Feeds

So many devices, so little policy

So what are you waiting for?

  • alert
  • submit to reddit

Build a Business Case: Developing Custom Apps

Live today Every one of your users has a computer at home, maybe a laptop, definitely a phone, and likes to log in from someone else's computer from time to time. They're carrying your data around, but often not your security policy.

You know how hard it is to match policy form device to device, location to location. If only it were possible to create a single policy and apply it to multiple devices - but that is what Blue coat thinks it can do. And with the correct policy in place, it can actively monitor your security levels, so that your most secure day is not the day after you created your excellent new policy, just before the users break it. Sasi Murthy is flying in from Blue Coat in the US just to see the Reg's famous studio. While she's there, we'll make her talk live about this, and answer your questions.

It sounds too good to be true. That's why we have recruited an expert to tell us about the problems that Reg readers have with one policy, many devices: Andy "Too Good" Buss, from Freeform Dynamics.

Join us today at 11:00 BST for this live and free broadcast, by Registering here.

Eight steps to building an HP BladeSystem

More from The Register

next story
Doctor Who season eight scripts leak online
BBC asks fans to EXTERMINATE copies before they materialise
Google went behind our backs and really HURT US, squeal upset porn kingpins
'As the pornographer here, the moral turpitude should be MINE'
UK's emergency data slurp: IT giants panicked over 'legal uncertainty'
PM says rushed-through DRIP law will 'plug holes' in existing legislation
Report: UK.gov wants to legislate on comms data BEFORE next election
Ministerial alarm sets in over EU court's data retention ruling
CHIPS DOWN. IBM spends $3bn on its FU-TURE-TURE-TURE
Keep your eye on carbon nanotubes, Big Blue tells El Reg
ICO probes BBC after secret British army unit's info LEAKED
Panorama in the brown and smelly after losing confidential data
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
The Power of One eBook: Top reasons to choose HP BladeSystem
Only the Power of One delivers leading infrastructure convergence, availability and scalability with federation, and agility through data center automation.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.