Skip to main content

Endpoint Encryption

  • Chapter
  • First Online:
Apple Device Management
  • 600 Accesses

Abstract

The data stored on your computer or mobile device is important to at least one person, and that is the person using the device. Along with it being important, there is always at least some data that you would prefer other people not see. This data could include passwords, financial data, browser history, or that text conversation between you and your significant other which is really just for your eyes only. Encryption helps protect that data from being accessed by others, and Apple has invested considerable effort to make sure that the encryption available to both iOS and macOS is not only strong enough to fend off both casual interlopers and investigators with the resources of nation states behind them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Edge, C., Trouton, R. (2023). Endpoint Encryption. In: Apple Device Management. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-9156-6_7

Download citation

Publish with us

Policies and ethics