ESET® MOBILE DEVICE MANAGEMENT for Apple iOS

Lightweight powerful configuration & management of iOS devices

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Mobile Device Management for Apple iOS

Set-up, configure and monitor all company iOS devices from a single pane of glass. Enables:

Checkmark icon

Anti-theft

Checkmark icon

Web content filtering

Checkmark icon

Applications white/black listing

Checkmark icon

Device security


Significant security increase

Left up to a user, device security is usually not implemented properly. ESET allows you to define password complexity requirements, set screen lock timers, prompt users to encrypt their device, block cameras and more.

ESET Security Management Center scheme

Simple licensing

Mix and match your license seats exactly as you need. Migrate seats from one device to another, regardless of the OS.

Remote management

No need for dedicated solutions - ESET Mobile Device Management for Apple iOS comes integrated within ESET Security Management Center, giving you a single point of overview of network security, including all endpoints, mobiles & tablets and servers.

Use cases

PROBLEM

Organizations are not only concerned with devices being lost or stolen, but also with data theft when an employee is terminated.

SOLUTION

  • Enforce security policy that requires mobile devices to be encrypted.
  • Implement security policies that require passcodes or pins to be set on all devices.
  • Lock-out or remotely wipe devices when needed.
Honda logo

protected by ESET since 2011
license prolonged 3x, enlarged 2x

Allianz Suisse logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-Com logo

ISP security partner since 2008
2 milion customer base

The ESET difference

Anti-theft

Remotely lock/unlock devices or wipe all the data they hold in case they are lost or stolen.

App white/black listing

White/black list apps to prevent users from installing prohibited apps and manage app notifications to users.

Push account settings remotely

Remotely push out account settings such as Wi-Fi, VPN and Exchange information.

Web content filtering

Adult web content, as defined by Apple, can be blocked. The admin can also white/black-list specific URLs.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

System Requirements

ESET Endpoint Protection Platform covers also following OSes:

Windows logo
macOS logo
Linux logo
Android logo
Microsoft Azure logo
VMware logo

Looking for the complete security of your network?

Related enterprise-grade solutions

ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

  • Security Management Center
  • Endpoint Protection Platform
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption

Related products and services

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Press Releases

Email Security does not end with your password.

Email is a crucial part of most people’s daily lives, but few people consider how it’s secured, apart from entering a password to access our accounts. What options are available or even advisable to...

DanaBot updated with new C&C communication.

ESET researchers have discovered new versions of the DanaBot Trojan, updated with a more complicated protocol for C&C communication and slight modifications to architecture and campaign IDs.

We Live Security blog

Siegeware: When criminals take over your smart building

Siegeware is what you get when cybercriminals mix the concept of ransomware with building automation systems: abuse of equipment control software to threaten access to physical facilities

Switzerland offers cash for finding security holes in its e-voting system

Anybody with hacking prowess can take a crack at reading votes or even rigging the vote count itself