iPads storm the enterprise

By Maria Korolov, Network World |  Mobile & Wireless, encryption, ipad

As global accounts director at Altus, Inc., Michelle Klatt's job is to visit Fortune 500 companies and demonstrate her firm's video management software. When the iPad came out a year ago, she was all over it.

"I was one of the first salespeople to get one," she says. "I fought very hard.'' Her company's videos look "absolutely beautiful" on the iPad, she says. And once the sales presentation is over, she uses her iPad to update the Salesforce.com entry for the sales prospect, log the meeting, send out follow-up e-mails, manage her LinkedIn contacts, and do other job-related paperwork.

Five iPAD safety tips

"I do everything on the iPad," she says. "It's really my laptop when I want it to be, but it's far lighter."

Klatt is at the leading edge of a growing wave of enterprise customers who are adopting the iPad for business use. "Enterprise CIOs are adding iPad to their approved device list at an amazing rate,'' Apple CFO Peter Oppenheimer said recently. "Today, over 80% of the Fortune 100 are already deploying or piloting iPad, up from 65% in the September quarter. Some recent examples include JPMorgan Chase, Cardinal Health, Wells Fargo, Archer Daniels Midland, Sears Holdings and DuPont."

A major reason that iPads are being accepted in the enterprise is that Apple significantly upgraded its iOS operating system last summer to include a number of enterprise-friendly security features.

"These include application-level encryption," says Andrew Jaquith, CTO at Perimeter E-Security and former lead security analyst at Forrester Research. "This encrypts the content of each application's data with a unique key, separating out each application's data on the device."

HP TouchPad vs. Apple iPad tablets showdown

Encryption is built into the hardware, making it fast - and also making it easy for enterprises to wipe the device if it's lost or stolen. "In a tenth of a second," Jaquith says.

In addition, iOS 4 allows enterprises to impose security policies on their mobile devices. Policies can be imposed on all company-owned iPads and iPhones, or added to personal devices owned by employees.

Originally published on Network World |  Click here to read the original story.
Join us:






Mobile & WirelessWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question