You are here

Resources

DLT provides an abundance of current educational resources about each of our vendor partners and technology sectors. Discover webinars, timely whitepapers, instructional videos, e-books on hot topics in tech, case studies about our products in action, upcoming events and conferences, data sheets, and more.

Filter Resources

Data Sheet
Trend Micro™ TippingPoint® Security Management System (SMS) enables "big picture" analysis with trending reports, correlation and real-time graphs on traffic statistics, filtered attacks, network hosts and services, and inventory and health status for TippingPoint devices. The TippingPoint SMS provides a scalable, policy-based operational model, and enables straightforward management of large-scale TippingPoint deployments. 
Added: December 21, 2018
Data Sheet
Virtualization has already transformed the data center and now, organizations are moving some or all of their workloads to private and public clouds. If you’re interested in taking advantage of the benefits of hybrid cloud computing, you need to ensure you have security built to protect all of your servers, whether physical, virtual, or cloud. In addition, your security should not hinder host performance and virtual machine (VM) density or the return on investment (ROI) of virtualization and cloud computing. Trend Micro™ Deep Security™ provides comprehensive security in one solution that is purpose-built for virtualized and cloud environments so there are no security gaps or performance impacts. 
Added: December 21, 2018
Data Sheet
Targeted attacks and advanced threats are customized to evade your conventional security defenses, and remain hidden while stealing your corporate data, intellectual property, and communications, or encrypt critical data until ransom demands are met. To detect targeted attacks and advanced threats, analysts and security experts agree that organizations should utilize advanced detection technology as part of an expanded strategy. Deep Discovery Inspector is a physical or virtual network appliance that monitors.
Added: December 21, 2018
Publication
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, hybrid environments, and containers effectively. If you neglect any aspect of security, you leave gaps that open the door to threats and serious data breaches. And, to comply with data privacy and industry regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment.
Added: December 21, 2018
Data Sheet
DataWalk is a commercial-grade Big Data software platform for connecting numerous large data sets, into a single repository for fast visual analysis.
Added: December 21, 2018
Publication
NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000 (Hardware model 4100) v5.0 & OfficeScan XG SP1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v5.0 and the NSS Labs Evasions Test Methodology v1.1, both available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Trend Micro’s participation.
Added: December 21, 2018
Data Sheet
Trend Micro™ Deep Security™ makes it easier to meet many of the key security controls required for federal information systems moving to Azure.
Added: December 21, 2018
Whitepaper
This document is an update to the 2015 whitepaper and considers new controls introduced in the “Initial Public Draft” of NIST SP 800-53 Revision 5 and includes TippingPoint in the compliancy analysis.
Added: December 21, 2018
Data Sheet
Targeted attacks and advanced threats are customized to evade your conventional security defenses and remain hidden, while stealing your sensitive data or encrypting critical data until ransom demands are met. To detect targeted attacks and advanced threats, analysts and security experts agree that organizations should utilize advanced detection technology as part of an expanded strategy to address today’s evasive threats.
Added: December 21, 2018
Publication
Constant IT change is the new normal for organizations and businesses; changes that are empowering us with better and more efficient use of their most important asset — information.
Added: December 21, 2018
Data Sheet
Trend Micro™ TippingPoint® Threat Protection System (TPS) is a powerful network security platform that offers comprehensive threat protection against known and undisclosed vulnerabilities with high accuracy. TPS provides industry-leading coverage across different threat vectors from advanced threats, malware, and phishing, etc., with extreme flexibility and high performance. 
Added: December 21, 2018
Whitepaper
Device security is no longer about traditional antivirus versus next-generation endpoint protection. The truth is you need a layered and integrated defense that protects your entire digital terrain and all types of devices—traditional and nontraditional. ESG Senior Principal Analyst Jon Oltsik frames it this way: "… endpoint security should no longer be defined as antivirus software. No disrespect to tried-and-true AV, but endpoint security now spans a continuum that includes advanced prevention technologies, endpoint security controls, and advanced detection/response tools."
Added: December 11, 2018
Publication
Beyond cost savings, a key driver of cloud adoption is the innovation that the cloud enables. The cloud can accelerate business. As a result, the cloud is increasingly the place where data—an organization’s most valuable asset—is stored and shared. Securing that information is a shared responsibility between a company and their cloud providers.
Added: December 11, 2018
Other
This infographic details why McAfee Endpoint Security is an upgrade to a market-leading modern endpoint defense.
Added: December 11, 2018
Data Sheet
Companies of all sizes are adopting cloud-based services, such as Microsoft Office 365, to give their employees greater flexibility and easier access to core business applications. Enabling such flexibility without considering the risks exposes gaps in traditional data security solutions. These gaps include a lack of visibility and control of sensitive data once it leaves the perimeter, inconsistent data loss detection across multiple environments (endpoints, networks, and the cloud), and the absence of centralized management for incident workflows and reporting, regardless where the violations occur. 
Added: December 11, 2018

Pages