You are accessing this website with an out of date browser. Please update to enjoy an optimal experience.

Solutions & Services

Whether you’re looking to deploy Apple in your business, increase digital collaboration in your workplace or improve your IT infrastructure, our solutions have got you covered. They’re delivered by experts who’ve worked in your field and are passionate about helping your business meet its objectives with technology. Read more

About

We’re a bit different from your average IT reseller. Throughout our nearly 30-year history, we’ve developed a proud company culture rooted in delivering great customer service and treating people with the respect they deserve. Find out more about what makes us tick and how you could fit in with the team. Read more


Apple in the public sector: How secure is iPad?

iPad was the first tablet to introduce 256-bit encryption, and includes four levels of security. Protection at device, network, data and platform level mean that iOS is now one of the securest platforms available. Testament to its security, iPad and iPhone been given clearance for Impact level 3 work by CESG, meaning it can be used for restricted work.

 

iOS is designed to secure the contents of your iPad and iPhone from the moment you turn it on

As with the Mac, Apple make both the hardware and the software. On a hardware level, features such as app sandboxing, ASLR and the 256-bit encryption engine help protect against malware and viruses, whereas tools within iOS further secure data and personal information.

Within the operating system, apps requesting information or data from Calendar, Contacts, Reminders and Photos will ask for your permission in order for them to proceed. Support for a passcode means that you can prevent unauthorised access to the device, and it can even be set up so that too many failed attempts results in data on the device being deleted.

iOS is also completely compatible with a range of mobile device management solutions. While Apple Configurator will allow you to deploy profiles and the Find my iPhone functionality lets you locate and wipe lost devices, with MDM, you can ensure that all devices have encryption turned on, can monitor usage and restrict access to different apps. It’s also possible to partially wipe only information rather than the entire contents.

 

Steps for ensuring that data is encrypted

In light of a number of high profile cases where organisations have been fined for data being lost through device theft, it’s more important than ever to ensure that you can guarantee that all sensitive information on devices is secure and encrypted.

If devices are enrolled in a management solution, such as Casper Suite or Absolute Manage, then IT teams have complete control. Should the device go missing, it can be completely wiped of sensitive information. In addition, if the device is enrolled in a backup solution like Code42 CrashPlan PROe, the user can have profiles, preferences and data remotely reinstalled on a new device.

  1. Get a management solution whichever you choose, it’s important to enrol devices (computers, tablets and phones) into a solution that includes remote wipe functionality.
  2. Within the management solution, IT can run a report on all devices in the environment that don’t have data encryption.
  3. Remotely inform users that they should have disc encryption enabled.

Your iPad security feature checklist

  • Secure Boot Chain.
  • App sandboxing.
  • DFU mode.
  • Address Space Layout Randomisation.
  • File and Keychain data protection.
  • Encrypted iTunes backup.
  • Support for encrypted email and S/MIME.
  • Configuration enforcement.
  • Remote wipe.

 

Want to know more about how iPad can improve your IT security? Give our team a call on 03332 409 306 or email sales@Jigsaw24.com. To keep up with all the latest news, follow @WeAreJigsaw24 on Twitter or 'Like' us on Facebook