Feeds

So many devices, so little policy

So what are you waiting for?

  • alert
  • submit to reddit

Remote control for virtualized desktops

Live today Every one of your users has a computer at home, maybe a laptop, definitely a phone, and likes to log in from someone else's computer from time to time. They're carrying your data around, but often not your security policy.

You know how hard it is to match policy form device to device, location to location. If only it were possible to create a single policy and apply it to multiple devices - but that is what Blue coat thinks it can do. And with the correct policy in place, it can actively monitor your security levels, so that your most secure day is not the day after you created your excellent new policy, just before the users break it. Sasi Murthy is flying in from Blue Coat in the US just to see the Reg's famous studio. While she's there, we'll make her talk live about this, and answer your questions.

It sounds too good to be true. That's why we have recruited an expert to tell us about the problems that Reg readers have with one policy, many devices: Andy "Too Good" Buss, from Freeform Dynamics.

Join us today at 11:00 BST for this live and free broadcast, by Registering here.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?