Compliance and security. Reduce risks and maintain user experience.

Compliance and security. Reduce risks and maintain user experience.

With the Casper Suite it is painless to secure your Apple devices without infringing on the magical end-user experience. First, understand your organization's security requirements. Next, translate those requirements into tasks and tools to deploy, activate, and monitor. Typically, this task set will include full disk encryption, password protection for organizational assets, and protection from software that may hide hacks and attacks. In some organizations with vulnerable users, IT may also need to regulate explicit content. The Casper Suite framework can be used to not only deploy the right software and settings to your Apple population, but it can also monitor those settings and automatically make corrections as needed. And a report on the security status of devices in your environment is only a click away.


Full disk encryption with FileVault 2 and the Casper Suite: security without jumping through hoops.

With FileVault 2 Apple has created a free, integrated toolset for the Mac that meets common standards for enterprise level disk encryption. The use of full disk encryption on enterprise computers is a long running standard that has proven to be the best way to protect user data. Some organizations have not implemented encryption due to perceived complexity and cost. With our FileVault 2 integration those concerns are a thing of the past by simplifying complexity and leveraging built-in tools. You too can embrace and extend FileVault 2's capabilities by using the Casper Suite to deploy, activate, and monitor FileVault 2 on your client computers. Learn more.

Full disk encryption with FileVault 2 and the Casper Suite
  • 1

    View encryption status for all of your users, allowing you to identify which users need to be encrypted.

Reporting: FileVault 2 status
Full disk encryption with FileVault 2 and the Casper Suite

Enable your users to self enroll in disk encryption on their own schedule through Self Service.

Self Service: FileVault 2

Remote lock and wipe: closing the door to data loss.

When a computer or mobile device is lost or stolen, many users are most concerned about the missing hardware. In IT, we've learned that the value of lost data or risk of unauthorized access to data far outweighs the finite cost of hardware replacement. So while we definitely recommend hardware security as appropriate for your organization—such as secure carts or cases—we prefer to focus on securing the data on lost devices. With the Casper Suite, IT can remotely lock or wipe lost or stolen devices, ensuring that organization data is secure. This over-the-air command can be executed immediately, or the moment the device comes online, leaving no room for unauthorized users to operate. Your organization can then pursue hardware recovery or replacement per your policy, while knowing that you've effectively shut the door on unauthorized access to sensitive data in the meantime.

IT can remotely lock or wipe lost or stolen devices, ensuring that organization data is secure
  • 1

    Reporting can be done on individual or group security status, sending alerts when devices are non-compliant.

Reporting: security
IT can remotely lock or wipe lost or stolen devices, ensuring that organization data is secure
  • 1

    All management actions are timestamped and logged, and iterate with syslog servers for compliance reporting.

Reporting: management history
IT can remotely lock or wipe lost or stolen devices, ensuring that organization data is secure
  • 1

    Send remote commands to lock, wipe, and clear passcodes on Mac, iPad, and iPhone.

Reporting: pending commands

Macs iPads and iPhones icon

Password protection for first level security.

The simplest strategies can be the most effective when setting security standards for your organization. A passcode for a device will foil most attempts at unauthorized access to sensitive content. Some users view passcodes as more of a hassle than an important security measure and may be lax about using this simple tool. With the Casper Suite, your organization has the ability to require that a simple or complex password be maintained on managed Mac, iPad, and iPhone. If a user or device falls out of compliance with this requirement, the Casper Suite can be set to automatically reinstate the requirement on the device and to notify IT. The organization gains the ability to not only enforce the password requirement but also to report against compliance, making this first line of defense as strong as possible.

Macs iPads and iPhones icon

Know your accounts:

use the Casper Suite to manage administrator and local accounts, using your existing framework.

There are a variety of accounts on most devices and keeping them updated and secure is an ongoing activity for most IT departments. Every account used in the Casper Suite can be tied into your directory service to ensure that any changes you make are in effect immediately. If these accounts are compromised, you only need to update one set of accounts to return to a secure state. The Casper Suite can be used to remotely manage these local accounts on Mac, ensuring that accounts and passwords are always current and a fix is only a policy away.

iPads and iPhones icon

Mobile data security:

freedom and reassurance.

Users are increasingly blending their personal and professional lives on iPhone and iPad, and IT admins now have the opportunity to manage both personas with iOS 7. At the operating system level, Apple has implemented many great features that can be automated and enhanced so your users don't have to use multiple apps to accomplish simple tasks. These advances allow personal and professional data to be separated as the data moves from the iPhone and iPad to where it is stored, and ensures that only the appropriate users of the data can access it. Simple, safe, and audited data security has come natively to iOS—and the Casper Suite can automate the whole process! Learn more.

Mac icon

Bring your Mac to the office:

the Casper Suite can deploy, activate, and monitor your existing software for the Apple platform.

Often, Mac is introduced into enterprise environments alongside Windows or Linux computers, with software solutions for disk encryption, anti-virus, and backup already in place. With the Casper Suite you can help your Macs integrate into your existing technology infrastructure, making them part of your total security plan. The Casper Suite can be used to deploy, activate, and monitor many third-party solutions you may already be using. Many common enterprise titles are specifically supported within the Casper Suite inventory framework for reporting, and an extensible framework is in place to monitor solutions not found in the box. This allows you to seamlessly blend Mac into your enterprise, using the tools that you already know and trust.

Mac icon

Use the Casper Suite to meet PCI, HIPAA, Sarbanes-Oxley, or other security standards for Mac.

With data becoming a global asset, security standards that protect consumer, student, and patient data have been implemented for computers that have access to that information. For years, compliance with standards such as PCI, HIPAA, and Sarbanes-Oxley was a barrier for bringing Mac into the enterprise. With the Casper Suite, you have all the tools to bring Mac into a secure state that satisfies your organizations control objectives. We have worked with security professionals from government agencies and private firms to provide practical guidelines for implementing security standards to manage accounts and passwords, screensaver settings, deploying data encryption software, and more. If the Casper Suite does not have an existing action out of the box, organizations can deploy custom scripts or commands to enact standards or settings. Using the Casper Suite, Mac can absolutely be compliant with your security standards—and with the proven resistance Mac has to hacks and attacks, that makes it one of the best choices for a security conscious organization.

Macs iPads and iPhones icon

Prevent malware hacks and attacks using Apple's Gatekeeper and the Casper Suite.

Since the release of OS X, the Mac has enjoyed being the most secure desktop operating system used by millions of people. Infiltration and damage to an organization by hiding a bug in software is no problem for Mac users with Gatekeeper protection. With the Casper Suite you can remotely enable Gatekeeper, Apple's native tool for preventing the installation of malware on Mac. With judicious use of policies and Self Service, organizations are able to strike a balance that protects the organization while providing choices to the users. By primarily using Casper Suite's Self Service for software distribution IT can ensure that all software installed has been packaged, tested, and approved for use by IT. In today's technology landscape, however, there may be good reasons why users need to install software outside of the enterprise framework. If you receive a request of this nature you can easily disable Gatekeeper remotely to allow installation of software, re-enabling the service when ready.

Mac icon

Configuration profiles and the Casper Suite become the command center for the Apple platform.

Configuration Profiles are a common tool used for managing a variety of settings on Mac, iPad, and iPhone. Many configuration profiles affect the security of the device, such as requiring passwords or restricting access to explicit materials. Configuration profiles are simple yet powerful commands that can be deployed over-the-air, without end user interaction, to all classes of Apple devices. After you explore configuration profiles and learn how easy it is to deploy these commands with the Casper Suite, you will have near-infinite power at your command.

Mac icon

Managed preferences for Mac.

Managed Preferences (MCX) allow administrators to natively enforce individual settings on any client Mac. With the Casper Suite, administrators have access to over 250 default preferences included with the JAMF Software Server (JSS). Managed Preferences can be used to regulate screen saver settings, environmental settings, and more, becoming an integral part of your security framework. Casper Suite administrators can modify end-user environments and Managed Preferences from the web-based server in one location. Preferences can be deployed immediately through the Help Desk or scheduled and enforced through policies and can be scoped to computer groups, user groups from a directory service, buildings, or departments.

Macs iPads and iPhones icon

Automated security execution, maintenance, and reporting with the Casper Suite.

Security is not a task you perform once. It is an ongoing standard that you must define, monitor, and update as your environment evolves. However, it doesn't need to take over your world: let the Casper Suite do the grunt work. The Casper Suite will monitor the status of your security protocols across your Mac, iPad, and iPhone populations using inventory data, with policies set to automatically correct lapses in security or notify IT of non-compliance. You can create custom security reports for your organization or use the built-in templates to generate reports to demonstrate compliance with security standards, a critical step in security analysis. Understand your security standards and the tasks required to achieve them, then let the Casper Suite do the rest.