More from The Register
HP Data Protector and EMC Data Domain Boost integration
As the rate of technology adoption continues, it deepens our dependency on digital data, which in turn drives unabated data growth.
Cyber Risk Report 2015
A broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the IoT.
Why your vendor doesn't want you to adopt web-scale IT
Analysing the impact Web-Scale IT will have on the supply chain, and the resulting challenges for incumbent vendors.
Putting advanced network security to work
Highlighting specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application.