Make sure adequate coverage reaches the areas the iPad will be used. • Offices and Conference Rooms • Cafeterias • Dorm’s • Manufacturing Floor • Outdoor Areas • If using cellular data make sure signal reaches where it needs to. • Install cellular repeaters if necessary.

  11. General Security • Several aspects to consider: • Device Security • Data Security • Network Security • Application Security • Apple has incorporated security measures directly into the iPad for all of the above areas.

  12. Device Security • Out of the gate access protection through a passcode. • Passcode policy options familiar to IT Administrators: • Require passcode and prevent user from removing. • Minimum passcode length and complexity. • Maximum passcode age. • Max number of failed login attempts before device wipe.

  13. Data Security • Always on 256-bit AES hardware encryption. • Data cannot be extracted from an iPad without the proper AES keys. • iPads can be backed up to a computer or iCloud. • Backup encryption can be enabled. • Local and remote data wipes supported.

  14. Network Security • Many of the network access, authentication, and security methods found in today’s networks are natively supported by the iPad. • Secure wireless through WPA2 with AES 128-bit encryption. • Remote users can VPN from the iPad just as they do from a PC. • Compatibility increased with each new version of iOS.

  15. Application Security • 200,000+ native iPad apps in the App Store. • 500,000+ iPhone apps. • Makes it really easy for users to discover, download, and install apps for almost any use. • No Matter what app’s installed, data is still secure! • iOS isolates all apps from one another. • Apps are shielded from accessing system components. • Usernames, passwords, and identities are stored in an encrypted keychain.

  16. Redeploying • Resetting an iPad to factory defaults is quick and easy. • Grab the iPad, go to Settings, General, Reset, and select Erase All Content and Settings. • That’s it! The iPad can now be treated as a new out of the box unit.

  17. Configuration Files • Nothing fancy, just an XML file. • Used to control much of what the iPad can do and how it can be used. • Passcodes • Access to programs, functions, and settings. • App delivery. • Settings for e-Mail, Wi-Fi, and VPN. • Can be signed and encrypted for security.

  18. Configuration Files (Continued) • Installed by USB using the iPhone Configuration Utility (iCU) or distributed through e-Mail or the Web. • Can be set to restrict or prevent the user from changing any settings the profile contains. • Can also be locked to the device so the user cannot remove the profile once applied. • Or a password can be required for removal.

  19. iPhone Configuration Utility • The iPhone Configuration Utility (iCU) is a simple to use free utility from Apple for creating and deploying configuration files. • Works on both Mac OS X and Windows (XP and higher, both 32-bit and 64-bit) • Besides creating, encrypting, and installing profiles the iCU can capture device information including console logs.

  20. iCU (Versions) • Current version of the iCU is 3.5. • Fully supports iOS 5.1 devices. • Compatible with earlier iOS versions. • Payloads and settings not supported by an earlier iOS version are simply ignored. • Check for a new version of the iCU whenever a new iOS version is released.

  21. iCU (Installing Configs-Gotchas) • When using USB to install a profile, the profile is automatically signed and encrypted before being transferred to the iPad or iPhone. • Any updates to a profile must be signed by the original self-signed certificate. • Use one PC with the iCU installed to create, modify, install, and export profiles will cut down on problems. • When posting the files on your website don’t compress the file or change its .mobileconfig extension.

  22. Apple Configurator (MDM) • Apple’s free MDM solution released at the same time as iOS 5.1 last month. • Mass configure, deploy, update, and reset up to 30 devices at a time. • Great fit for education and small businesses who don’t need expensive large scale MDM solutions. • Larger organizations can use Apple Configurator to setup devices, install enterprise apps, and quickly enroll each device with a full scale MDM solution.

  23. Thanks! Follow me on Twitter @JohnONeillSrfor more tips, tricks, and insights. Watch Petri.co.il for my iPad how-to articles each week.

More Related