	{"id":250,"date":"2008-08-05T12:55:49","date_gmt":"2008-08-05T11:55:49","guid":{"rendered":"http:\/\/blog.intego.com\/?p=250"},"modified":"2012-12-12T13:49:09","modified_gmt":"2012-12-12T21:49:09","slug":"iphone-security-not-good-enough-for-the-enterprise","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/","title":{"rendered":"iPhone Security Not Good Enough for the Enterprise"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\"><\/p>\n<p>Computerworld today <a href=\"http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&#038;articleId=9111526&#038;pageNumber=1\">discusses<\/a> a research note by Gartner analyst Ken Dulaney, who claims that the iPhone is not secure enough for use by businesses. He cites that fact that data on the iPhone cannot be encrypted, which suggests that lost or stolen iPhones can reveal a great deal of information. Dulaney also points out several other problems with the iPhone for enterprises, such as its short battery life and data-roaming costs. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computerworld today discusses a research note by Gartner analyst Ken Dulaney, who claims that the iPhone is not secure enough for use by businesses. He cites that fact that data on the iPhone cannot be encrypted, which suggests that lost or stolen iPhones can reveal a great deal of information. Dulaney also points out several [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Computerworld today discusses a research note by Gartner analyst Ken Dulaney, who claims that the iPhone is not secure enough for use by businesses. He\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iPhone Security Not Good Enough for the Enterprise - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Computerworld today discusses a research note by Gartner analyst Ken Dulaney, who claims that the iPhone is not secure enough for use by businesses. He\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-08-05T11:55:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-12T21:49:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/\",\"name\":\"iPhone Security Not Good Enough for the Enterprise - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#primaryimage\"},\"datePublished\":\"2008-08-05T11:55:49+00:00\",\"dateModified\":\"2012-12-12T21:49:09+00:00\",\"description\":\"Computerworld today discusses a research note by Gartner analyst Ken Dulaney, who claims that the iPhone is not secure enough for use by businesses. He\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"iPhone Security Not Good Enough for the Enterprise\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"iPhone Security Not Good Enough for the Enterprise\",\"datePublished\":\"2008-08-05T11:55:49+00:00\",\"dateModified\":\"2012-12-12T21:49:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#webpage\"},\"wordCount\":79,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\",\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Computerworld today discusses a research note by Gartner analyst Ken Dulaney, who claims that the iPhone is not secure enough for use by businesses. He","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/","og_locale":"en_US","og_type":"article","og_title":"iPhone Security Not Good Enough for the Enterprise - The Mac Security Blog","og_description":"Computerworld today discusses a research note by Gartner analyst Ken Dulaney, who claims that the iPhone is not secure enough for use by businesses. He","og_url":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-08-05T11:55:49+00:00","article_modified_time":"2012-12-12T21:49:09+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/","name":"iPhone Security Not Good Enough for the Enterprise - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#primaryimage"},"datePublished":"2008-08-05T11:55:49+00:00","dateModified":"2012-12-12T21:49:09+00:00","description":"Computerworld today discusses a research note by Gartner analyst Ken Dulaney, who claims that the iPhone is not secure enough for use by businesses. He","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"iPhone Security Not Good Enough for the Enterprise"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"iPhone Security Not Good Enough for the Enterprise","datePublished":"2008-08-05T11:55:49+00:00","dateModified":"2012-12-12T21:49:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#webpage"},"wordCount":79,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-security-not-good-enough-for-the-enterprise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg","articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-42","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/250"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=250"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/250\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}