Webinar
Experts from DLT, AWS and Evident.io exchanged perspectives on what NIST 800-53 compliance means for government agencies and private organizations alike.
Added: April 27, 2017
Webinar
Join DLT for a discussion of going to the cloud and what you can do to assess the readiness of your own technology, staff and clients for the move.
Added: April 21, 2017
Webinar
Download this on-demand webinar to learn how implementing Red Hat's Infrastructure as a Service, CloudForms, helps your organization support the 3 C's of DevOps by: gaining more control, reducing costs, providing technology choices.
Added: July 11, 2016
Webinar
Download this on-demand webinar to learn how implementing Red Hat’s Platform as a Service, OpenShift, helps your organization support the 3 C’s of DevOps: more control, reduces costs, and provides technology choices.
Added: May 09, 2016
Webinar
How can you help facilitate communication and collaboration between your development and IT operations teams? The answer is DevOps.Download this on-demand webinar today to learn how implementing DevOps solutions will help your organization: control your environment, reduce costs, and increase choice.
Added: April 05, 2016
Webinar
To ensure a smooth transition to the cloud, agencies need to deploy in-depth cyber strategies that address potential vulnerabilities and can be applied to cloud implementations across the board. In this webcast, Dr. Michaela Iorga, Senior Security Technical Lead for Cloud Computing at the National Institute of Standards and Technology (NIST), discusses a comprehensive approach to ensuring cloud security based on NIST’s Risk Management Framework.
Added: December 15, 2015
Webinar
Learn SIEM best practices to detect threats effectively, reduce false positives and speed incident investigations.
Added: September 30, 2015
Webinar
Securing your network from threats is a constantly evolving challenge, especially for federal government agencies with much valuable data to protect, and where IT security resources are often limited. AlienVault has helped many government organizations get complete security visbility for effective threat detection and response, without breaking the bank. Join us for a live demo to see how AlienVault USM addresses key IT security needs.
Added: September 30, 2015
Webinar
Securing your network from threats is a constantly evolving challenge, especially for federal government agencies with much valuable data to protect, and where IT security resources are often limited. AlienVault has helped many government organizations get complete security visibility for effective threat detection and response, without breaking the bank. See how AlienVault USM addresses these key IT security needs, such as discovering all IP-enabled assets, identifying vulnerabilities like insecure configurations and unpatched software, and more. 
Added: July 22, 2015
Webinar
We invite you to enjoy our 45-minute webinar that will focus on 5 major challenges faced in a SLED environment. Loop1 Systems and DLT Solutions are teaming up to bring current SolarWinds clients a series of webinars that will help you better manage your deployment and optimize its performance.
Added: June 05, 2015
Webinar
In this 30 minute session, speaker James Bish, Solutions Consultant covers vital information about the Autodesk higher education licensing update and how this directly impacts facility management users. 
Added: May 04, 2015
Webinar
Visibility across your network – in real-time - is a critical necessity for combating today’s increasing cyber attacks and security breaches. Integrating Symantec and ForeScout empowers agencies to detect, prioritize and remediating risk much more effectively and efficiently.  Over 25,500 data incidents at federal agencies occurred in 2013, according to the Government Accountability Office. Don’t let your agency make the top breaches in 2015 list! Attend this webinar and hear from two security leaders – Symantec and ForeScout Technologies, Inc. about: Security threats affecting government agenciesConsequences of a ‘do nothing’ approachSolutions to monitor and mitigate cyber attacks
Added: April 07, 2015
Webinar
How do you figure out when someone was actually logged onto their PC? The data is there in the security log, but it’s so much harder than you’d think.
Added: March 24, 2015
Webinar
Gain expert guidance to improve data management when you watch this educational session on demand. You’ll discover a simple and proven approach to data replication and integration that will empower you to provide fresh reliable data.
Added: March 24, 2015
Webinar
Red Hat Academic Offerings ensure your educational institution gets more IT for your money, and Red Hat Academic Subscriptions allow you to run the solutions you need and enjoy, free upgrades, fixes, enhancements, maintenance, and more—all at a fixed price for a designated term.
Added: December 23, 2014