Apple Platform Security
- Welcome
- Intro to Apple platform security
-
- System security overview
- Signed system volume security
- Secure software updates
- Operating system integrity
- Activating data connections securely
- Verifying accessories
- BlastDoor for Messages and IDS
- Lockdown Mode security
- System security for watchOS
- Random number generation
- Apple Security Research Device
-
- Services security overview
-
- Apple Pay security overview
- Apple Pay component security
- How Apple Pay keeps users’ purchases protected
- Payment authorization with Apple Pay
- Paying with cards using Apple Pay
- Contactless passes in Apple Pay
- Rendering cards unusable with Apple Pay
- Apple Card security
- Apple Cash security
- Tap to Pay on iPhone
- Secure Apple Messages for Business
- FaceTime security
- Glossary
- Document revision history
- Copyright
Secure device management overview
iOS, iPadOS, macOS, tvOS, and watchOS support flexible security policies and configurations that are easy to enforce and manage. Through them, organizations can protect corporate information and help ensure that employees meet enterprise requirements, even if they are using devices they’ve provided themselves—for example, as part of a “bring your own device” (BYOD) program.
Organizations can use the mobile device management (MDM) framework implemented by an MDM solution to enforce passcode requirements, configure settings, restrict functionality, and even remotely wipe corporate data on managed devices. This helps keep corporate data secure, even when employees use their personal devices to access this data.
သင်၏ အကြံပြုချက်အတွက် ကျေးဇူးတင်ပါသည်။