Skip to main content

This post is from the Apperian blog and has not been updated since the original publish date.

Last Updated Nov 23, 2010 — App Management expert

When Your Company Kills Your iPhone (or iPad!)

App Management
The NPR report Wipeout: When Your Company Kills Your iPhone shows how far the iPhone has come... and how the idea of "employee liable" devices can collide with corporate policies that ask employees to give up control of their devices.

However, "device wipe" when an employee leaves a company may be overkill. One of the areas of focus in Apperian's development of EASE is to provide granularity of control. That means that if an employee leaves, a company can shut down access to the applications, and therefore the corporate data without "wiping" the phone.

The "granular control" approach has other advantages, too. For example, if an employee leaves a department, or for whatever reason should no longer have access to a specific application or data, that application can be "turned off" without impacting other access. Or, if an application needs to be temporarily disabled (e.g., because of upgrades or database changes) this can be done and then returned to service.

Device wipe should be the "last resort" - for example, for a lost or suspected stolen phone. In fact, the recent iOS 4.2 release makes the "Find My iPhone" service free for users, allowing the individual to find their iPhone and request a device lock. This is really the best direction - empowering the user as well as the enterprise!

More from the Blog

View more
Apr 30, 2020

Mobile Application Management: A Forward View

App Management
  IT Is Adapting in the Midst of the COVID-19 Pandemic The Coron ...
Read More
May 19, 2019

Sneak Peek: How Are IT Leaders Driving Mobile App Adoption?

App Management
Apperian conducted the The Mobile Enterprise Application Survey to fin ...
Read More
Jan 30, 2019

Part 1: App Security Should Be an Integral Part of Your DevSecOps Process — Not an Afterthought

Application Security
What are the key considerations and components of DevSecOps? The in ...
Read More
Nov 19, 2018

Breaking Down the New California IoT Law

Application Security
Recently California passed legislation regarding the security of all I ...
Read More
Contact Us