You are here

Resources

DLT provides an abundance of current educational resources about each of our vendor partners and technology sectors. Discover webinars, timely whitepapers, instructional videos, e-books on hot topics in tech, case studies about our products in action, upcoming events and conferences, data sheets, and more.

Filter Resources

Case Study
Organizations around the world are adopting, building or shifting resources, applications and workloads to the cloud to take advantage of the inherent competitive, economic and agility gains that can be achieved in this environment. However many of these organizations are finding that their legacy network and security tools are not able to provide them with the scalability and insights they need, to continue tightly managing their security and compliance requirements in the cloud.
Added: October 12, 2018
Whitepaper
For the past two years, Sumo Logic has produced the first and only industry report that quantitatively defines the state of the Modern App Stack. Working with our customers, we continue to see rapid advances in tools and processes used by various enterprise personas to build, run and secure modern applications. This third annual report extends our analysis to DevSecOps, a new and innovative trend that is rapidly growing amongst our customers.
Added: October 12, 2018
Other
What Really Drives Security Procurements and Decisions
Added: October 4, 2018
Case Study
Hidden Lake Technology has contracted with DLT Solutions to provide professional services in support of DLT’s Amazon Web Services customer base. These engineering services will support the Amazon Web Services platform and related customer challenges including consulting, migrations, security and cloud optimization. This strategic partnership brings a top services delivery team into the DLT Partner Network, expanding capabilities and maximizing value for customers.
Added: September 27, 2018
Whitepaper
This IDC white paper examines the impact of the 3rd Platform and digital transformation (DX) on IT priorities for enterprise network management and focuses on a shift toward pervasive instrumentation as an enabler of better network visibility, application assurance, and security assurance. The adoption of 3rd Platform solutions will continue to drive a need for capacity, bandwidth, performance, and availability. Cloud is fundamentally changing the characteristics of resource consumption and traffic generation within network operations.
Added: September 24, 2018
Webinar
In this webinar, Morgan Hein, discusses a new Open Source tool, EnVisen, which lets you view the exported symbols and ROP gadget surface area of your binaries in a visually rich and purposeful way from directly within your browser. It can even compare binaries to visualize common attackable surface area and score your Zero-Day vulnerability risk with built in entropy evaluation.
Added: September 5, 2018
Whitepaper
Year after year, investigations performed after breaches and other security incidents reveal that the majority of security incidents occur because well-known security controls and practices were not implemented or were not working as organizations had assumed. And the major problem in cyber security remains a lack of defined and repeatable processes for selecting, implementing and monitoring the security controls that are most effective against real-world threats.
Added: August 24, 2018
Publication
When a high-profile cyberattack grabs the headlines, your first instinct may be to funnel resources into purchasing a shiny new tool to defend your organization. But often, that’s not what’s really needed.
Added: August 24, 2018
Whitepaper
Security and compliance remain at the forefront of concerns facing security leaders today. Tackling the challenge of finding and addressing risks in the enterprise while demonstrating compliance with increasingly demanding regulations requires the maturity and discipline to adopt and follow a complete security risk and compliance lifecycle.
Added: August 24, 2018
Publication
Federal security managers expect that most federally run systems are actively engaging with FISMA compliance for protecting federal data and systems. However, as we all know, federal information does not remain only in federally operated systems. Data and IT systems connect via the internet and other networks for business, operations and research. Information about citizens, banking and finance, research and development, and many other federal connected systems transmit data outside the federal networks—and their security compliance standards. So it makes sense that FISMA would adapt to address more than the original scope of perceived threats and specifically address systems and data security that inter-agency networks, vendors, contracts and supply chain puts at risk.
Added: August 24, 2018
Publication
Tripwire solutions have a history with government agencies, offering an 'ironclad defense,' or foundation for a layered compliance and security strategy.
Added: August 24, 2018
Publication
Tripwire's integrated suite of products build on their core capabilities to deliver critical capabilities for breach detection and remediation, and address nearly every compliance standard—PCI DSS, NIST, FISMA, NERC, HIPAA, ISO/IEC 27002, DISA, SOX, and many others.
Added: August 24, 2018
Whitepaper
Insider cybersecurity threats are much more prevalent than most of us realize. IBM estimates that 60% of all cyberattacks are perpetrated by those with insider access1; McAfee cites enterprise insiders as a major source of Personally Identifiable Information (PII) sold on the dark web, particularly in the healthcare industry; and at least two-thirds of major corporations reported insider threat incidents in 20163 ranging from file theft and destruction to selling passwords and deliberately sabotaging critical systems. Over 40% of U.S. government agencies report such incidents every year. It's a serious—yet incredibly overlooked—risk.
Added: August 24, 2018
Whitepaper
The security industry is now starting to embrace the notion of cyber resiliency. A resilient system is one where vulnerabilities are assumed, but has defenses designed such that the system can continue to operate safely and reliably. A technique that enables system resiliency is Moving Target Defense.
Added: August 16, 2018
Data Sheet
With Polyverse Polymorphic Linux, deployment is simple, taking less than 5 minutes for protection by a uniquely randomized set of binaries.
Added: August 16, 2018

Pages