Filter Resources

Data Sheet
Companies of all sizes are adopting cloud-based services, such as Microsoft Office 365, to give their employees greater flexibility and easier access to core business applications. Enabling such flexibility without considering the risks exposes gaps in traditional data security solutions. These gaps include a lack of visibility and control of sensitive data once it leaves the perimeter, inconsistent data loss detection across multiple environments (endpoints, networks, and the cloud), and the absence of centralized management for incident workflows and reporting, regardless where the violations occur. Many organizations have added or are considering adding a separate security solution to cover their cloud environment, but in doing so, these solutions become siloed and create additional maintenance overhead.
Publication
Beyond cost savings, a key driver of cloud adoption is the innovation that the cloud enables. The cloud can accelerate business. As a result, the cloud is increasingly the place where data—an organization’s most valuable asset—is stored and shared. Securing that information is a shared responsibility between a company and their cloud providers.
Data Sheet
AWS takes care of security ‘of’ the cloud while AWS customers are responsible for security ‘in’ the cloud. This document guides customers on how to ensure the highest level of protection for their AWS infrastructure and the sensitive data stored in AWS with a 51-point security configuration checklist to ensure that AWS services are configured with the highest level of security while still allowing employees to fulfill their job responsibilities.
Publication
Cloud services bring a momentous opportunity to accelerate business through their ability to quickly scale, allow us to be agile with our resources, and provide new opportunities for collaboration. As we all take advantage of the cloud, there’s one thing we can’t forget — our data. When using software-as-a-service (SaaS) we are responsible for the security of our data, and need to ensure it is accessed appropriately. When using infrastructure-asa-service (IaaS) or platform-as-a-service (PaaS), we are additionally responsible for the security of our workloads, and need to ensure the underlying application and infrastructure components are not misconfigured.
Data Sheet
Forward-thinking organizations like yours are moving to cloud platforms like Amazon Web Services® (AWS) to improve agility and reduce total cost of ownership. But upgrading the McAfee® ePolicy Orchestrator® (McAfee ePO™) management console to the cloud can often be delayed due to lack of time and skilled resources, especially if you are architecting and deploying it on AWS for the first time. By using industry best practices and proven methodologies, the McAfee cloud enablement services for McAfee ePO helps expedite your transition to the cloud and enjoy peace of mind, knowing that your deployment maximizes your security effectiveness and efficiency. Together, we can help your organization take full advantage of your AWS cloud platform.
Case Study
Hidden Lake Technology has contracted with DLT Solutions to provide professional services in support of DLT’s Amazon Web Services customer base. These engineering services will support the Amazon Web Services platform and related customer challenges including consulting, migrations, security and cloud optimization. This strategic partnership brings a top services delivery team into the DLT Partner Network, expanding capabilities and maximizing value for customers.
Case Study
This university is no small operation. With well over 30,000 undergraduate and graduate students from more than 130 countries, nearly 10,000 faculty and staff, 17 schools and colleges, and 250 fields of study, their three campuses are always humming, always in high gear. Cloud computing offers the university an opportunity to achieve significant improvements in functionality at the potential for reduced costs, especially as related to future capital cost avoidance.
Case Study
Fu Associates is a leading developer of information management and analysis systems. They pride themselves on providing quality services ranging from the design, development, and implementation of complex information systems to business process reengineering, policy analysis, and strategic planning. Their clients include public and private sector organizations in the elds of health care, aviation, labor, education, environment, agriculture, and defense.
Case Study
This federal agency utilizes a mature hybrid cloud architecture to support its efforts as an innovative and independent agency. Many of these efforts focus on partnering internationally to promote economic growth, reduce poverty, and strengthen institutions. This requires a flexible and consistent development stream in their applications to deliver on its mission.
Case Study
A public power utility company, owned by the people of a large city in Massachusetts, provides reliable services at economical rates through teamwork, technology and innovation. The Board of Electric Commissioners and the employees are committed to safe operations, to excellent customer service and to the community they serve. Like most power companies, this Massachusetts based company uses a geographic information software (GIS) application for planning, building, monitoring, and managing their transmission networks.
Case Study
In this case study, a Federal Agency agency worked closely with Nuix to develop a solution that fit its unique needs.
Data Sheet
Cases involving digital evidence can vary greatly in size and scope. The tools and techniques used for a relatively simple investigation will differ greatly from the resources employed to tackle a case featuring massive data volumes, a diversity of evidence and a large number of digital exhibits.
Data Sheet
Nuix builds confidence into your eDiscovery process from the outset. The patented Nuix Engine processes all relevant evidence with unmatched speed and thoroughness. Our web-based workflow automation, collaboration, and analytics tools let you make early case assessments with all the facts at your fingertips.
Data Sheet
Visibility into the security of your environment is crucial to your organization's success. When you can find the critical data that you need, and at the right time, you can glean a wealth of information to inform your next steps.
Whitepaper
Using Nuix Investigation Software and Specialist Tools to Create a Seamless Workflow

Pages