You are here

Resources

DLT provides an abundance of current educational resources about each of our vendor partners and technology sectors. Discover webinars, timely whitepapers, instructional videos, e-books on hot topics in tech, case studies about our products in action, upcoming events and conferences, data sheets, and more.

Filter Resources

Data Sheet
Nuix builds confidence into your eDiscovery process from the outset. The patented Nuix Engine processes all relevant evidence with unmatched speed and thoroughness. Our web-based workflow automation, collaboration, and analytics tools let you make early case assessments with all the facts at your fingertips.
Added: June 4, 2018
Whitepaper
Data loss, theft, and misuse are more common in government agencies than we care to admit. Most cybersecurity practitioners concede that they can’t prevent every attack they face. Coupled with the increasing value criminals place on our data, wherever it’s stored—social media accounts, commercial databases, and even U.S. Government servers—personally identifiable information (PII) is one of our most valuable assets.
Added: June 1, 2018
Whitepaper
Using Nuix Investigation Software and Specialist Tools to Create a Seamless Workflow
Added: June 1, 2018
Case Study
Nuix workstation saves hours of processing time versus other similar pre-eDiscovery review tools.
Added: June 1, 2018
Whitepaper
Nuix has advocated for many years that investigators need to evolve beyond traditional forensic tools and workflows, so they can efficiently examine the contents of multiple evidence sources at once.
Added: June 1, 2018
Whitepaper
Government organizations face growing volumes of data and increasing pressure to provide information more transparently. At the same time, they must maintain the privacy of citizens’ data, reduce costs and provide user-friendly digital services and interfaces – letting users access data and services at the touch of a finger.
Added: June 1, 2018
Publication
We launched GovDesignHub to celebrate the different ways that these CAD and BIM solutions are powering innovation, creation and design across the government. This publication will look at the ways that CAD and BIM digital design solutions are making dreams into realities and bringing concepts to life.
Added: May 4, 2018
Publication
We launched the GovDesignHub to celebrate the different ways that these CAD and BIM solutions are powering innovation, creation and design across the government. This publication will look at the ways that CAD and BIM digital design solutions are making dreams into realities and bringing concepts to life.
Added: April 17, 2018
Data Sheet
CrowdStrike’s Falcon MalQuery is an advanced, cloud-based malware research tool that enables security professionals and researchers to quickly search a massive dataset of malware samples, validating potential risks and staying ahead of would-be attackers.
Added: March 23, 2018
Case Study
In January 2011, while early in his first term, Wyoming Gov. Matt Mead prioritized expanding the state’s economy to include a hightechnology sector. About a year later, the state legislature established the Wyoming Department of Enterprise Technology Services (ETS), to build the infrastructure to support the executive mandate and to provide cybersecurity and IT services to numerous state agencies. 
Added: March 23, 2018
Data Sheet
The CrowdStrike Falcon® platform was designed to be open, with a focus on providing rich APIs to allow customers and partners to benefit from its power. The Falcon platform APIs access CrowdStrike cloud data, enabling you to leverage your existing security investments and enhance your protection.
Added: March 23, 2018
Data Sheet
The global CrowdStrike Falcon Intelligence™ team tracks adversaries of all types — nation-state, criminal, hacktivist — to provide the customized and actionable intelligence you need to stay ahead of disruptive threat actors targeting your organization.
Added: March 23, 2018
Whitepaper
The radical shift in the scale and economics of cybercrime calls for an equally radical change in how IT protects user systems. Whether it is from phishing attempts, drive-by-downloads, or malware-free intrusion techniques, endpoints are usually at the spear tip of assaults on enterprise networks.
Added: March 23, 2018
Whitepaper
One of the fastest growing threats in cybersecurity today, ransomware is quickly becoming the favored means for cybercriminals to extract a profit from unsuspecting victims. As ransomware mushrooms with new malware variants and new ways of scamming victims, businesses can no longer afford to discount it as a consumer-only problem.
Added: March 23, 2018
Data Sheet
Despite regulatory and administrative requirements, the public sector continues to be attacked and exploited by sophisticated threat actors. The fragmentation of security resources leaves federal, state and local agencies constantly fighting fires throughout the enterprise.
Added: March 23, 2018

Pages