
Integrate, secure and deploy iPhone into your company. iPhone connects seamlessly to Microsoft Exchange and standards-based servers for access to corporate email, calendar, and contacts. Data is protected with hardware encryption and enhanced Data Protection. Users can securely access corporate networks with support for leading VPN and Wi-Fi protocols including SSL VPN. And it's easy to scale your iPhone deployment with Mobile Device Management and Wireless App Distribution for in-house apps.
iPhone integrates with your company's existing infrastructure thanks to built-in support for key enterprise technologies. Get secure access to email, calendar, and contacts via Exchange ActiveSync or open standards like IMAP, CalDAV and CardDAV. With support for IPSec and SSL VPN and WPA2 Enterprise Wi-Fi, users can also connect to private corporate networks.
iPhone Integration Resources

Microsoft Exchange ActiveSync Support
iPhone connects directly to enterprise mail servers like Microsoft Exchange and Lotus Domino via Exchange ActiveSync providing users push email, calendar events, and contacts. IT can enforce complex passcodes and remotely wipe a lost or stolen iPhone instantly. Certificate-based authentication means only approved users get access to Exchange and encrypted SSL communication to and from the server keeps data safe.
Standards-based Servers
iPhone also supports standards-based servers for email, calendars and contacts. IMAP servers enable users to sync email and notes. CalDAV support for calendar servers like iCal Server, Oracle Beehive, or Zimbra delivers new events and allow user to create invitations on the go. CardDAV and LDAP support give users access to their server-based address book and corporate directories.
Virtual Private Networks
iPhone easily connects with corporate VPN servers to securely give users access to critical information. The built-in VPN client supports Cisco IPSec, L2TP/IPSec and PPTP and App Store apps from Juniper and Cisco enable support for SSL VPN environments. VPN On Demand on iPhone leverages certificate-based authentication to make connecting to VPN servers transparent to users.
Enterprise Wi-Fi Networks
Accessing enterprise Wi-Fi networks is seamless thanks to support for WPA2 Enterprise Wi-Fi with 802.1X authentication. Features like Automatic Wi-Fi Login and Persistent Wi-Fi makes the process of joining known networks and staying connecting easy whether users are in the office or on the road.

Device policies, restrictions and strong encryption methods on iPhone provide a layered approach to keeping your information secure. iPhone uses hardware encryption to protect all data at rest. To further secure mail messages and attachments iPhone uses Data Protection which leverages the unique device passcode to generate the encryption key. And, in the event of a lost or stolen iPhone, all data and settings can be cleared by issuing a remote wipe command from Exchange or a Mobile Device Management server.
iPhone Security Overview
Security OverviewDevice Security
iPhone provides over-the-air policy enforcement to prevent unauthorized access to important information. A device passcode is often the first line of defense, and iPhone allows you to select from an extensive set of requirements including timeout periods and complexity. Additional policies define device restrictions like installation of applications, use the camera, or access to YouTube.
Data Protection
To protect all data at rest, iPhone features built-in hardware encryption using AES 256-bit encoding. Building on the hardware encryption capabilities of iPhone, email messages and attachments stored on the device can be further secured by using Data Protection. Data Protection uses a user’s device passcode to generate a strong encryption key. This key prevents data from being accessed when the device is locked, ensuring that critical information is secured even if the device is compromised.
Network Security
iPhone provides proven technologies to securely access corporate information via Wi-Fi or cellular data networks. iPhone integrates with a broad range of VPN technologies to ensure the highest level of IP-based encryption for transmission of sensitive information. Support for SSL/TLS is automatically leveraged by applications to enable encrypted communication between iPhone and corporate services.
Platform Security
iOS is a platform designed with security at its core and provides a secure platform foundation for third-party applications to take advantage of.
All iPhone apps must be signed which helps to ensure they haven’t been tampered with or altered. Apps are also “sandboxed” so they cannot access data stored by other applications. And developers can take advantage of the built-in hardware encryption on iPhone by integrating Data Protection into their apps to further protect sensitive information.
Businesses have a variety of options for deploying iPhone across their enterprises. End-users can quickly install configuration profiles to get corporate services up and running. For large scale deployments IT can query and manage the devices in their fleet with Mobile Device Management. iTunes can be customized to fit the needs of both IT and end-users. And, enterprises can also distribute custom iPhone apps over-the-air for their users to install.

Self-service setup
Configuring iPhone for access to corporate services is simple for users. Deliver iPhone directly to their desk and users can manually enter settings or install a configuration file to setup the device automatically and ensure their iPhone is secure and ready for work.
Mobile Device Management
Deploying and managing large numbers of iPhone users is easier than ever with iOS 4. Mobile Device Management APIs can be integrated with third-party solutions to wirelessly configure and update settings, monitor compliance with corporate policies, and even wipe or lock managed iPhone devices. Learn more
Wireless App Distribution
iPhone enables enterprises to securely host and wirelessly distribute in-house apps to employees over Wi-Fi and 3G. Apps can be updated without requiring users to connect to their computers. In-house apps can be hosted on any web server accessible to users. Users simply tap on a URL to install apps wirelessly without needing to connect to their computers.
iTunes controls
With iTunes permissions and controls, you can tailor iTunes to meet your company’s needs. Customize your corporate iTunes deployment by restricting or disabling network services such as streaming audio, shared media libraries, and the iTunes Store. Control access to software updates and when users are notified of new updates. And you can distribute iTunes to your corporate desktop using common desktop software deployment tools.