Solution Brief

D2iQ delivers a unique portfolio of military-grade technology, professional services, training, and support to help your organization be successful on Day 2 starting on day one.

Added:
Podcast

Interested to learn more about DLT’s Secure Software Factory (SSF)? This podcast episode lays the foundation on the history of the SSF (why we built it), considerations DLT took when building the framework, our approach to software/application development, why the SSF is important for the Public Sector, it’s relevancy to the channel (VARs, ISVs, and Sis), and the long term strategy behind the SSF.

Added:
Data Sheet

Getting your IT solutions into the hands of the state and local governments, as well has higher education institutions (SLED) that you are targeting, starts with understanding how those organizations plan to spend their money. This combined infographic from DLT leverages market intelligence and budgetary insights to provide a comprehensive data-driven summary of SLED spending so you can identify and maximize your opportunities.

Added:
Solution Brief

SteelCloud has been automating and remediating STIG/CIS policy compliance for over a decade. We knew there had to be a way to make the process easier, reducing the time it takes to harden systems for mandatory RMF compliance - thus freeing up critical technical resources.

Added:
Data Sheet

ConfigOS is SteelCloud’s automated security policy remediation solution. This easy to implement software product is designed to simplify the process of achieving, maintaining, and continuously delivering a defect-free, policy-compliant environment.

Added:
Data Sheet

Dramatically reduce the time you spend on RMF, NIST and STIG remediation.

Added:
Whitepaper

Protecting systems and data requires massive defensive vigilance and action on the part of CISOs, CTOs, CIOs and the personnel that work for them at multiple points in the value chain of serving up information systems services to a needy customer base.

Added:
Solution Brief

Part of Flashpoint’s Global Intelligence Team, the Physical Security & Counterterrorism Team is dedicated to empowering decision makers with the intelligence and raw data needed to protect an organization’s people, infrastructure, and other assets.

Added:
QuickLook

Flashpoint collects and analyzes threat data from a diverse set of sources to deliver critical intelligence.

Added:
Solution Brief

Flashpoint informs decision makers on emerging trends that affect policy and threats to Federal programs. Our unique position to glean information from the DDW allows us to incorporate highly differentiated and signal-rich, unclassified data into our analysis, as well as provide access to primary sources.

Added:
Case Study

Flashpoint broadens the scope of cyber intelligence beyond threat detection to areas like physical security, providing the relevant context to business units not traditionally afforded the benefits of intelligence derived from illicit communities.

Added:
Solution Brief

Flashpoint Professional Services offerings enable intelligence and investigations teams to support further analysis, and produce intelligence in support of their mission. Flashpoint’s services enable teams to augment their current operations, plan and build programs that map to specific intelligence requirements, and train teams to build the necessary skills to perform the duties to support their mission.

Added:
Whitepaper

This paper intends to examine the information security risks innate to the public sector IT supply chain for software and hardware, and their effect on the integrity and availability of federal IT systems and data. It will also enumerate the various standards and impending bills governing the security of the public-sector supply chain.

Added:
Solution Brief

Flashpoint offerings align to every step in the intelligence cycle; by monitoring and identifying publicly available closed source and vetted communities of interest in support of intelligence needs and collection requirements. Flashpoint’s unique access to illicit online communities, enables intelligence teams to perform further analysis, and produce intelligence in support of their mission.

Added:
Solution Brief

Actionable intelligence on adversaries operating within illicit online communities is indispensable in support of many missions. Access to information on terrorist activity and recruitment, the spread of jihadi propaganda, cyberattacks, fraudulent activity, malicious insiders, supply-chain threats, and more is difficult and, in some instances, could be dangerous to obtain.

Added: