Feeds

Smartphones are on your network

We show you how to cope with them

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Trying to avoid having to manage consumer mobile devices? You're wasting your time. Better to accept the inevitable - you're going to have to do it.

Today at 3pm, our latest Regcast deals head-on with a problem that every sysadmin is going to have this year: managing those iPhones, iPads, Blackberrys and 'Droids, whether you supplied them or not.

Join us here.

It is not a question of whether you let users access their data, it's about how you find out who's connected, how you keep the data secure, how you stop it from getting mixed up with personal data - and how you make sure it's deleted when they leave.

Joining El Reg's Tim Phillips on our Regcast are Andrew Buss from Freeform Dynamics, who will be sharing the latest research showing how quickly consumer mobile devices are being adopted on the network, and Ahmed Datoo from Zenprise, who will share practical lessons from a company that provides tools to help you solve these problems.

Register here to join us. It's urgent. ®

Internet Security Threat Report 2014

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.