Orb Data

Orb Data's Blog Site


Managing Mobile Phone Usage for School Children

Whilst many companies have been concentrating on securing corporate Mobile devices and rushing policies in place for BYOD there is another group of problematic users that has been largely forgotten; school children. According to a new international study three-quarters (73 per cent) of UK 10-year-olds have a personal mobile. There are mixed views from the […]

, , , , ,

Migrating from Blackberry to iOS or Android

With the recent spate of bad news about Blackberry and the prediction from IDC that by 2018 their market share will fall to a mere 0.3% it is unsurprising that several companies are reviewing their phone purchasing policies. The big worry for businesses is security and how they are able to secure Android and iPhones […]

, , , , , , , , ,

Mobile Device Containerisation, IEM and Enterproid Divide [ Part 2 of 2 ]

This is Part 2 of the blog on Mobile Device Containerisation, IBM Endpoint Manager and Enterproid Divide. Actually to be correct this should just be Divide as since Part 1 of this blog  was published, Enterproid Divide has been rebranded simply as Divide on the back of fresh funding led by Google Ventures. Divide as […]

, , , , , , , ,

Mobile Device Containerisation, IEM and Enterproid Divide [ Part 1 of 2 ]

This is the first part of a two part article on IBM Endpoint Manager and Enterproid Divide. It is assumed that the reader is familiar with IBM Endpoint Manager or as it was previously known BigFix. Since IBM acquired BigFix there have been numerous enhancements and improvements including the introduction of Mobile Device Management. IBM […]

, , , , ,

Writing a Bring Your Own Device (BYOD) Policy

One of the most important aspects of any BYOD project is writing the policy document.This blog offers a BYOD policy template to get you started and provides some simple pointers to ensure your policy document fits your needs. Download the free Orb Data BYOD Policy Template   A BYOD policy affects more than just the […]

, , , ,

Writing a business case for Bring Your Own Device (BYOD) projects

In a recent article on BYOD Deloitte said A successful BYOD initiative turns risk into a programme of business enablement. This may be the aim but in reality most BYOD schemes start out of necessity rather than because they are seeking business value. However like most IT initiatives a business case should proceed the official […]

, ,

Mobile Device Management iOS 6 profiles “Not Verified”

There is a difference between the way iOS 5 and iOS 6 handle verified SSL certificates. I have just been installing a cloud based IBM Endpoint Manager solution that included Mobile Device Management for iPhones. The iOS management extender was installed with a verified signed SSL certificates. During testing I logged in an iPhone running […]


What are the tax implications of a Bring Your Own Device (BYOD) scheme?

Bring Your own Device (BYOD) schemes are all the same? Right? Well no not really. There are essentially 2 different types of scheme. The first type is where an organisation lets their employees or students bring their laptops or (more likely) mobile devices to work or college and allows them to attach to the corporate […]

, ,

Running a successful Bring Your Own Device (BYOD) scheme

IT security departments have recently been doing pretty good impressions of King Canute trying to hold back the waves of personal devices that are being brought into office environments. Whether you have an official Bring Your Own Device (BYOD) initiative or not employees are bringing their iPads, iPhones, Android devices and even laptops to work […]

, , , ,