ESET® MOBILE DEVICE MANAGEMENT for Apple iOS

Lightweight powerful configuration & management of iOS devices

1bn+
users worldwide

400k+
business customers

195
countries & territories

13
global R&D centers

ESET Mobile Device Management for Apple iOS

Set-up, configure and monitor all company iOS devices from a single pane of glass. Enables:

Checkmark icon

Anti-theft

Checkmark icon

Web content filtering

Checkmark icon

Applications white/black listing

Checkmark icon

Device security


Significant security increase

Left up to a user, device security is usually not implemented properly. ESET allows you to define password complexity requirements, set screen lock timers, prompt users to encrypt their device, block cameras and more.

ESET Security Management Center scheme

Simple licensing

Mix and match your license seats exactly as you need. Migrate seats from one device to another, regardless of the OS.

Remote management

No need for dedicated solutions - ESET Mobile Device Management for Apple iOS comes integrated within ESET Security Management Center, giving you a single point of overview of network security, including all endpoints, mobiles & tablets and servers.

Use cases

PROBLEM

Organizations are not only concerned with devices being lost or stolen, but also with data theft when an employee is terminated.

SOLUTION

  • Enforce security policy that requires mobile devices to be encrypted.
  • Implement security policies that require passcodes or pins to be set on all devices.
  • Lock-out or remotely wipe devices when needed.
Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 32,000 endpoints

T-com logo

ISP security partner since 2008
2 million customer base

The ESET difference

Anti-theft

Remotely lock/unlock devices or wipe all the data they hold in case they are lost or stolen.

App white/black listing

White/black list apps to prevent users from installing prohibited apps and manage app notifications to users.

Push account settings remotely

Remotely push out account settings such as Wi-Fi, VPN and Exchange information.

Web content filtering

Adult web content, as defined by Apple, can be blocked. The admin can also white/black-list specific URLs.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

System Requirements

  • Operating Systems:
    iOS 8+
  • ESET Remote Administrator Mobile Device Connector
  • Company Apple iTunes ID Compatible with ESET Security Management Center and ESET Remote Administrator 6. See more information about remote management compatibility.

ESET Endpoint Protection Platform covers also following OSes:

Windows logo
macOS logo
Linux logo
Android logo
Microsoft Azure logo
VMware logo

Looking for complete security for your network?

Related enterprise-grade solutions

ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

  • Security Management Center
  • Endpoint Protection Platform
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption

Related products and services

Looking for the complete security of your network?

Related enterprise-grade solutions

ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

  • Security Management Center
  • Endpoint Protection Platform
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption

Related products and services

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Green field with neuron connections

ESET Threat Intelligence unveiling Portal 2.0

To provide even more comprehensive access to all the knowledge provided by ESET Threat Intelligence, ESET is launching a new portal that allows for a fully automated experience of the platform.

phone in the dark, lit on both sides by a green and yellow light

Your Apple devices are not as secure as you think. Learn how to raise their protection

Cyber criminals can use much simpler methods to bypass Apple security than malware.

See more

We Live Security blog

Teaching appropriate use of AI tech – Week in security with Tony Anscombe

Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology

Executives behaving badly: 5 ways to manage the executive cyberthreat

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk