Orb Data

Orb Data's Blog Site

IBM Endpoint Manager

Migrating from Blackberry to iOS or Android

With the recent spate of bad news about Blackberry and the prediction from IDC that by 2018 their market share will fall to a mere 0.3% it is unsurprising that several companies are reviewing their phone purchasing policies. The big worry for businesses is security and how they are able to secure Android and iPhones […]

, , , , , , , , ,

AIX Security Configuration Audit – Remediate Security Failures

Following on from my previous blog on how to quickly perform a AIX security configuration audit, I thought I would take a look at how to remediate some of the security failures that the audit detected. The remediation will be done using the IBM Endpoint Manager Security Configuration Module. So if we use the same […]

, , , ,

AIX Security Configuration Audit – “I need a compliance report ASAP!”

How often does your IT Security team ask you to run a “quick” security compliance audit on your AIX server infrastructure? If you are going to do this manually for a significant number of servers this would require a significant amount of manpower and a considerable amount of time to complete. Wouldn’t it be nice […]

, , , ,

Mobile Device Containerisation, IEM and Enterproid Divide [ Part 2 of 2 ]

This is Part 2 of the blog on Mobile Device Containerisation, IBM Endpoint Manager and Enterproid Divide. Actually to be correct this should just be Divide as since Part 1 of this blog  was published, Enterproid Divide has been rebranded simply as Divide on the back of fresh funding led by Google Ventures. Divide as […]

, , , , , , , ,

Mobile Device Containerisation, IEM and Enterproid Divide [ Part 1 of 2 ]

This is the first part of a two part article on IBM Endpoint Manager and Enterproid Divide. It is assumed that the reader is familiar with IBM Endpoint Manager or as it was previously known BigFix. Since IBM acquired BigFix there have been numerous enhancements and improvements including the introduction of Mobile Device Management. IBM […]

, , , , ,

IBM Endpoint Manager Android Mobile Client Installation

To install the IBM Endpoint Manager mobile client on your Android, use the following steps: 1. Click on the ‘Play Store’ icon on your phone. 2. From within the ‘Play Store’ search for “IBM Endpoint” and “IBM Mobile Client” will be listed. 3. Once you have found this – click the ‘Install’ button and click […]

, , , ,

IBM Endpoint Manager iOS Mobile Client Installation

To install the mobile client on your iPhone, use the following steps: 1. Click on the App Store icon on your phone. 2. From within the App Store search for “IBM Endpoint”. 3. Once you have found this – click the “Free” button, enter your iTunes password and install. After the application is installed it […]

, , , ,

Setting a Global HTTP Proxy on iOS using IBM Endpoint Manager for Mobile Devices

I have recently had a requirement to set up a global HTTP proxy on corporate iPhone and iPad devices. In order to do this the iOS devices needed to be set up in “Supervised Mode” before the configuration profiles are remotely installed using IBM Endpoint Manager for Mobile Devices.  The iOS devices can be set […]

, , ,

Custom Monitoring with IBM Tivoli Monitoring Agent Builder

A frequent element of my ITM orientated customer engagements is a bespoke monitoring or integration requirement, typically for an in-house developed application or 3rd-party tool.  Historically that would have meant cranking out the Universal Agent and the rather daunting task of constructing one or more meta files.  Fortunately the ITM Agent Builder has all but […]

, , , ,

Mobile Device Management iOS 6 profiles “Not Verified”

There is a difference between the way iOS 5 and iOS 6 handle verified SSL certificates. I have just been installing a cloud based IBM Endpoint Manager solution that included Mobile Device Management for iPhones. The iOS management extender was installed with a verified signed SSL certificates. During testing I logged in an iPhone running […]

,

Previous Posts