Feeds

Their smartphones are on your network

So deal with them: we show you how

  • alert
  • submit to reddit

Intelligent flash storage arrays

Regcast Trying to keep smartphones off your network? Forget it. They're here.

Trying to avoid having to manage consumer mobile devices? You're wasting your time. Better to accept the inevitable - you're going to have to do it.

At 3pm on 18 October 2010 latest Regcast deals head-on with a problem that every sysadmin is going to have this year: managing those iPhones, iPads, Blackberrys and 'Droids, whether you supplied them or not. It is not a question of whether you let users access their data, it's about how you find out who's connected, how you keep the data secure, how you stop it from getting mixed up with personal data - and how you make sure it's deleted when they leave.

Joining the Reg's Tim Phillips on our Regcast are Andrew Buss from Freeform Dynamics, who will be sharing the latest research showing how quickly consumer mobile devices are being adopted on the network, and Ahmed Datoo from Zenprise, who will share practical lessons from a company that provides tools to help you solve these problems.

Make smartphones a blessing, not a curse. Register here to join us. It's urgent. ®

Internet Security Threat Report 2014

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.