"So they really need partners like IBM, Accenture and HP," Gold said.
"Everyone does stuff with Apple today because they have to," he continued. "This really is just a realization that Accenture has clients who use iPhones and iPads, so let's try to build a closer relationship with Apple. To some extent, this is really marketing as much as it is anything else.
"Is it significant? It's significant if you're an Accenture client, but it's not clear exactly what it's all going to mean longer term," Gold said.
According to research firm Markets and Markets, 50% of businesses will have adopted a bring-your-own-device (BYOD) strategy by the end of this year.
As more businesses adopt some form of a BYOD policy, employees are using the smartphones and tablets with the simplest user interface. According to Guis, that means iOS.
"Security is not something that was brought up by some of our customers. What I know is that some of them say user interface is critical in bring-your-own-device," Guis said.
Security, perceived and real, is in iOS's corner
As Blackberry left the hardware business and Windows Phone never achieved widespread adoption, enterprises weren't left a lot of choices, said Carolina Milanese, principal analyst at Creative Strategies.
"BYOD consumers just wanted iPhone," she said.
Along with the iPhone's organic popularity, Apple also did a lot to improve the security around its device, so that enterprise IT executives no longer had the ammunition to shoot down its use for business purposes, Milanese added.
"While everyone else was going out of their way to secure devices for enterprises, Apple was thinking about users," she said. "It didn't matter whether that user was enterprise or consumer."
Apple also had the advantage of perception. Real or not, iOS is seen as the more secure platform.
When Google initially launched its Linux-based Android mobile platform in 2007, it suffered from security vulnerabilities.
"And, there were issues around applications that were in the Google Play store that hadn't been tested or vetted for malware or questionable code," Baker said. And, as the most widely adopted consumer platform, Android is also overwhelmingly the biggest target of malware attacks.
Google has addressed Android's security issue through tools, such as its Bouncer malware scanner, which scans apps available in the Google Play store for malware. And as part of the 2012 Android 4.2 "Jelly Bean" OS release, it has had a "Verify Apps" component that also scans all apps from third-parties for any malicious behavior.
Sign up for CIO Asia eNewsletters.