{"id":1523,"date":"2010-04-21T08:40:08","date_gmt":"2010-04-21T07:40:08","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1523"},"modified":"2012-12-12T13:47:28","modified_gmt":"2012-12-12T21:47:28","slug":"is-the-ipad-secure-enough-for-businesses","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/","title":{"rendered":"Is the iPad Secure Enough for Businesses?"},"content":{"rendered":"<p>Pundits are always ready to discuss whether the latest gadget is &#8220;ready for the enterprise,&#8221; and an article published by InfoWorld shortly after the release of the iPad said that &#8220;<a href=\"http:\/\/www.infoworld.com\/d\/mobilize\/ipad-security-the-enterprise-still-subject-debate-719\">some analysts say the iPad deserves an &#8220;F&#8221; for security readiness<\/a>.&#8221; <\/p>\n<p>But another <a href=\"http:\/\/www.infoworld.com\/d\/mobilize\/ipad-security-its-foolish-double-standard-847\">article published by InfoWorld<\/a> suggests that the conclusions of the first are just a sign of double-standards, hypocrisy, and &#8220;Neanderthal IT.&#8221; Author Galen Gruman discusses a &#8220;flawed premise&#8221; that many &#8220;analysts&#8221; take for granted, &#8220;that mobile devices must meet military-grade security needs or, at least, financial-services-grade security needs.&#8221; He points out that laptops don&#8217;t meet these standards, and says that &#8220;the issue is not security but resistance to change &#8212; a reluctance to accept new technologies that are user-oriented.&#8221;<\/p>\n<p>The points made in this article are valid, and IT managers should first assess the real needs of their companies before rejecting devices. In most cases, the businesses they run don&#8217;t have needs that require iron-clad security, or, at a minimum, devices such as the iPad won&#8217;t be used with data that needs to be secure. If employees want to use the iPad for surfing the web, browsing PDFs or checking for non-confidential e-mail, there&#8217;s no reason to reject it, just as there&#8217;s no reason to reject Android phones or netbooks. It all depends on what the employees are planning to do with the devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pundits are always ready to discuss whether the latest gadget is &#8220;ready for the enterprise,&#8221; and an article published by InfoWorld shortly after the release of the iPad said that &#8220;some analysts say the iPad deserves an &#8220;F&#8221; for security readiness.&#8221; But another article published by InfoWorld suggests that the conclusions of the first are [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1654,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7],"tags":[51,8],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Pundits are always ready to discuss whether the latest gadget is &quot;ready for the enterprise,&quot; and an article published by InfoWorld shortly after the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is the iPad Secure Enough for Businesses?  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Pundits are always ready to discuss whether the latest gadget is &quot;ready for the enterprise,&quot; and an article published by InfoWorld shortly after the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-04-21T07:40:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-12T21:47:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/ipad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"130\" \/>\n\t<meta property=\"og:image:height\" content=\"166\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/ipad.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/ipad.jpg\",\"width\":\"130\",\"height\":\"166\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/\",\"name\":\"Is the iPad Secure Enough for Businesses? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#primaryimage\"},\"datePublished\":\"2010-04-21T07:40:08+00:00\",\"dateModified\":\"2012-12-12T21:47:28+00:00\",\"description\":\"Pundits are always ready to discuss whether the latest gadget is \\\"ready for the enterprise,\\\" and an article published by InfoWorld shortly after the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is the iPad Secure Enough for Businesses?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Is the iPad Secure Enough for Businesses?\",\"datePublished\":\"2010-04-21T07:40:08+00:00\",\"dateModified\":\"2012-12-12T21:47:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#webpage\"},\"wordCount\":234,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/ipad.jpg\",\"keywords\":[\"Enterprise\",\"iPad\"],\"articleSection\":[\"Apple\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Pundits are always ready to discuss whether the latest gadget is \"ready for the enterprise,\" and an article published by InfoWorld shortly after the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/","og_locale":"en_US","og_type":"article","og_title":"Is the iPad Secure Enough for Businesses?  - The Mac Security Blog","og_description":"Pundits are always ready to discuss whether the latest gadget is \"ready for the enterprise,\" and an article published by InfoWorld shortly after the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-04-21T07:40:08+00:00","article_modified_time":"2012-12-12T21:47:28+00:00","og_image":[{"width":"130","height":"166","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/ipad.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/ipad.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/ipad.jpg","width":"130","height":"166"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/","name":"Is the iPad Secure Enough for Businesses? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#primaryimage"},"datePublished":"2010-04-21T07:40:08+00:00","dateModified":"2012-12-12T21:47:28+00:00","description":"Pundits are always ready to discuss whether the latest gadget is \"ready for the enterprise,\" and an article published by InfoWorld shortly after the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Is the iPad Secure Enough for Businesses?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Is the iPad Secure Enough for Businesses?","datePublished":"2010-04-21T07:40:08+00:00","dateModified":"2012-12-12T21:47:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#webpage"},"wordCount":234,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/is-the-ipad-secure-enough-for-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/ipad.jpg","keywords":["Enterprise","iPad"],"articleSection":["Apple"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/05\/ipad.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oz","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1523"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1523"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1523\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/1654"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}