You are here

Resources

DLT provides an abundance of current educational resources about each of our vendor partners and technology sectors. Discover webinars, timely whitepapers, instructional videos, e-books on hot topics in tech, case studies about our products in action, upcoming events and conferences, data sheets, and more.

Filter Resources

eBook
As the amount of data increases each day, government agencies often have too much information to manage. From spreadsheets, relational databases, emails, images and much more, this data is filed away with the promise that it will be stored and managed in an organized, secure environment for later retrieval.  Download the free e-book Veritas 360 Data Management for Govies to learn tips and tricks on data management.
Added: July 28, 2017
Webinar
Data insight is increasingly key to helping government continually make more informed decisions,improve agency efficiency and accountability while developing critical mission capabilities and citizen services. This webinar walks you through examples of data integration, governance and business analytics. Together DLT, Informatica and Tableau show you how to leverage a variety of data types to help you achieve your agency mission objectives.  
Added: July 24, 2017
eBook
DLT's cyber thought leadership partner, Institute for Critical Infrastructure Technology, recently released publication entitled “Next Generation Defenses for a Hyper Evolving Threat Landscape: An Anthology of ICIT Fellow Essays Volume I,” is a compilation of essays written by ICIT Fellows and Contributors including DLT Chief Cyber Technologist, Don Maclean, which offer a wide-ranging look at some of the most impactful cybersecurity defenses that should be leveraged by public and private sector organizations.
Added: June 16, 2017
eBook
Through industry insights, tips, best practices, agency use cases and an interview with DLT's Solution Sales Professionals, make DevOps a reality with this new guide.
Added: June 13, 2017
Webinar
Join a host of familiar Autodesk faces as they walkthrough the phases of a challenging roadway project in a 4 part series. From gathering data about the existing situation, producing a project concept, moving that concept to the detailed design phase, conducting additional analysis, and finally creating compelling visualizations to share with project stakeholders, including low cost virtual reality.
Added: May 31, 2017
Webinar
On-demand webinar featuring Jamie Jones, Federal Solutions Engineer, GitHub and David Larrimore, CTO U.S. DHS, Immigration and Customs Enforcement to learn how you can securely build and share code that is compliant with the Federal Source Code Policy. GitHub lets developers at agencies collaborate to ship better code, securely on your own servers or AWS GovCloud and Azure Government. 
Added: May 4, 2017
Webinar
Experts from DLT, AWS and Evident.io exchanged perspectives on what NIST 800-53 compliance means for government agencies and private organizations alike.
Added: April 27, 2017
Webinar
Join DLT for a discussion of going to the cloud and what you can do to assess the readiness of your own technology, staff and clients for the move.
Added: April 21, 2017
Whitepaper
Today more than ever, there is a need to protect your IoT devices from unknown vulnerabilities. The Gartner IoT Market guide provides insightful recommendations security professionals should take when considering an IoT security vendor.
Added: April 7, 2017
Whitepaper
Without a cutting-edge IoT security solution—one that begins with agentlessvisibility—IoT devices are invisible (and potentially unwanted) guests on yournetwork. Video surveillance systems, projectors, smart copiers and printers,industrial controls and HVAC systems are common in most businesses today.
Added: December 23, 2016
Data Sheet
Addressing NIST Risk Management Framework Controls with ForeScout CounterACT®
Added: December 23, 2016
Whitepaper
Once a federal system has been categorized as High, Medium or Low withConfidentiality, Integrity and Availability, the next major milestone in most RiskManagement Framework (RMF) processes is to identify all the security controlsthat will be required to support compliancy for the architecture.
Added: December 23, 2016
Whitepaper
ForeScout IoT EnterpriseRisk Report explorescommon IoT devicesthat make organizationsvulnerable to dangerous –if not disastrous – attacks.
Added: December 23, 2016
Whitepaper
The Intel® Security Integration Module enables ForeScout CounterACT™ to integratebi-directionally with McAfee® ePolicy Orchestrator® (ePO™) and McAfee® ThreatIntelligence Exchange. This enables contextual sharing of endpoint and threat intelligencebetween CounterACT and Intel Security products, and automation of response workflowsfor risk mitigation and threat defense
Added: December 23, 2016
Whitepaper
ForeScout CounterACT™ now provides bi-directional information sharing withMcAfee® Threat Intelligence Exchange over the McAfee Data Exchange Layer.With this integration, customers can leverage system-wide threat intelligencefrom all McAfee security components, and protect their networks fromunmanaged and personally owned (BYOD) Windows devices.
Added: December 23, 2016

Pages