You are here

Resources

DLT provides an abundance of current educational resources about each of our vendor partners and technology sectors. Discover webinars, timely whitepapers, instructional videos, e-books on hot topics in tech, case studies about our products in action, upcoming events and conferences, data sheets, and more.

Filter Resources

Data Sheet
Protect your employees and their mobile devices with McAfee® MVISION Mobile, a solution that detects threats and vulnerabilities on Apple iOS or Google Android devices, the networks they’re connected to, and the applications that users have downloaded. On-device detection capabilities provide protection whether the device is online or not. MVISION Mobile uses machine learning capabilities fed by billions of data points from millions of devices to identify current or imminent threats and attacks, including ones that have never been seen before.
Added: December 11, 2018
Data Sheet
Forward-thinking organizations like yours are moving to cloud platforms like Amazon Web Services® (AWS) to improve agility and reduce total cost of ownership. But upgrading the McAfee® ePolicy Orchestrator® (McAfee ePO™) management console to the cloud can often be delayed due to lack of time and skilled resources, especially if you are architecting and deploying it on AWS for the first time. By using industry best practices and proven methodologies, the McAfee cloud enablement services for McAfee ePO helps expedite your transition to the cloud and enjoy peace of mind, knowing that your deployment maximizes your security effectiveness and efficiency. Together, we can help your organization take full advantage of your AWS cloud platform.
Added: December 11, 2018
Data Sheet
Organizations looking for simpler, more affordable alternatives to full-featured endpoint security platforms (EPP) are embracing native security like Windows Defender. While Defender provides essential base-level protection, it’s still necessary to apply advanced countermeasures like machine learning to mount a complete defense against sophisticated fileless and zero-day malware-based threats. The key to success lies within leveraging, strengthening, and managing the security already built into Windows 10 without introducing the complexity of multiple consoles.
Added: December 11, 2018
Publication
Cloud services bring a momentous opportunity to accelerate business through their ability to quickly scale, allow us to be agile with our resources, and provide new opportunities for collaboration. As we all take advantage of the cloud, there’s one thing we can’t forget — our data. When using software-as-a-service (SaaS) we are responsible for the security of our data, and need to ensure it is accessed appropriately. When using infrastructure-asa-service (IaaS) or platform-as-a-service (PaaS), we are additionally responsible for the security of our workloads, and need to ensure the underlying application and infrastructure components are not misconfigured.
Added: December 11, 2018
Case Study
Using the Security Connected strategy the City of Chicago provides a full range of government services to its citizens.
Added: December 11, 2018
Case Study
This South American government agency is responsible for collecting and processing statistical data. The agency conducts the country’s census and other sociodemographic and economic surveys, and also analyzes and reports economic and social indicators such as inflation rate, consumer price index, and unemployment figures.
Added: December 11, 2018
Case Study
Small team efficiently manages hybrid physical, virtual, and cloud infrastructure. By adding McAfee Cloud Workload Security to its existing McAfee®-integrated security architecture, this company can now reap the benefits of leveraging the public cloud. And, thanks to McAfee® ePolicy Orchestrator® (McAfee ePO™) software, deploying and managing cloud security is easy and adds minimal additional overhead.
Added: December 11, 2018
Case Study
By implementing McAfee® Endpoint Security and McAfee Management for Optimized Virtual Environments AntiVirus (McAfee MOVE AntiVirus), the city of Gothenburg, Sweden, is proactively blocking ransomware and other threats with less work, bolstering its protection of city operations and citizens’ data.
Added: December 11, 2018
Data Sheet
AWS takes care of security ‘of’ the cloud while AWS customers are responsible for security ‘in’ the cloud. This document guides customers on how to ensure the highest level of protection for their AWS infrastructure and the sensitive data stored in AWS with a 51-point security configuration checklist to ensure that AWS services are configured with the highest level of security while still allowing employees to fulfill their job responsibilities.
Added: December 11, 2018
Data Sheet
Your organization needs to respond quickly to threats on any type of device to minimize the damage, and management demands evidence of security effectiveness. The McAfee® ePolicy Orchestrator® (McAfee ePO™) management platform—available on premises and from the cloud (with two models to choose from: SaaS or IaaS) — helps eliminate the time-consuming effort and potential for human error and helps those responsible for managing security respond faster and with higher efficacy.
Added: December 11, 2018
Video
Added: December 6, 2018
Webinar
Government agencies are embracing Cloud technologies to modernize their infrastructure to deliver digital services at scale, more rapidly and more cost effectively.
Added: December 6, 2018
Video
The U.S. government just issued a request for comment on its plan for cloud computing adoption across the federal government. The government says it’s time to move from Cloud First to Cloud Smart.
Added: December 5, 2018
Webinar
"Cyber Hygiene"—like so many buzzwords in our industry, this one gets more use than understanding. What exactly is cyber hygiene? Do government agencies keep it up sufficiently? If not, why not? How does cyber hygiene affect an agency's ability to implement advanced security technology? What are the financial, psychological, and technological factors that affect cyber hygiene? This webinar, featuring Don MacLean, Steve Potter, David Henderson, and Paul Parker, explores these topics and more.
Added: December 4, 2018
Other
The following report, sponsored by Sumo Logic, is based on a global survey of 316 IT security professionals responsible for environments with significant investment in both cloud and on-prem infrastructure. The goal of this survey was to quantify current experiences with adopting traditional security methods in the cloud, with a focus on both organizations and tools.
Added: October 12, 2018

Pages