ESET® MOBILE DEVICE MANAGEMENT for Apple iOS

Lightweight powerful configuration & management of iOS devices

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Mobile Device Management for Apple iOS

Set-up, configure and monitor all company iOS devices from a single pane of glass. Enables:

Checkmark icon

Anti-theft

Checkmark icon

Web content filtering

Checkmark icon

Applications white/black listing

Checkmark icon

Device security


Significant security increase

Left up to a user, device security is usually not implemented properly. ESET allows you to define password complexity requirements, set screen lock timers, prompt users to encrypt their device, block cameras and more.

ESET Security Management Center scheme

Simple licensing

Mix and match your license seats exactly as you need. Migrate seats from one device to another, regardless of the OS.

Remote management

No need for dedicated solutions - ESET Mobile Device Management for Apple iOS comes integrated within ESET Security Management Center, giving you a single point of overview of network security, including all endpoints, mobiles & tablets and servers.

Use cases

PROBLEM

Organizations are not only concerned with devices being lost or stolen, but also with data theft when an employee is terminated.

SOLUTION

  • Enforce security policy that requires mobile devices to be encrypted.
  • Implement security policies that require passcodes or pins to be set on all devices.
  • Lock-out or remotely wipe devices when needed.
Honda logo

protected by ESET since 2011
license prolonged 3x, enlarged 2x

Allianz Suisse logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-Com logo

ISP security partner since 2008
2 milion customer base

The ESET difference

Anti-theft

Remotely lock/unlock devices or wipe all the data they hold in case they are lost or stolen.

App white/black listing

White/black list apps to prevent users from installing prohibited apps and manage app notifications to users.

Push account settings remotely

Remotely push out account settings such as Wi-Fi, VPN and Exchange information.

Web content filtering

Adult web content, as defined by Apple, can be blocked. The admin can also white/black-list specific URLs.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

System Requirements

ESET Endpoint Protection Platform covers also following OSes:

Windows logo
macOS logo
Linux logo
Android logo
Microsoft Azure logo
VMware logo

Looking for the complete security of your network?

Related enterprise-grade solutions

ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

  • Security Management Center
  • Endpoint Protection Platform
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption

Related products and services

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Press Releases

ESET achieves “Champion” status in latest EMEA Canalys Leadership Matrix

17 December 2018 - ESET, a global leader in cybersecurity, has achieved “Champion” status in Canalys’ 2018 Leadership Matrix for EMEA. This is the first time that ESET has been awarded this status and...

European Union’s leading IT Security Company ESET joins Europol’s Advisory Group on Internet Security

ESET, the leading endpoint IT security company based in the European Union, is now a member of Europol’s Advisory Group on Internet Security. Representing ESET in the group is IT security industry...

We Live Security blog

The most popular passwords of 2018 revealed: Are yours on the list?

Besides the usual suspects among the worst of passwords, a handful of notable – but similarly poor – choices make their debuts

How to protect yourself as the threat of scam apps grows

As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices?