How do you encrypt/manage/remote wipe an Ipad would be the first line of 
questions.

----- Original Message -----
From: Raper, Jonathan - Eagle <[email protected]>
To: NT System Admin Issues <[email protected]>
Sent: Tue Apr 20 14:44:49 2010
Subject: need suggestions...iPad in a Windows enterprise, anyone?

Ok, I need some insight/thoughts/suggestions...especially if any of you have 
come up against this.

I have a pure Windows & Cisco environment, W2k3 AD, 802.11n with 802.1x 
authentication (we don't support 802.11b, and 802.11g is on the way out the 
door). All desktops are XP, with a small handful of 2000 Pro boxes left out in 
the field. We've never supported Vista or Apple-anything on our network, and 
pulled the last 9x box off of our network years ago. We're close to getting rid 
of all of the 2000 clients off, and we're starting to look at Windows 7. We're 
multi-specialty, multi-location, physician-owned healthcare provider, which 
means HIPAA is of significant concern. Not much else applies, since we're not 
publicly traded (aside from common sense and the law in general). We have about 
425 employees and around 65 physicians (most of the physicians are 
shareholders).

I've done a good job of keeping the iPod touch and iPhone users off of the 
network thus far, because we simply don't have the people in house to be able 
to support any more devices.

Enter the iPad, Apple's answer to the Tablet PC.

We now have physicians who are starting to ask for iPad access on the network. 
I'm not sure why, but I suppose because they think it will be so much better 
than the Lenovo X200 Tablet PCs that we JUST bought them for use with our EMR 
system. We do not yet have a functional wireless guest network.

I've tried connecting a 64 Gig iPod touch to our wireless network to no avail, 
and then discovered that apparently the iPod touch doesn't like hidden 
networks. I'm not about to start broadcasting my SSID... this gives me pause 
about even considering an iPad, not to mention that I wouldn't be able to 
control the machine or authenticate the machine against the network.

Anyway, do any of you have any arguments for or against allowing the 
iPad/iPod/iPhone, both from a support standpoint and a security standpoint?

Thanks in advance,


Jonathan L. Raper, A+, MCSA, MCSE
Technology Coordinator
Eagle Physicians & Associates, PA
[email protected]
www.eaglemds.com



Any medical information contained in this electronic message is CONFIDENTIAL 
and privileged. It is unlawful for unauthorized persons to view, copy, 
disclose, or disseminate CONFIDENTIAL information. This electronic message may 
contain information that is confidential and/or legally privileged. It is 
intended only for the use of the individual(s) and/or entity named as 
recipients in the message. If you are not an intended recipient of this 
message, please notify the sender immediately and delete this material from 
your computer. Do not deliver, distribute or copy this message, and do not 
disclose its contents or take any action in reliance on the information that it 
contains.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
 Consider the environment. Please don't print this e-mail unless you really 
need to.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to