Filter Resources

Data Sheet
Protect your employees and their mobile devices with McAfee® MVISION Mobile, a solution that detects threats and vulnerabilities on Apple iOS or Google Android devices, the networks they’re connected to, and the applications that users have downloaded. On-device detection capabilities provide protection whether the device is online or not. MVISION Mobile uses machine learning capabilities fed by billions of data points from millions of devices to identify current or imminent threats and attacks, including ones that have never been seen before.
Data Sheet
Organizations looking for simpler, more affordable alternatives to full-featured endpoint security platforms (EPP) are embracing native security like Windows Defender. While Defender provides essential base-level protection, it’s still necessary to apply advanced countermeasures like machine learning to mount a complete defense against sophisticated fileless and zero-day malware-based threats. The key to success lies within leveraging, strengthening, and managing the security already built into Windows 10 without introducing the complexity of multiple consoles.
Data Sheet
Your organization needs to respond quickly to threats on any type of device to minimize the damage, and management demands evidence of security effectiveness. The McAfee® ePolicy Orchestrator® (McAfee ePO™) management platform—available on premises and from the cloud (with two models to choose from: SaaS or IaaS) — helps eliminate the time-consuming effort and potential for human error and helps those responsible for managing security respond faster and with higher efficacy.
Other
West 2019 is the premier naval conference and exposition on the West Coast and is celebrating its’ 29th year of bringing military and industry leaders together. Government and industry will have the opportunity to learn and network while exploring and experiencing the latest platforms, leading-edge technologies and state-of-the-art networking capabilities that support the Sea Services’ operations.
Webinar
"Cyber Hygiene"—like so many buzzwords in our industry, this one gets more use than understanding. What exactly is cyber hygiene? Do government agencies keep it up sufficiently? If not, why not? How does cyber hygiene affect an agency's ability to implement advanced security technology? What are the financial, psychological, and technological factors that affect cyber hygiene? This webinar, featuring Don MacLean, Steve Potter, David Henderson, and Paul Parker, explores these topics and more.
DLT is the premier government solutions aggregator dedicated to ensuring the public sector has the cybersecurity solutions it needs. DLT is constantly in tune with emerging cybersecurity technologies that change how we think about securing government information systems. We help government protect high-value assets: data, devices, software, systems, and users.
Data Sheet
What Really Drives Security Procurements and Decisions
Other
The following report, sponsored by Sumo Logic, is based on a global survey of 316 IT security professionals responsible for environments with significant investment in both cloud and on-prem infrastructure. The goal of this survey was to quantify current experiences with adopting traditional security methods in the cloud, with a focus on both organizations and tools.
Case Study
Organizations around the world are adopting, building or shifting resources, applications and workloads to the cloud to take advantage of the inherent competitive, economic and agility gains that can be achieved in this environment. However many of these organizations are finding that their legacy network and security tools are not able to provide them with the scalability and insights they need, to continue tightly managing their security and compliance requirements in the cloud.
Whitepaper
For the past two years, Sumo Logic has produced the first and only industry report that quantitatively defines the state of the Modern App Stack. Working with our customers, we continue to see rapid advances in tools and processes used by various enterprise personas to build, run and secure modern applications. This third annual report extends our analysis to DevSecOps, a new and innovative trend that is rapidly growing amongst our customers.
Case Study
Hidden Lake Technology has contracted with DLT Solutions to provide professional services in support of DLT’s Amazon Web Services customer base. These engineering services will support the Amazon Web Services platform and related customer challenges including consulting, migrations, security and cloud optimization. This strategic partnership brings a top services delivery team into the DLT Partner Network, expanding capabilities and maximizing value for customers.
Other
In this webinar, Morgan Hein, discusses a new Open Source tool, EnVisen, which lets you view the exported symbols and ROP gadget surface area of your binaries in a visually rich and purposeful way from directly within your browser. It can even compare binaries to visualize common attackable surface area and score your Zero-Day vulnerability risk with built in entropy evaluation.
Publication
Tripwire's integrated suite of products build on their core capabilities to deliver critical capabilities for breach detection and remediation, and address nearly every compliance standard—PCI DSS, NIST, FISMA, NERC, HIPAA, ISO/IEC 27002, DISA, SOX, and many others.
Publication
When a high-profile cyberattack grabs the headlines, your first instinct may be to funnel resources into purchasing a shiny new tool to defend your organization. But often, that’s not what’s really needed.
Publication
Tripwire solutions have a history with government agencies, offering an 'ironclad defense,' or foundation for a layered compliance and security strategy.

Pages