Whitepaper

Explore the tenets of data-led migration and best practices for putting it to work.

Added:
Other

By integrating Illumio Core with Appgate SDP, the user-to-workload entitlement policies will then dynamically adapt to changes in the workload context, such as changes in workload IP addresses.

Added:
Data Sheet

The fastest way to deliver your message.

Added:
Whitepaper

There are a wide variety of mass notification service (MNS) providers out there, many of them claiming to be the best, or able to do everything you need. To inform your purchase decision, it is critical to do your due diligence when selecting a service that will be used during urgent and emergency situations. Blackboard's Buyer’s Guide is intended to help you to ask the right questions about prospective MNS vendors to ensure you select the provider that is best for you and your community.

Added:
Data Sheet

Automated Notifications Help Keep Your Citizens Safe

Added:
Other

Isolate breaches, reduce your exposure to cyberattacks and create the foundation for Zero Trust security.

Added:
Market Intelligence

In this deep-dive, explore the intersection of information technology and the military priorities coming out of the Indo-Pacific region.

Added:

Today we’re continuing our in-depth discussions on Agile 2: The Next Iteration of Agile, with our special guest and co-author, Cliff Berg.  Today we finish last episode’s discussion with further bits of truth, gemba walking and data architecting in an agile way.

Added:
Case Study

Help Federal agencies securely navigate the cloud journey.

Added:
Market Intelligence

This training is part two of a series of Fundamental Trainings covering the SLED budget process designed to give you deeper insight into the SLED Budget Process, buying timeline, and how to approach SLED customers with an effective market strategy.

Added:
Case Study

University of Oklahoma selects Devo platform to centralize SIEM, logging instances while defending campuses against threat actors.

Added:
Whitepaper

Supply chain attacks have not only increased in volume and frequency, but have also become more sophisticated, involving Advanced Persistent Threat (APT) actors. This trend, together with the potentially wide impact of a singular successful supply chain attack, requires organizations to take dedicated steps to ensure the security and integrity of both the software they build and supply to their customers, and/or the software they procure for internal usage.

Added:
Other

To help Palantir Gotham customers who are considering moving to DataWalk, we provide here seven key best practices to help you appropriately plan the decision-making and planning processes to help ensure a smooth migration:

Added:
Podcast

Today we welcome back our special guest, Cliff Berg, co-author of the book Agile 2: The Next Iteration of Agile, as we discuss Agile 2 and DevSecOps partnerships for success.

Added:
Data Sheet

DataWalk is a Palantir alternative for intelligence analysis, providing similar functionality at a dramatically lower cost. Importantly, DataWalk delivers these benefits not only with unique technology, but with a different business model and a different business philosophy.

Added: