ESET® MOBILE DEVICE MANAGEMENT for Apple iOS

Lightweight, powerful configuration & management of iOS devices

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Mobile Device Management for Apple iOS

Set up, configure and monitor all company iOS devices from a single pane of glass. Enables:

Checkmark icon

Anti-theft

Checkmark icon

Web content filtering

Checkmark icon

Applications whitelisting/blacklisting

Checkmark icon

Device security


Significant security increase

Since users don't always implement device security properly, ESET enables admins to define password complexity requirements, set screen lock timers, prompt users to encrypt their devices, block cameras and more.

ESET Security Management Center scheme

Simple licensing

Mix and match your license seats as needed. Migrate seats from one device to another, regardless of the OS.

Remote management

No need for dedicated solutions—ESET Mobile Device Management for Apple iOS comes integrated within ESET Security Management Center, giving you a network security overview that includes all endpoints, mobiles, tablets and servers.

Use cases

PROBLEM

Organizations need to be concerned about devices being lost or stolen, as well as the threat of data theft when an employee is terminated.

SOLUTION

  • Enforce security policy that requires mobile devices to be encrypted.
  • Implement security policies that require passcodes or PINs to be set on all devices.
  • Lock out or remotely wipe devices when needed.

Protected by ESET since 2011.

Protected by ESET since 2008.

Canon logo

Protected by ESET since 2016.

T-com logo

ESET ISP security partner since 2008.

The ESET difference

Anti-theft

Remotely lock/unlock devices or wipe all the data they contain in case they are lost or stolen.

App whitelist/blacklist

Whitelist/blacklist apps to prevent users from installing prohibited apps and manage app notifications to users.

Push account settings remotely

Remotely push out account settings such as Wi-Fi, VPN and Exchange information.

Web content filtering

Adult web content, as defined by Apple, can be blocked. The admin can also whitelist or blacklist specific URLs.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

System Requirements

ESET Endpoint Protection Platform also covers the following OSes:

Windows logo
macOS logo
Linux logo
Android logo
Microsoft Azure logo
VMware logo

Looking for additional solutions?

Related enterprise-grade solutions

ESET Dynamic Endpoint Protection solution icon

ESET Dynamic Endpoint Protection

  • Security Management Center
  • Endpoint Protection Platform
  • Cloud Sandbox Analysis
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption

Related products and services

Stay on top of cybersecurity news

Brought to you by respected security researchers from ESET's 13 global R&D centers.

Corporate blog

woman on train drinking coffee using mobile phone

Security tips for travelers this Thanksgiving

With Thanksgiving and other holiday travels coming up, it’s a great time to review internet safety tips. For travelers, moving from one place to another without a secure and private connection makes...

Employing MITRE ATT&CK™ for improved endpoint protection via the ESET Enterprise Inspector

If the recent 2019 ESET Global Press Event was any indication, with its 57 international journalists and nine presentations, cybersecurity has become Tier 1 news. The event was flavored with a healthy...

Webinars

The MITRE ATT&CK framework: Everything you need to know in under 60 minutes

Wednesday, Nov. 13, 2019

The ATT&CK framework is an ever-expanding knowledge base of threat tactics and techniques—based on real-world observations— that the global cybersecurity community...

Sneak Peek: New ESET Security Management Center 7.1

Wednesday, Oct. 23, 2019

Meet ESET’s most ambitious management server ever—built to meet the latest customer demands using feedback from IT security pros worldwide.

We Live Security blog

Inside consumer perceptions of security and privacy in the connected home

The ESET survey polled 4,000 people to get a sense of their attitudes towards the privacy and security implications of smart home technology

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples