Ready for work.

Integrate, secure, and deploy iPad.

Deployment Scenarios

Learn how iPad integrates seamlessly into enterprise environments with these deployment scenarios.


iOS Security

Learn how iOS is designed with security at its core.


Seamless integration

iPad integrates with your company’s existing infrastructure thanks to built-in support for key enterprise technologies. Get secure access to email, calendar, and contacts via Exchange ActiveSync or open standards like IMAP, CalDAV and CardDAV. With support for IPSec and SSL VPN and WPA2 Enterprise Wi-Fi, users can also connect to private corporate networks.

Microsoft Exchange ActiveSync Support

iPad connects directly to enterprise mail servers like Microsoft Exchange and Lotus Domino via Exchange ActiveSync providing users push email, calendar events, and contacts. IT can enforce complex passcodes and remotely wipe a lost or stolen iPad instantly. Certificate-based authentication means only approved users get access to Exchange, and encrypted SSL communication to and from the server keeps data safe.

Standards-based Servers

iPad also supports standards-based servers for email, calendars and contacts. IMAP servers enable users to sync email and notes. CalDAV support for calendar servers like iCal Server, Oracle Beehive, or Zimbra delivers new events and allows user to create invitations on the go. CardDAV and LDAP support gives users access to their corporate directories.

Virtual Private Networks

iPad easily connects with corporate VPN servers to give users secure access to critical business information. The built-in VPN client supports Cisco IPSec, L2TP/IPSec, PPTP and App Store apps from Juniper and Cisco enable support for SSL VPN environments. VPN On Demand on iPad leverages certificate-based authentication to make connecting to VPN servers transparent to users.

Enterprise Wi-Fi Networks

Accessing enterprise Wi-Fi networks with iPad is seamless thanks to support for WPA2 Enterprise Wi-Fi with 802.1X authentication. Features like Automatic Wi-Fi Login and Persistent Wi-Fi make the process of joining known networks and staying connected easy whether users are in the office or on the road.

Secure your data

Device policies, restrictions and strong encryption methods on iPad provide a layered approach to keeping your information secure. iPad uses hardware encryption to protect all data at rest. To further secure mail messages and attachments iPad uses Data Protection which leverages the unique device passcode to generate the encryption key. And, in the event of a lost or stolen iPad, all data and settings can be cleared by issuing a remote wipe command from Exchange or a Mobile Device Management server.

iPad Security Resources

Device Security

iPad provides over-the-air policy enforcement to prevent unauthorized access to important information. A device passcode is often the first line of defense, and iPad allows you to select from an extensive set of requirements including timeout periods and passcode complexity. Additional policies define device restrictions like installation of applications or access to YouTube.

Data Protection

To protect all data at rest, iPad features built-in hardware encryption using AES 256-bit encoding. Building on the hardware encryption capabilities of iPad, email messages and attachments stored on the device can be further secured by using Data Protection. Data Protection uses a user’s device passcode to generate a strong encryption key. This key prevents data from being accessed when the device is locked, ensuring that critical information is secured even if the device is compromised.

Network Security

iPad provides proven technologies to securely access corporate information via Wi-Fi or cellular data networks. iPad integrates with a broad range of VPN technologies to ensure the highest level of IP-based encryption for transmission of sensitive information. Support for SSL/TLS is leveraged by applications to enable encrypted communication between iPad and corporate services.

Platform Security

iPad provides a secure platform foundation for third-party applications. All iPad apps must be signed by developers, to ensure apps haven’t been tampered with or altered. Apps are also "sandboxed" so they cannot access data stored by other applications. Credentials used by applications are also sandboxed and stored in a secured, encrypted keychain. Developers can also build encryption into their applications, to further protect sensitive information.

Easy configuration

Businesses have a variety of options for deploying iPad across their enterprises. End-users can quickly install configuration profiles to get corporate services up and running. For large scale deployments IT can query and manage devices with Mobile Device Management. iTunes can be customized to fit the needs of both IT and end-users. And, enterprises can also distribute custom iPad apps over-the-air for their users to install.

iPad Deployment Resources

Self-service setup

Configuring iPad for access to corporate services is simple for users. Deliver iPad directly to their desk and users can manually enter settings or install a configuration file to setup the device automatically and ensure their iPad is secure and ready for work.

Mobile Device Management

Deploying and managing a large number of iPad users is easier than ever. Mobile Device Management APIs can be integrated with third-party solutions to wirelessly configure and update settings, monitor compliance with corporate policies, and even wipe or lock managed iPad devices. Learn more

Wireless App Distribution

iPad enables enterprises to securely host and wirelessly distribute in-house apps to employees over Wi-Fi and 3G. Apps can be updated without requiring users to connect to their computers. In-house apps can be hosted on any web server accessible to users. Users simply tap on a URL to install apps wirelessly without needing to connect to their computers.

Mass Configuration

Using Apple Configurator, an OS X app, iOS devices can be mass configured for deployment to users. Apple Configurator has three simple workflows used to prepare new devices for immediate distribution, supervise devices that need to maintain a standard configuration, and assign devices to specific users. Learn more