Orange Business Services

Helping clients save hundreds of thousands of dollars

Published on 31 Jan 2013

IBM Endpoint Manager is easy to use, which helps us keep operational costs low and makes the integration of services much easier.

—Hakim Belhouchi, Security Product Manager, Orange Business Services

Orange Business Services

Computer Services

Deployment country


Orange Business Services is a leading global integrator of communications solutions. The company is a subsidiary of France Telecom Group, one of the world's leading telecommunications operators.

Business need
To create a successful SaaS offering, Orange Business Services needed a unified delivery platform that would reduce service delivery costs and support hundreds of thousands of endpoints.

With IBM Endpoint Manager software, Orange Business Services has a unified platform to help companies control compliance and security of PCs, Macs, servers, virtual machines, and mobile devices.

Orange Business Services helps clients save hundreds of thousands of dollars and grows revenue with efficient endpoint management.


IBM products and services that were used in this case study.

IBM Endpoint Manager for Mobile Devices, IBM Endpoint Manager for Software Use Analysis, IBM Endpoint Manager for Lifecycle Management, IBM Endpoint Manager for Core Protection, IBM Endpoint Manager for Patch Management, IBM Endpoint Manager for Power Management, IBM Endpoint Manager for Security and Compliance


Legal information

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party.

ContactUs Case Studies on your mobile device

Join the Conversation

TwitterGoogle YouTube