You are here

Resources

DLT provides an abundance of current educational resources about each of our vendor partners and technology sectors. Discover webinars, timely whitepapers, instructional videos, e-books on hot topics in tech, case studies about our products in action, upcoming events and conferences, data sheets, and more.

Filter Resources

Whitepaper
Insider cybersecurity threats are much more prevalent than most of us realize. IBM estimates that 60% of all cyberattacks are perpetrated by those with insider access1; McAfee cites enterprise insiders as a major source of Personally Identifiable Information (PII) sold on the dark web, particularly in the healthcare industry; and at least two-thirds of major corporations reported insider threat incidents in 20163 ranging from file theft and destruction to selling passwords and deliberately sabotaging critical systems. Over 40% of U.S. government agencies report such incidents every year. It's a serious—yet incredibly overlooked—risk.
Added: August 24, 2018
Whitepaper
The security industry is now starting to embrace the notion of cyber resiliency. A resilient system is one where vulnerabilities are assumed, but has defenses designed such that the system can continue to operate safely and reliably. A technique that enables system resiliency is Moving Target Defense.
Added: August 16, 2018
Whitepaper
Security organizations must rethink their vulnerability management programs. They need to monitor complex, dynamic computing environments, and respond in minutes or hours when issues are discovered—not days or weeks.
Added: August 14, 2018
Whitepaper
Data loss, theft, and misuse are more common in government agencies than we care to admit. Most cybersecurity practitioners concede that they can’t prevent every attack they face. Coupled with the increasing value criminals place on our data, wherever it’s stored—social media accounts, commercial databases, and even U.S. Government servers—personally identifiable information (PII) is one of our most valuable assets.
Added: June 1, 2018
Whitepaper
Using Nuix Investigation Software and Specialist Tools to Create a Seamless Workflow
Added: June 1, 2018
Whitepaper
Nuix has advocated for many years that investigators need to evolve beyond traditional forensic tools and workflows, so they can efficiently examine the contents of multiple evidence sources at once.
Added: June 1, 2018
Whitepaper
Government organizations face growing volumes of data and increasing pressure to provide information more transparently. At the same time, they must maintain the privacy of citizens’ data, reduce costs and provide user-friendly digital services and interfaces – letting users access data and services at the touch of a finger.
Added: June 1, 2018
Whitepaper
One of the fastest growing threats in cybersecurity today, ransomware is quickly becoming the favored means for cybercriminals to extract a profit from unsuspecting victims. As ransomware mushrooms with new malware variants and new ways of scamming victims, businesses can no longer afford to discount it as a consumer-only problem.
Added: March 23, 2018
Whitepaper
The radical shift in the scale and economics of cybercrime calls for an equally radical change in how IT protects user systems. Whether it is from phishing attempts, drive-by-downloads, or malware-free intrusion techniques, endpoints are usually at the spear tip of assaults on enterprise networks.
Added: March 23, 2018
Whitepaper
This EMA white paper discusses the top findings of this study. It provides a snapshot of the key challenges and "must haves" associated with automating the management, performance, and availability of complex, modern applications, as voiced by the IT professionals themselves.
Added: October 18, 2017
Whitepaper
Learn the essentials of APM and build your case for adopting an APM solution in your enterprise
Added: October 18, 2017
Whitepaper
The rise of notification technology has coincided with an increase in citizen demands for transparent communications from their leaders. Residents are expecting immediate and accurate information about the events and issues that affect their community. As a result, mass notification systems have gained a significant foothold in local governments. It has now become the norm for local officials to reach out to citizens via phone, email, text – even social media – at a moment’s notice. With this new emphasis on transparent communications, local governments must carefully assess their methods for protecting increasing volumes of citizen information. What are the ramifications of this data falling into the hands of unauthorized parties? And how can government leaders ensure this personal information is protected? The risks and challenges cannot be underestimated. 
Added: October 16, 2017
Whitepaper
Recent survey finds that government agencies involved in overseeing the construction of buildings or infrastructure are beginning to realize the importance and value of Building Information Modeling (BIM). Download our whitepaper and webinar to gain insights on the full survey results and FCW report: “BIM Poised for Greater Adoption”. Also listen to Autodesk’s David Fagerman PLS/RPLS and Chuck Mies LEED AP, Assoc. AIA as they discuss the growing case for BIM in government infrastructure and building projects in this on-demand webinar from Federal Computer Week.
Added: September 26, 2017
Whitepaper
Recently launched, the DLT AnalyticsStack is a public sector focused Big Data, Analytics and Data Science 'solution stack' providing agencies with a scalable reference framework that addresses rapidly evolving big data requirements and use cases. Rather than just piecemealing products, the stack’s 'building-block' approach helps agencies quickly architect, procure and deploy enterprise analytics capabilities ranging from big data infrastructure to advanced analytics and data science capabilities. The DLT AnalyticsStack leverages the solution-oriented, ecosystem integration of the stack vendors to help agencies quickly realize the benefits of advanced analytics capabilities.
Added: September 5, 2017
Whitepaper
Today more than ever, there is a need to protect your IoT devices from unknown vulnerabilities. The Gartner IoT Market guide provides insightful recommendations security professionals should take when considering an IoT security vendor.
Added: April 7, 2017

Pages