Orb Data

Orb Data's Blog Site

MDM

Understanding User Agents in the MaaS360 Secure Browser

I was recently asked by a customer what type of Browser the MaaS360 Secure Browser is built upon or emulates so that the customer’s developers can design their web sites accordingly. To provide this information you must examine the browser’s user agent string (UA) which helps identify which browser is being used, what version, and […]

, , , ,

How do I deploy thousands of iOS devices quickly and securely?

Recently IBM and Apple have announced a number of strategic partnerships, however one of these that has slipped under the radar that we have found very interesting is the integration between IBM’s MobileFirst Protect (formerly MaaS360 by Fiberlink) and Apple’s Device Enrollment Program (DEP). What happens when you get a new iOS device? When receiving […]

, , , , , , , ,

Managing Mobile Phone Usage for School Children

Whilst many companies have been concentrating on securing corporate Mobile devices and rushing policies in place for BYOD there is another group of problematic users that has been largely forgotten; school children. According to a new international study three-quarters (73 per cent) of UK 10-year-olds have a personal mobile. There are mixed views from the […]

, , , , ,

Migrating from Blackberry to iOS or Android

With the recent spate of bad news about Blackberry and the prediction from IDC that by 2018 their market share will fall to a mere 0.3% it is unsurprising that several companies are reviewing their phone purchasing policies. The big worry for businesses is security and how they are able to secure Android and iPhones […]

, , , , , , , , ,

Mobile Device Containerisation, IEM and Enterproid Divide [ Part 2 of 2 ]

This is Part 2 of the blog on Mobile Device Containerisation, IBM Endpoint Manager and Enterproid Divide. Actually to be correct this should just be Divide as since Part 1 of this blog  was published, Enterproid Divide has been rebranded simply as Divide on the back of fresh funding led by Google Ventures. Divide as […]

, , , , , , , ,

Mobile Device Containerisation, IEM and Enterproid Divide [ Part 1 of 2 ]

This is the first part of a two part article on IBM Endpoint Manager and Enterproid Divide. It is assumed that the reader is familiar with IBM Endpoint Manager or as it was previously known BigFix. Since IBM acquired BigFix there have been numerous enhancements and improvements including the introduction of Mobile Device Management. IBM […]

, , , , ,

Setting a Global HTTP Proxy on iOS using IBM Endpoint Manager for Mobile Devices

I have recently had a requirement to set up a global HTTP proxy on corporate iPhone and iPad devices. In order to do this the iOS devices needed to be set up in “Supervised Mode” before the configuration profiles are remotely installed using IBM Endpoint Manager for Mobile Devices.  The iOS devices can be set […]

, , ,

Writing a Bring Your Own Device (BYOD) Policy

One of the most important aspects of any BYOD project is writing the policy document.This blog offers a BYOD policy template to get you started and provides some simple pointers to ensure your policy document fits your needs. Download the free Orb Data BYOD Policy Template   A BYOD policy affects more than just the […]

, , , ,

Running a successful Bring Your Own Device (BYOD) scheme

IT security departments have recently been doing pretty good impressions of King Canute trying to hold back the waves of personal devices that are being brought into office environments. Whether you have an official Bring Your Own Device (BYOD) initiative or not employees are bringing their iPads, iPhones, Android devices and even laptops to work […]

, , , ,