Deploying. Mac. Five best practices

Similar documents
ios Enterprise Deployment Overview

Mac in the Enterprise

ios Education Deployment Overview

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1

Your Business on a Mac Channel Messaging Kit U.S.

Symantec Mobile Management for Configuration Manager 7.2

Deploying iphone and ipad Apple Configurator

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools

Symantec Mobile Management 7.2

This is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT.

Symantec Mobile Management Suite

Symantec Mobile Management 7.2

Apple Technical White Paper Best Practices for Deploying Mac with OS X

Athena Mobile Device Management from Symantec

mobilecho: 5-Step Deployment Plan for Mobile File Management

Best-of-Breed Enterprise Mac Management

ipad in Business Mobile Device Management

ipad in Business The Top Considerations

iphone in Business Mobile Device Management

Mobile Device Management

BEST PRACTICES IN BYOD

Security for Mac Computers in the Enterprise

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

iphone in Business How-To Setup Guide for Users

Absolute Manage MDM. John Wu Systems Engineer

Ensuring the security of your mobile business intelligence

Deploying iphone and ipad Virtual Private Networks

Licensing Windows and Microsoft Office for use on a Mac

Deploying iphone and ipad Mobile Device Management

Community Chat. MDM Meets Endpoint Mgmt. Justin Strong Sr. Product Marketing Manager

When enterprise mobility strategies are discussed, security is usually one of the first topics

Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence

Kaseya IT Automation Framework

Enterprise Security with mobilecho

CentraStage & Apple Configurator

ipad Classroom Installation & Deployment Important information

Deploying iphone and ipad Security Overview

Device Lifecycle Management

Cisco Mobile Collaboration Management Service

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Parallels Mac Management v4.0

Apple Professional Services Offerings Catalog. April 2015

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Simplifying Device Enrollment and Content Distribution Using the Device Enrollment Program, the Volume Purchase Program, and the Casper Suite

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

Direct Control for Mobile & Supporting Mac OS X in Windows Environments

ipad in Business Security

Harry Fike Frostburg State University Office of Information Technology Technical Services

Mobile Device Management for CFAES

Difference Between IOS, ERP and IBM Exchange Rate

iphone in Business Security Overview

WhitePaper. Private Cloud Computing Essentials

Mac Integration Basics Adding a Mac to a Network That Uses Windows or Other Standards

Why Digital Certificates Are Essential for Managing Mobile Devices

ForeScout MDM Enterprise

Choosing an MDM Platform

ManageEngine Desktop Central. Mobile Device Management User Guide

Deploying Apple ios in Education

Systems Manager Cloud-Based Enterprise Mobility Management

Managing BitLocker With SafeGuard Enterprise

Simplify Your Windows Server Migration

The User is Evolving. July 12, 2011

SECURING TODAY S MOBILE WORKFORCE

Ensuring the security of your mobile business intelligence

CHOOSING AN MDM PLATFORM

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

MOBILIZE YOUR WORKFORCE FOR GREATER PRODUCTIVITY

BFA TECHNOLOGIES. Macintosh in the Enterprise

Securing Enterprise Mobility for Greater Competitive Advantage

Secure, Centralized, Simple

Application Notes. How to Configure UTM with Apple OSX and ios Devices for IPsec VPN

Go Cloud, Go Google. Discover the benefits of Google for Education. making IT work for teachers and learners

Dell Mobile Management. Apple Device Enrollment Program

The ForeScout Difference

McAfee Enterprise Mobility Management

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

End User Devices Security Guidance: Apple ios 8

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Why you need. McAfee. Multi Acess PARTNER SERVICES

Guidance End User Devices Security Guidance: Apple OS X 10.9

INFORMATION PROTECTED

USING GENIE REMOTELY

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.

New Choices in Windows * Device Management

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

User Guide. Mobile Device Management. Version 1.0. Published September 2011

Comprehensive Enterprise Mobile Management for ios 8

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

VPN Configuration Guide. Parallels Remote Desktop for Mac

Symantec IT Management Suite 7.5 powered by Altiris

Mobile Communicator for Mobile Devices

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Interact Intranet Version 7. Technical Requirements. August Interact

Cisco WebEx Meeting Center

Symantec Client Management Suite 7.5 powered by Altiris

End User Devices Security Guidance: Apple OS X 10.10

activecho Driving Secure Enterprise File Sharing and Syncing

Transcription:

Deploying Mac Five best practices

Deploying Mac Today more than ever, IT teams are looking to support Mac users at work. These five best practices used by medium and large organizations like yours will help your team integrate OS X quickly and efficiently. Whether you're managing a large fleet of Mac systems or just getting started with OS X, these tips will save you time and effort. For in-depth information on deploying OS X, please access the OS X Deployment Reference in the Additional Resources section of this guide. And for additional information, including details on how to set up a customized Mac pilot, feel free to contact your Authorized Apple Reseller or account representative.

Table of Contents 1 Start with a Mac pilot. 2 Manage OS X like ios. 3 Streamline deployment. 4 Leverage built-in security. 5 Take advantage of support resources.

1 Start with a Mac pilot. Most questions concerning Mac security, management, and deployment can be answered during a Mac pilot or evaluation. Two key components of an evaluation are an employee workflow analysis and OS X application compatibility analysis. Information from these findings help determine which employee roles are best suited to use Mac. Documenting your network environment, systems of record, and device lifecycle management strategy are also essential to completing an OS X evaluation. Your internal IT team, an Authorized Apple Reseller, or account team can plan and implement a Mac evaluation for your organization.

Q How can I manage moving our legacy applications to OS X? A Legacy applications are often tied to specific versions of Microsoft Windows and Internet Explorer. Deployment teams can move these to standards-based web solutions, which also support today's mobile devices. For those applications that aren't supported yet, employees can use Boot Camp from Apple or third-party remote desktop or virtualization solutions. 1

2 Manage OS X like ios. Mac systems are as easy to manage as ipad and iphone. With a few simple settings, your IT staff can configure OS X to give employees secure access to organizational resources, such as email, calendars, contacts, WiFi, and Virtual Private Networks (VPN). Mac also fits easily in Active Directory (AD) environments from the simplest to the most complex integration scenarios.

Q What capabilities are available to manage Mac? A Configuration profiles, built into every Mac, provide IT with powerful configuration technology. With mobile device management (MDM), configuration profiles empower IT teams to manage user accounts, configure system settings, enforce restrictions, set password policies and more.

3 Streamline deployment. The Device Enrollment Program (DEP) makes over-the-air deployment a reality for IT teams. With DEP, large-scale deployments are seamless providing fast, streamlined activation for corporateowned Mac and ios devices. DEP also automates mobile device management enrollment, allowing employees to get started right out of the box. With less need for staging services or for deployment teams to touch every Mac, DEP can save IT teams time and resources.

Q Can I enforce encryption on Mac? And can IT recover data on an encrypted Mac without a user password? A Yes and yes. FileVault, the powerful encryption technology in OS X, is enabled in every new Mac. With the Device Enrollment Program and mobile device management, IT can manage FileVault policy and recovery options. And with MDM, FileVault can be provisioned with an institutional and/or personal recovery key that IT can escrow for data recovery.

4 Leverage built-in security. When it comes to security, Mac has a multilayered system of defenses that work to protect data, applications, and services. FileVault encrypts the entire drive on Mac, protecting data with XTS-AES 128 encryption. Gatekeeper makes it safer to download apps by protecting employees from inadvertently installing malicious software. Advanced security features such as System Integrity Protection, the App Sandbox, and Address Space Layout Randomization are included in OS X. And Mac also offers an easyto-use application-based firewall to help protect against network threats.

5 Take advantage of support and resources. A variety of enterprise resources and support are available to help IT teams deploy Mac. Mac evaluation resources, flexible leasing and tradein options, onsite consultations, technical documentation, and training and certification programs are just some of the tools available to your organization. AppleCare provides organizations with a variety of solutions such as 24/7 live chat employee support and hardware coverage including next-day onsite service. 2 AppleCare also offers IT department-level support for complex deployment and integration scenarios. And IT can get backup help and training for help desk and support teams through AppleCare. Trade In High trade-in value makes Mac a great investment. $ Leasing Delivers the latest technology with minimal upfront costs. Apple Care One-stop service and support from Apple experts.

Q How can my IT team get support as we integrate OS X into our crossplatform environment? A With an AppleCare OS Support Agreement, your IT department has a direct line to Apple experts for support as they integrate Apple technology into your existing infrastructure.

Additional Resources For more information on deploying, managing, and securing Mac, see the OS X Deployment Reference below and contact your Apple Authorized Reseller or account representative. OS X Deployment Reference Read the real-world stories of medium and large organizations like yours that are boosting productivity with Mac. And discover how these IT teams have successfully integrated OS X into their environments. BiblioTech Mac Customer Profile CareerBuilder Mac Customer Profile The CDM Group Mac Customer Profile Cisco Systems Mac Customer Profile Kelly Services Mac Customer Profile

1. Sold separately. 2. Next day service available for AppleCare for Enterprise customers in certain regions only. 2015 Apple Inc. All rights reserved. Apple, the Apple logo, AppleCare, Boot Camp, Filevault, ipad, iphone, Mac, the Mac logo, MacBook Air, MacBook Pro, Mac Mini and OS X are trademarks of Apple Inc., registered in the U.S. and other countries. ios is a trademark or registered trademark of Cisco in the U.S. and other countries and is used under license. Other product and company names mentioned herein may be trademarks of their respective companies.