Gartner Research

iPhone and iPad Security FAQs

Published: 20 November 2017

ID: G00327391

Analyst(s): John Girard, Dionisio Zumerle

Summary

Security and risk management leaders should not feel complacent about iOS security, despite a good track record. Best practices and vigilance are recommended to prevent leakage and maintain compliance.

Table Of Contents
  • Key Challenges

Introduction

  • iOS Management Decisions Have an Impact on Enterprise Risk

Analysis

  • Should We Use iOS Device Supervision?
  • Should We Allow iTunes and iCloud Backups?
  • What Should Our Minimum iOS Hardware and Software Requirements Be?
  • How Should We Go About Updating iOS Versions on Devices?
  • Should We Allow Siri?
  • Should We Use Touch ID?
  • Should We Use Face ID?
  • Do We Need Anti-Malware for Our iPhones and iPads?
  • Can We Use a Shared Apple ID?
  • Should Users Own the Apple ID?
  • How Can We Archive Text Messages From iPhones?
  • Should We Use the iOS Keychain to Store Credentials?
  • Do We Need a Container for Sensitive Apps and Data?
  • Do We Need a VPN Solution for iOS Devices?
  • Is AirDrop Secure?
  • How Should We Handle Connected Apple Devices Such as Apple Watch and Apple TV?

Gartner Recommended Reading

©2020 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Purchase this Document

To purchase this document, you will need to register or sign in above

Become a client

Learn how to access this content as a Gartner client.