This article has been reviewed according to Science X's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:
fact-checked
trusted source
proofread
Digicape graduates now qualified to train businesses and schools on iOS deployment
Two Digicape employees recently completed a series of accredited courses on iOS deployment; making them two of only three Apple Certified Trainers (ACT) in the country who are qualified to train decision-makers within businesses and educational institutions on the principles of iOS deployment.
Digicape’s Education Director Alan Goldberg and Technical Director Mark Parsons embarked on a series of workshops which taught delegates the tools and skills required to train others to successfully deploy user and company-owned iOS devices.
Digicape has also recently unveiled its new Apple Authorised Training Partner centre at its headquarters in Pinelands, Cape Town. Says Parsons, “This enables us to offer accredited training to IT professionals, as well as to conduct on-site examinations.”
At the iOS deployment workshops, delegates were taught how to train professionals to integrate iOS devices into existing organisational networks. The workshops also outlined the role of Mobile Device Management (MDM), Volume Purchase Programme (VPP) and Device Enrolment Programme (DEP) in successfully deploying iOS devices, and demonstrated how to seamlessly separate work and personal data, by devising multiple configurations for different groups of user and data type.
This construction of different configurations is critical for businesses, particularly given the trend towards a more mobile workforce.
Says Goldberg, “Most devices are privy to both the user’s personal and professional data. At best, this erosion of data demarcation can lead to embarrassment…ever sent a personal mail intended for your friend Joan to your friend’s namesake – who happens to be your boss – thanks to the auto-populate email function?
“At worst, it can lead to an infringement of company data.”
Through configuring a series of custom protocols, companies can limit what employees do with confidential data.
“The benefit to our clients is that we can now assist businesses and educational institutions in planning their security, privacy and deployment strategies. We can guide them in deciding which configurations are best suited to each level of user and data type – safeguarding data while still allowing the user agency – and then show them how to deploy these configurations at scale,” explains Goldberg.
Edited by Fundisiwe Maseko
Follow Fundisiwe Maseko on Twitter
Follow IT News Africa on Twitter