Filter Resources

eBook
DLT's cyber thought leadership partner, Institute for Critical Infrastructure Technology, recently released publication entitled “Next Generation Defenses for a Hyper Evolving Threat Landscape: An Anthology of ICIT Fellow Essays Volume I,” is a compilation of essays written by ICIT Fellows and Contributors including DLT Chief Cyber Technologist, Don Maclean, which offer a wide-ranging look at some of the most impactful cybersecurity defenses that should be leveraged by public and private sector organizations.
eBook
Through industry insights, tips, best practices, agency use cases and an interview with DLT's Solution Sales Professionals, make DevOps a reality with this new guide.
Webinar
Join a host of familiar Autodesk faces as they walkthrough the phases of a challenging roadway project in a 4 part series. From gathering data about the existing situation, producing a project concept, moving that concept to the detailed design phase, conducting additional analysis, and finally creating compelling visualizations to share with project stakeholders, including low cost virtual reality.
Webinar
On-demand webinar featuring Jamie Jones, Federal Solutions Engineer, GitHub and David Larrimore, CTO U.S. DHS, Immigration and Customs Enforcement to learn how you can securely build and share code that is compliant with the Federal Source Code Policy. GitHub lets developers at agencies collaborate to ship better code, securely on your own servers or AWS GovCloud and Azure Government. 
Webinar
Oracle's Data Integration products deliver pervasive and continuous access to timely and trusted data across heterogeneous systems. Its comprehensive capabilities include real-time and bulk data movement, transformation, bi-directional replication, metadata management, data services, and data quality for customer and product domains. 
Webinar
Experts from DLT, AWS and Evident.io exchanged perspectives on what NIST 800-53 compliance means for government agencies and private organizations alike.
Webinar
Join DLT for a discussion of going to the cloud and what you can do to assess the readiness of your own technology, staff and clients for the move.
Other
PPI Group 2017 May through August training catalog. PPI hosts courses to meet all your Autodesk needs from InfraWorks and AutoCAD to Revit, taught at all skill levels.
Whitepaper
Training plays a critical role in maximizing job performance. Advanced Solutions’ CAD Club memberships provide Autodesk software users with a convenient and economical path to becoming highly skilled software users.
Whitepaper
Today more than ever, there is a need to protect your IoT devices from unknown vulnerabilities. The Gartner IoT Market guide provides insightful recommendations security professionals should take when considering an IoT security vendor.
Data Sheet
Protecting sensitive and mission critical data from internal and external threats is paramount at all government agencies. DLT Solutions provides the most innovative cloud security, governance, risk management and compliance technologies to the public sector through our partnership with Evident.io. The Evident Security Platform (ESP) provides government agencies with continuous visibility into the security posture of their systems, guided response and remediation, and the ability to generate documentation to show compliance.
Data Sheet
Protecting sensitive and mission critical data from internal and external threats is paramount at all government agencies. DLT Solutions provides the most innovative cloud security, governance, risk management and compliance technologies to the public sector through our partnership with Evident.io. The Evident Security Platform (ESP) provides government agencies with continuous visibility into the security posture of their systems, guided response and remediation, and the ability to generate documentation to show compliance.
Data Sheet
Addressing NIST Risk Management Framework Controls with ForeScout CounterACT®
Whitepaper
Once a federal system has been categorized as High, Medium or Low withConfidentiality, Integrity and Availability, the next major milestone in most RiskManagement Framework (RMF) processes is to identify all the security controlsthat will be required to support compliancy for the architecture.
Whitepaper
Without a cutting-edge IoT security solution—one that begins with agentlessvisibility—IoT devices are invisible (and potentially unwanted) guests on yournetwork. Video surveillance systems, projectors, smart copiers and printers,industrial controls and HVAC systems are common in most businesses today.

Pages