Deployment strategies for the iPhone 6 in the enterprise

The iPhone 6 is readied to show up next week, with a bigger screen (and a phablet variation, by all accounts) and a brand name new os called iOS 8 that (finally) has better security options and gadget management devices.

With any brand-new launch, from Apple or other popular smartphone business, there’s an enjoyment about the event among company employees and a feeling of dread amongst the IT staff. Which technical troubles might accompany enterprise-grade apps? Will end-users experience technical glitches on the Wi-Fi network? Could there be new security challenges with the email encryption? The issues aren’t just related to staff member approval however the policies, facilities, and device management related to the deployment.

Here are 6 approaches for success to assist specifically with the brand-new iPhone 6 launch to make certain you’ve the pieces in place for a successful deployment in the venture.

1. Prepare your users and staff

Apart from the debate about enabling employees to bring their own gadget compared to offering corporate-approved smartphones, the iPhone 6 will show up in the business, will certainly connect to corporate networks, and will certainly be made use of for daily productivity in the office. The IT industry has actually learned to deal with the truth of BYOD and found methods to deal with that truth.

With the iPhone 6, there’s always an initial increase as workers purchase the gadget almost immediately. Preparing departments for the launch, training IT staff on exactly what to do about any possible risks, and examining security problems are all crucial methods. In some methods, a new smartphone launch provides an excellent opportunity to re-educate everyone.

2. Focus on security

Lysa Myers, an analyst with security firm ESET, says one of the best methods to deployment is to prep users about security concerns prior to launch, even if all the information about form and function aren’t known. (A minimum of IT admins understand a lot about iOS 8 features, which guarantees to provide much better file encryption for apps like the Calendar and Mail client.)

‘Em ployees and IT ought to upgrade software as immediately as possible, encrypt sensitive data in files sent throughout the network, backup crucial files, and enable security features within the os (specifically associated with remote wipe and auto-lock),’ she advises. ‘You might want to restrict apps to an approved list to lessen the possibility of staff members installing leaky apps.’

3. Produce policies before launch

Of course, the time to develop use policies isn’t after the device appears online and at the Apple establishment. Due to the fact that the iPhone 6 is often learnt mainly as a customer gadget, one that individuals purchase on their own and afterwards use at work, it’s crucial to establish policies now.

‘By establishing policies, you can determine what needs to be done and you’ll have something to point to when workers have concerns,’ says Myers. ‘In producing the policy, you wish to assess possible threats and resolve them. And once this is looked after, you can have a list of tasks all set to go when the new phone is launched.’

4. Tweak policies after launch

Once IT understands more about the real device, it’s necessary to fine-tune policies for the certain features offered. Nicholas Lee, the senior director of end user services at Fujitsu America, an information and communications technology company, says the policies ought to be as particular as possible when it comes to staff member usage. There should be information about user duty for the gadget, parameters for mobile carriers, liabilities and restrictions enforced for the iPhone 6, a knowledge base, and end-user training available quickly after launch.

Policy and device management ought to be a recurring part of your deployment strategy, not just something you do at the launch of the new device. As you find out more about the encryption features, new apps for business, and any hardware features, the launch method should be adjusted appropriately. One example of this from the iPhone 5/5s launch, IT needed to discover swiftly about the new finger print reader and its abilities as an extra security benefit.

MDM

5. Be ready with Mobile Device Management (MDM)

One critical facet of deployment for any brand-new smartphone is to use a durable MDM (Mobile Gadget Management) device, one that implements your policies and allows IT to track the gadgets within the enterprise. ‘Having a proper MDM option will ensure you keep the standard level of security and policy control over the gadgets,’ states Lee. ‘As new functions are allowed by means of the MDM console, you can evaluate whether they include value or danger to your corporate strategy.’

These functions generally refer to the approved business apps on the device, data retention policies, Wi-Fi access from the gadget when it isn’t being made use of on a mobile network, and other information and network concerns associated with that smartphone model specifically.

6. Look for the gotchas

Lee noted one final thought about Apple iPhone 6 deployment strategies: Beware about any surprises. For example, when the iPhone 5 introduced, lots of IT admins entrusted with developing deployment methods and policies were surprised to learn about the new Lightning port. This indicated the gadget connected to computer systems utilizing a non-standard connection. Although the actual impact showed negligible (the device still connects over USB), it was not an expected change.

With the iPhone 6, there’s still no clear sign about whether it’ll have brand brand-new software and hardware functions never learnt prior to in IT, which’s one of the fantastic challenges when it comes to Apple gadgets– the business does tend to invent brand-new tech enhancements. Understanding the potential for innovation is key– then responding accordingly with the policies.

Image Credit: Apple