Orb Data

Orb Data's Blog Site

Bring Your Own Device

Migrating from Blackberry to iOS or Android

With the recent spate of bad news about Blackberry and the prediction from IDC that by 2018 their market share will fall to a mere 0.3% it is unsurprising that several companies are reviewing their phone purchasing policies. The big worry for businesses is security and how they are able to secure Android and iPhones […]

, , , , , , , , ,

Mobile Device Containerisation, IEM and Enterproid Divide [ Part 2 of 2 ]

This is Part 2 of the blog on Mobile Device Containerisation, IBM Endpoint Manager and Enterproid Divide. Actually to be correct this should just be Divide as since Part 1 of this blog  was published, Enterproid Divide has been rebranded simply as Divide on the back of fresh funding led by Google Ventures. Divide as […]

, , , , , , , ,

Writing a Bring Your Own Device (BYOD) Policy

One of the most important aspects of any BYOD project is writing the policy document.This blog offers a BYOD policy template to get you started and provides some simple pointers to ensure your policy document fits your needs. Download the free Orb Data BYOD Policy Template   A BYOD policy affects more than just the […]

, , , ,

Writing a business case for Bring Your Own Device (BYOD) projects

In a recent article on BYOD Deloitte said A successful BYOD initiative turns risk into a programme of business enablement. This may be the aim but in reality most BYOD schemes start out of necessity rather than because they are seeking business value. However like most IT initiatives a business case should proceed the official […]

, ,

What are the tax implications of a Bring Your Own Device (BYOD) scheme?

Bring Your own Device (BYOD) schemes are all the same? Right? Well no not really. There are essentially 2 different types of scheme. The first type is where an organisation lets their employees or students bring their laptops or (more likely) mobile devices to work or college and allows them to attach to the corporate […]

, ,

Running a successful Bring Your Own Device (BYOD) scheme

IT security departments have recently been doing pretty good impressions of King Canute trying to hold back the waves of personal devices that are being brought into office environments. Whether you have an official Bring Your Own Device (BYOD) initiative or not employees are bringing their iPads, iPhones, Android devices and even laptops to work […]

, , , ,