ESET® MOBILE DEVICE MANAGEMENT for Apple iOS

Lightweight powerful configuration & management of iOS devices

1bn+
users worldwide

400k+
business customers

195
countries & territories

13
global R&D centers

ESET Mobile Device Management for Apple iOS

Set-up, configure and monitor all company iOS devices from a single pane of glass. Enables:

Checkmark icon

Anti-theft

Checkmark icon

Web content filtering

Checkmark icon

Applications white/black listing

Checkmark icon

Device security


Significant security increase

Left up to a user, device security is usually not implemented properly. ESET allows you to define password complexity requirements, set screen lock timers, prompt users to encrypt their device, block cameras and more.

ESET Security Management Center scheme

Simple licensing

Mix and match your license seats exactly as you need. Migrate seats from one device to another, regardless of the OS.

Remote management

No need for dedicated solutions - ESET Mobile Device Management for Apple iOS comes integrated within ESET Security Management Center, giving you a single point of overview of network security, including all endpoints, mobiles & tablets and servers.

Use cases

PROBLEM

Organizations are not only concerned with devices being lost or stolen, but also with data theft when an employee is terminated.

SOLUTION

  • Enforce security policy that requires mobile devices to be encrypted.
  • Implement security policies that require passcodes or pins to be set on all devices.
  • Lock-out or remotely wipe devices when needed.
Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 32,000 endpoints

T-com logo

ISP security partner since 2008
2 million customer base

The ESET difference

Anti-theft

Remotely lock/unlock devices or wipe all the data they hold in case they are lost or stolen.

App white/black listing

White/black list apps to prevent users from installing prohibited apps and manage app notifications to users.

Push account settings remotely

Remotely push out account settings such as Wi-Fi, VPN and Exchange information.

Web content filtering

Adult web content, as defined by Apple, can be blocked. The admin can also white/black-list specific URLs.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

System Requirements

ESET Endpoint Protection Platform covers also following OSes:

macOS logo
Linux logo
Android logo
iOS logo
Microsoft Azure logo
VMware logo

Looking for the complete security of your network?

Related enterprise-grade solutions

ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

  • Security Management Center
  • Endpoint Protection Platform
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption

Related products and services

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

ESET tech stack closer look, green and dark green

When an employee’s social mindset becomes a threat to business

In today’s business environment, where innocent GIFs and shared documents can be weaponized, protecting cloud-based collaboration from the spread of malware should be a priority.

ESET Tech matrix, green, pill shaped

ESET extends its portfolio with VPN and Identity Protection* in a brand-new, all-in-one offering

In the new offering ESET introduces all-in-one subscription-based protection for individuals and their households.

See more

We Live Security blog

‘Tis the season to be wary: 12 steps to ruin a cybercriminal's day

The holiday shopping season may be the time to splurge, but it’s a also favorite time of year for cybercriminals to target shoppers with phony deals, phishing scams and other threats

Telekopye's tricks of the trade – Week in security with Tony Anscombe

ESET's research team reveals details about the onboarding process of the Telekopye scam operation and the various methods that the fraudsters use to defraud people online