Do You Plan to Use the Per App VPN Feature in iOS 7?

Despite the rise of the bring-your-own-device (BYOD) movement in recent years, Apple’s popular iPhone and iPad haven’t really been geared toward making the lives of enterprise IT administrators any easier. However, with several new business-centric features now included in the upcoming iOS 7 release, that could all be about to change. Apple is billing the new iPhone 5S as the “most secure mobile phone ever.” Whether that proves true or not remains to be seen, but so far, the iOS 7 updates are a bit more interesting. Chief among them is the new per app VPN feature. According to Apple’s website, “Apps can now be configured to automatically connect to VPN when they are launched. Per app VPN gives IT granular control over corporate network access. It ensures that data transmitted by managed apps travels through VPN — and that other data, like an employee’s personal Web browsing activity, does not.” With reports that 76 percent of enterprises are now formally supporting BYOD, IT administrators are sure to welcome such granular control. Not only does such a feature have the potential to improve data security, but it could also make company-wide app rollouts significantly easier and lighten the traffic load on corporate networks. But, perhaps the most important thing to remember is that enterprises cannot afford to become complacent when it comes to remote access policies and best practices. As mobile device manufacturers and application developers work to make their products more enterprise-friendly, they are ultimately designing them for convenient use by consumers. IT teams must remain vigilant when it comes to managing these devices and how they connect...

Readers' Poll: What is Your Favorite iOS Device?

As BYOD continues to increase in prevalence, Apple devices are becoming more common in the workplace. On the heels of our recent announcement about the NCP Secure Enterprise Server’s integration with iOS products, we were wondering – what is your favorite iOS device? Don’t see yours listed below? Feel free to let us know what it is in the comments. [polldaddy...

Readers’ Poll: What is Your Favorite iOS Device?

As BYOD continues to increase in prevalence, Apple devices are becoming more common in the workplace. On the heels of our recent announcement about the NCP Secure Enterprise Server’s integration with iOS products, we were wondering – what is your favorite iOS device? Don’t see yours listed below? Feel free to let us know what it is in the comments. [polldaddy...

Secure Authentication for Apple iOS Devices

As indicated by your feedback in several of our polls, and as highlighted at Interop New York, more and more users are opting to access their company network via various devices. Of all the devices involved in the BYOD movement, Apple iOS products are some of the most popular. In response to this demand, the NCP Secure Enterprise VPN Server now integrates with Apple’s iOS, so IT administrators can perform certificate-based authentication to control network access of iPhones and iPads. So, how does this work? Apple’s mobile device management (MDM) distributes various certificates to all authorized iOS devicies. When users establish VPN tunnels from their devices, the NCP Secure Enterprise VPN Server uses these certificates to determine what type of device the user is accessing the network with. This enables network administrators to, for example, allow a Mac OS X notebook full access rights, while limiting iOS devices to partial access to the central network. Also, users are unable to decipher or manipulate the certificates, significantly reducing the risk of certifications being duplicated for unauthorized devices. Security is, after all, one of the biggest concerns associated with BYOD. Ultimately, with its iOS secure authentication, NCP enables IT administrators to use certificates to control assignment rights on these end devices – without interfering with the user-determined username and passwords. Want to view the entire, official announcement? Check it out...

What We’re Reading, Week of 5/2

CIO.IN: Microsoft, Juniper Urged to Patch Dangerous IPv6 DoS Hole  Computerworld: Hosting Virtual Desktops: Tips for a Successful Outcome Processor: Remote Access Myths ComputerWeekly: Remote IT gateways a top vulnerability to cyber attacks, report reveals PCWorld: Connect to the VPN at work from your...