Publication

While the Federal Data Strategy offers a framework for capitalizing on agency data, IT leaders need robust integration tools to "master, not just manage" the data.

Added: June 16, 2020
Data Sheet

ConfigOS is SteelCloud’s automated security policy remediation solution. ConfigOS allows mission-critical software applications to perform reliably, while maintaining compliance with comprehensive security baselines.

Added: June 15, 2020
Solution Brief

​Dataset preparation, including collecting, labeling and reviewing data is a tedious and time-consuming activity. Labeling data is usually the slowest part of deploying AI models. Learn how Clarifai can help your organization increase productivity and modeal accuracy with their AI-powered data labeling solution. 

Added: June 12, 2020
Data Sheet

CrowdStrike’s advisory services provide the best practice frameworks needed to assess and enhance cyber maturity levels across the voting process, leveraging deep cybersecurity expertise and the global threat intel from the CrowdStrike Falcon Platform and Falcon OverWatch threat hunting team.

Added: June 11, 2020
Solution Brief

D2iQ delivers a unique portfolio of military-grade technology, professional services, training, and support to help your organization be successful on Day 2 starting on day one.

Added: June 10, 2020
Podcast

Interested to learn more about DLT’s Secure Software Factory (SSF)? This podcast episode lays the foundation on the history of the SSF (why we built it), considerations DLT took when building the framework, our approach to software/application development, why the SSF is important for the Public Sector, it’s relevancy to the channel (VARs, ISVs, and Sis), and the long term strategy behind the SSF.

Added: June 10, 2020
Data Sheet

Getting your IT solutions into the hands of the state and local governments, as well has higher education institutions (SLED) that you are targeting, starts with understanding how those organizations plan to spend their money. This combined infographic from DLT leverages market intelligence and budgetary insights to provide a comprehensive data-driven summary of SLED spending so you can identify and maximize your opportunities.

Added: June 08, 2020
Solution Brief

SteelCloud has been automating and remediating STIG/CIS policy compliance for over a decade. We knew there had to be a way to make the process easier, reducing the time it takes to harden systems for mandatory RMF compliance - thus freeing up critical technical resources.

Added: June 08, 2020
Data Sheet

ConfigOS is SteelCloud’s automated security policy remediation solution. This easy to implement software product is designed to simplify the process of achieving, maintaining, and continuously delivering a defect-free, policy-compliant environment.

Added: June 08, 2020
Data Sheet

Dramatically reduce the time you spend on RMF, NIST and STIG remediation.

Added: June 08, 2020
Whitepaper

Protecting systems and data requires massive defensive vigilance and action on the part of CISOs, CTOs, CIOs and the personnel that work for them at multiple points in the value chain of serving up information systems services to a needy customer base.

Added: June 08, 2020
Solution Brief

Part of Flashpoint’s Global Intelligence Team, the Physical Security & Counterterrorism Team is dedicated to empowering decision makers with the intelligence and raw data needed to protect an organization’s people, infrastructure, and other assets.

Added: June 03, 2020
QuickLook

Flashpoint collects and analyzes threat data from a diverse set of sources to deliver critical intelligence.

Added: June 03, 2020
Solution Brief

Flashpoint informs decision makers on emerging trends that affect policy and threats to Federal programs. Our unique position to glean information from the DDW allows us to incorporate highly differentiated and signal-rich, unclassified data into our analysis, as well as provide access to primary sources.

Added: June 03, 2020
Case Study

Flashpoint broadens the scope of cyber intelligence beyond threat detection to areas like physical security, providing the relevant context to business units not traditionally afforded the benefits of intelligence derived from illicit communities.

Added: June 03, 2020