Feeds

So many devices, so little policy

So what are you waiting for?

  • alert
  • submit to reddit

The essential guide to IT transformation

Live event Every one of your users has a computer at home, maybe a laptop, definitely a phone, and likes to log in from someone else's computer from time to time. They're carrying your data around, but often not your security policy.

You know how hard it is to match policy form device to device, location to location. If only it were possible to create a single policy and apply it to multiple devices - but that is what Blue coat thinks it can do. And with the correct policy in place, it can actively monitor your security levels, so that your most secure day is not the day after you created your excellent new policy, just before the users break it. Sasi Murthy is flying in from Blue Coat in the US just to see the Reg's famous studio. While she's there, we'll make her talk live about this, and answer your questions.

It sounds too good to be true. That's why we have recruited an expert to tell us about the problems that Reg readers have with one policy, many devices: Andy "Too Good" Buss, from Freeform Dynamics.

Join us on September 20 at 11:00 BST for this free broadcast, by Registering here.

5 things you didn’t know about cloud backup

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.