Pushed by the trend of mobility and byod (bring your own device), Apples iOS based iPhone and IPad platforms are making their way into the enterprise.
This article describes the security mechanisms available on iOS including strengths and weaknesses, and demonstrates how a company can adopt these mechanisms to keep up with the latest security threats targeting mobile devices.