15.03.2014 Views

iPhone - FutureTG.com

iPhone - FutureTG.com

iPhone - FutureTG.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

(Exchange ActiveSync is not to be confused with regular old ActiveSync,<br />

which is a much older technology that’s designed to update smartphones<br />

and palmtops over a cable.)<br />

Your email, address book, and calendar appointments are now sent<br />

wirelessly to your <strong>iPhone</strong>, so that it’s always kept current—and it’s sent in<br />

a way that evil rival firms can’t intercept. (It uses 128-bit encrypted SSL, if<br />

you must know.)<br />

That’s the same encryption that’s used by Outlook Web Access (OWA), which lets<br />

employees check their email, calendar, and contacts from any Web browser. In<br />

other words, if your IT administrators are willing to let you access your data using<br />

OWA, they should also be willing to let you access it with the <strong>iPhone</strong>.<br />

• Mass setup. Using a free software program for Mac or Windows called<br />

the <strong>iPhone</strong> Configuration Utility, your <strong>com</strong>pany’s network geeks can set<br />

up a bunch of <strong>iPhone</strong>s all at once.<br />

This program generates <strong>iPhone</strong> profiles (.mobileconfig files): canned<br />

<strong>iPhone</strong> setups that determine all Wi-Fi, network, password, email, and<br />

VPN settings.<br />

The IT manager can email this file to you, or post it on a secure Web page;<br />

either way, you can just open that file on your <strong>iPhone</strong>, and presto—<br />

you’re all configured and set up. And the IT manager never has to handle<br />

every phone individually.<br />

• Security. In the event of the unthinkable—you lose your <strong>iPhone</strong>, or it<br />

gets stolen, and vital <strong>com</strong>pany secrets are now “in the wild,” susceptible<br />

to discovery by your <strong>com</strong>pany’s rivals—the network administrators<br />

have a handy tool at their disposal. They can erase your entire <strong>iPhone</strong> by<br />

remote control, even though they have no idea where it is or who has it.<br />

Actually, it gets even better. If your <strong>com</strong>pany is using the 2007 version of Exchange<br />

Server, you can send a “remote wipe” <strong>com</strong>mand to your own <strong>iPhone</strong>. (You can do<br />

that by logging in to your Outlook Web Access site, using any <strong>com</strong>puter.)<br />

That’s good to remember if you’ve lost your <strong>iPhone</strong> and don’t really feel up to<br />

admitting it to the IT guy.<br />

The <strong>iPhone</strong> can now also connect to wireless networks using the latest,<br />

super-secure connections (WPA Enterprise and WPA2 Enterprise), which<br />

are highly resistant to hacker attacks. And when you’re using Virtual<br />

284<br />

Chapter 15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!