ESET® MOBILE DEVICE MANAGEMENT for Apple iOS

Lightweight powerful configuration & management of iOS devices

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Mobile Device Management for Apple iOS

Set-up, configure and monitor all company iOS devices from a single pane of glass. Enables:

Checkmark icon

Anti-theft

Checkmark icon

Web content filtering

Checkmark icon

Applications white/black listing

Checkmark icon

Device security


Significant security increase

Left up to a user, device security is usually not implemented properly. ESET allows you to define password complexity requirements, set screen lock timers, prompt users to encrypt their device, block cameras and more.

ESET Security Management Center scheme

Simple licensing

Mix and match your license seats exactly as you need. Migrate seats from one device to another, regardless of the OS.

Remote management

No need for dedicated solutions - ESET Mobile Device Management for Apple iOS comes integrated within ESET Security Management Center, giving you a single point of overview of network security, including all endpoints, mobiles & tablets and servers.

Use cases

PROBLEM

Organizations are not only concerned with devices being lost or stolen, but also with data theft when an employee is terminated.

SOLUTION

  • Enforce security policy that requires mobile devices to be encrypted.
  • Implement security policies that require passcodes or pins to be set on all devices.
  • Lock-out or remotely wipe devices when needed.
Honda logo

protected by ESET since 2011
license prolonged 3x, enlarged 2x

Allianz Suisse logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-Com logo

ISP security partner since 2008
2 milion customer base

The ESET difference

Anti-theft

Remotely lock/unlock devices or wipe all the data they hold in case they are lost or stolen.

App white/black listing

White/black list apps to prevent users from installing prohibited apps and manage app notifications to users.

Push account settings remotely

Remotely push out account settings such as Wi-Fi, VPN and Exchange information.

Web content filtering

Adult web content, as defined by Apple, can be blocked. The admin can also white/black-list specific URLs.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

System Requirements

ESET Endpoint Protection Platform covers also following OSes:

Windows logo
macOS logo
Linux logo
Android logo
Microsoft Azure logo
VMware logo

Looking for the complete security of your network?

Related enterprise-grade solutions

ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

  • Security Management Center
  • Endpoint Protection Platform
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption

Related products and services

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Press Releases

ESET named a Top Player in Radicati’s ‘Endpoint Security’ Market Quadrant

December 6, 2018 – Global cyber security firm ESET has been identified as a ‘Top Player’ in the latest edition of Radicati’s Market Quadrants SM, which covers the ‘Endpoint Security’ segment of the...

ESET discovers 12 previously undetected Linux backdoors

December 5, 2018 – ESET, a global leader in cybersecurity, has announced its latest discovery of 12 previously undetected Linux malware families based on OpenSSH, documented in their latest research...

We Live Security blog

Malaysian government targeted with mash-up espionage toolkit

An interview with ESET researchers Tomáš Gardoň and Filip Kafka on their research of a malware toolkit used in espionage against the Malaysian government

Google+ to shut earlier as new bug exposed data of 52.5 million users

There is no evidence that the flaw was misused during the six days it was alive, said the tech giant