Case Study
Small team efficiently manages hybrid physical, virtual, and cloud infrastructure. By adding McAfee Cloud Workload Security to its existing McAfee®-integrated security architecture, this company can now reap the benefits of leveraging the public cloud. And, thanks to McAfee® ePolicy Orchestrator® (McAfee ePO™) software, deploying and managing cloud security is easy and adds minimal additional overhead.
Added: December 11, 2018
Webinar
Government agencies are embracing Cloud technologies to modernize their infrastructure to deliver digital services at scale, more rapidly and more cost effectively.
Added: December 06, 2018
Video
Added: December 06, 2018
Video
The U.S. government just issued a request for comment on its plan for cloud computing adoption across the federal government. The government says it’s time to move from Cloud First to Cloud Smart.
Added: December 05, 2018
Webinar
"Cyber Hygiene"—like so many buzzwords in our industry, this one gets more use than understanding. What exactly is cyber hygiene? Do government agencies keep it up sufficiently? If not, why not? How does cyber hygiene affect an agency's ability to implement advanced security technology? What are the financial, psychological, and technological factors that affect cyber hygiene? This webinar, featuring Don MacLean, Steve Potter, David Henderson, and Paul Parker, explores these topics and more.
Added: December 04, 2018
DLT Market Intelligence

One of the biggest concerns is not the threats of today, but the threats of tomorrow. DHS is seeing emerging threats outpacing our businesses which is unacceptable.

Added: November 14, 2018
DLT Market Intelligence
One of the biggest concerns is not the threats of today, but the threats of tomorrow. DHS is seeing emerging threats outpacing our businesses which is unacceptable.
Added: November 14, 2018
Whitepaper
For the past two years, Sumo Logic has produced the first and only industry report that quantitatively defines the state of the Modern App Stack. Working with our customers, we continue to see rapid advances in tools and processes used by various enterprise personas to build, run and secure modern applications. This third annual report extends our analysis to DevSecOps, a new and innovative trend that is rapidly growing amongst our customers.
Added: October 12, 2018
Case Study
Organizations around the world are adopting, building or shifting resources, applications and workloads to the cloud to take advantage of the inherent competitive, economic and agility gains that can be achieved in this environment. However many of these organizations are finding that their legacy network and security tools are not able to provide them with the scalability and insights they need, to continue tightly managing their security and compliance requirements in the cloud.
Added: October 12, 2018
Other
The following report, sponsored by Sumo Logic, is based on a global survey of 316 IT security professionals responsible for environments with significant investment in both cloud and on-prem infrastructure. The goal of this survey was to quantify current experiences with adopting traditional security methods in the cloud, with a focus on both organizations and tools.
Added: October 12, 2018
Other
What Really Drives Security Procurements and Decisions
Added: October 04, 2018
Case Study
Hidden Lake Technology has contracted with DLT Solutions to provide professional services in support of DLT’s Amazon Web Services customer base. These engineering services will support the Amazon Web Services platform and related customer challenges including consulting, migrations, security and cloud optimization. This strategic partnership brings a top services delivery team into the DLT Partner Network, expanding capabilities and maximizing value for customers.
Added: September 27, 2018
Whitepaper
This IDC white paper examines the impact of the 3rd Platform and digital transformation (DX) on IT priorities for enterprise network management and focuses on a shift toward pervasive instrumentation as an enabler of better network visibility, application assurance, and security assurance. The adoption of 3rd Platform solutions will continue to drive a need for capacity, bandwidth, performance, and availability. Cloud is fundamentally changing the characteristics of resource consumption and traffic generation within network operations.
Added: September 24, 2018
Whitepaper
Insider cybersecurity threats are much more prevalent than most of us realize. IBM estimates that 60% of all cyberattacks are perpetrated by those with insider access1; McAfee cites enterprise insiders as a major source of Personally Identifiable Information (PII) sold on the dark web, particularly in the healthcare industry; and at least two-thirds of major corporations reported insider threat incidents in 20163 ranging from file theft and destruction to selling passwords and deliberately sabotaging critical systems. Over 40% of U.S. government agencies report such incidents every year. It's a serious—yet incredibly overlooked—risk.
Added: August 24, 2018
Whitepaper
Year after year, investigations performed after breaches and other security incidents reveal that the majority of security incidents occur because well-known security controls and practices were not implemented or were not working as organizations had assumed. And the major problem in cyber security remains a lack of defined and repeatable processes for selecting, implementing and monitoring the security controls that are most effective against real-world threats.
Added: August 24, 2018