On Sept. 12, Apple announced several upgraded devices that will come preloaded with its latest mobile operating system (OS): iOS 12. With each new iteration of Apple’s mobile OS, new and exciting enhancements provide improved experiences for personal and professional use.

With iOS 12 comes a plethora of fun features, such as Memoji, which allows you to create and customize your own animated avatar, and a few user interface (UI) improvements centered around ease of use in native apps such as Messages and Photos. Other improvements are based around device performance and user-centric enhancements. The most noteworthy features, however, aren’t just for the end user, but the enterprise as well.

More Control, Less Hassle

Over the years, Apple has continuously improved its ability to meet the needs of IT and security leaders. Growing with the ever-changing mobile landscape, iOS has followed the evolution of device management, from mobile device management (MDM) to enterprise mobility management (EMM) to the most current solution, unified endpoint management (UEM). With UEM, IT teams can manage devices, users, apps, content, Internet of Things (IoT) deployments and everything in between under one console.

Each new version of iOS comes with new and improved management capabilities, and this latest iteration is no different. Most features will only apply to devices in Supervised Mode via the Apple Device Enrollment Program (DEP). These new features offer much-needed management capabilities, including:

  1. Enhanced performance — Apps will open twice as fast when running multiple processes, such as launching the keyboard and camera to quickly complete the task at hand;
  2. USB privacy and security — This new feature will make it more difficult for malicious actors to unlock an iOS device via USB connection;
  3. Health records and app development — Health record application programming interfaces (APIs) will allow developers for healthcare facilities to utilize patient records to monitor medications, admissions and history in a secure and encrypted manner;
  4. CarPlay enhancements — Third-party navigation apps can now be utilized with UEM solutions showing work-related notifications on screen;
  5. Password auto-fill — Users can take advantage of password auto-fill prompts on their devices, enabling authentication via TouchID;
  6. Password proximity requests — Devices in range of each other (iOS to macOS, for example) can share a password request, much like the handoff feature;
  7. Password sharing — When connecting to a network for the first time, users can share the network password with other iOS devices for faster connectivity;
  8. Contact management — Unmanaged users can read corporate-managed contacts within their UEM solution;
  9. Critical alerts — Opt-in notifications that bypass Do Not Disturb offer important alerts, including notifications related to medical situations, public safety and home security;
  10. Grouped notifications — Rather than having long lists of notifications on the lock screen, iOS 12 now groups notifications by app so users can quickly go through them based on priority;
  11. OAuth verification — Open Authentication (OAuth) allows users to verify and connect to third-party apps without releasing their password; and
  12. Device support — iOS 12 will be available on older devices, so IT teams can save time and cost by using their existing devices.

In addition to the upgraded devices Apple announced on Sept. 12 that will come preloaded with the new OS, iOS 12 will be available on the following previously released devices:

iPhone

iPad

iPhone X

12.9-inch iPad Pro 2nd generation

iPhone 8

12.9-inch iPad Pro 1st generation

iPhone 8 Plus

10.5-inch iPad Pro

iPhone 7

9.7-inch iPad Pro

iPhone 7 Plus

iPad 6th generation

iPhone 6s

iPad 5th generation

iPhone 6s Plus

iPad Air 2

iPhone 6

iPad Air

iPhone 6 Plus

iPad mini 4

iPhone SE

iPad mini 3

iPhone 5s

iPad mini 2

Scroll to view full table

Are You Ready for the iOS 12 Update?

With all the new features associated with iOS 12, many IT teams are preparing to upgrade user devices. With a UEM solution, IT teams can take advantage of all the management capabilities they need to make sure their users are productive, secure and compliant with corporate policies. IBM MaaS360 with Watson offers day-zero support for iOS 12 and other enterprise integrations with Apple can take the guesswork out of managing devices.

To make sure you’re ready to take advantage of the latest and greatest features iOS 12 has to offer, join us for a live webinar on Sept. 27 at 11 a.m. EST.

Register for the Sept. 27 webinar: iOS 12 in the Enterprise

More from Endpoint

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities. Figure 1 — Exploitation timeline However, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack…

When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule

In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged to impair visibility of the malware’s operations. This blog will not rehash analysis of the Lazarus malware sample or Event Tracing for Windows (ETW) as that has been previously covered in the X-Force blog post. This blog will focus on highlighting the opportunities for detection of the FudModule within the…

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…