For nearly 30 years, DLT has been dedicated to solving public sector IT challenges. DLT has knowledge and experience helping public sector customers acquire the technology solutions they need, a vast contract portfolio, and a robust collection of technology solutions across six strategic solution sets — DLT makes it easy to find, select, and buy the solutions you need.

Interested in a solution? Fill out the form below and receive a quote within 24 hours from a DLT representative. If you have trouble with the form, please Contact Us.

Virtual
Tuesday, Jun 9, 2020, 1:00pm - Tuesday, Aug 4, 2020, 2:00pm
Online
NETSCOUT & DLT Tech Talk Tuesdays are technical discussions on hot topics that NETSCOUT customers are focused on solving. Our subject matter experts are experienced professionals who spend a lot of time helping customers pursue and solve their toughest challenges with innovative products and solutions from NETSCOUT.
Virtual
Wednesday, Jul 22, 2020, 11:00am - Wednesday, Sep 16, 2020, 12:00pm
Online
Virtual
Tuesday, Aug 4, 2020, 4:00pm - 5:00pm
Online
​Are you trying to build a new application that needs to incorporate location services? You are not alone. With the rise of COVID and other critical topics, there is an increasing need for applications using location and geospatial data. How do developers serve up geospatial data in a cloud native way? Come to this session to find out how. The Open Geospatial Consortium (OGC) members and international community are creating Open APIs for cloud native geospatial information access and processing (https://ogcapi.ogc.org/).
Virtual
Wednesday, Aug 5, 2020, 2:00pm - 3:00pm
Online
Visibility is key to preventing a breach, after all, you cannot secure devices you cannot see. This is how many threat actors breach your network! We will be discussing:
Virtual
Thursday, Aug 6, 2020, 9:00am - 10:30am
Online
Learn how to visualize a path to marketing excellence during this 90-minute virtual event. Hear an executive viewpoint on why it’s never been more important to understand customer signals. Then dive right into our agenda, which we designed specifically for marketers and features our customers, as well as our effervescent host, Jay Baer. Register Now
Virtual
Thursday, Aug 6, 2020, 11:00am - 11:45pm
Online
The 2016 Elections exposed glaring vulnerabilities in U.S. voting systems as hackers conducted “research and reconnaissance” against election networks in all 50 states, breached at least one state registration database, attacked local election boards, and infected the computers at a voting technology company. Why were hackers able to expose such vulnerabilities in U.S. voting systems?  
Virtual
Wednesday, Aug 12, 2020, 1:00pm - 2:00pm
Online
​The Foundations for Evidence-Based Policymaking Act (including the OPEN Government Data Act) created new data governance dynamics within agencies by requiring agencies to designate the Statistical Officials, the Evaluation Officers, and the Chief Data Officers. These three officials are responsible for the best practices that support the maturity of an agency's use of data. The U.S. Department of Education (ED) built a data-centric culture and is working to expand the use of data stewardship across the agency. 
Virtual
Wednesday, Aug 12, 2020, 2:00pm - 3:00pm
Online
Cybersecurity breaches are an unfortunate reality for all industries, with ransomware increasingly the go-to mode of attack for cybercriminals. But K-12 schools are disproportionately affected by cybercrime. More than 500 K-12 schools were victimized by ransomware in 2019 alone. Why do cybercriminals focus on school districts? What is it about K-12 education that makes these entities such attractive targets?
Virtual
Thursday, Aug 13, 2020, 1:00pm - 2:00pm
Online
Live Panel Discussion and Q&A | Avoid Downtime and Resolve Issues Sooner with CIS Guidance​
Virtual
Thursday, Aug 13, 2020, 2:00pm - 3:00pm
Online
​CONFIRMED SPEAKERS:
Resources
eBook

With Medallia's latest playbook, you'll learn the 5 essential management practices to help your school reopen successfully.

Added: August 03, 2020
Webinar

A webinar to present the findings of the above mentioned study. There will be a Q&A with Steve Grewal and Colonel Charles L. Destefani, Chief Data Officer, Air Force focused on federal challenges, best practices and mass data fragmentation.

Added: July 22, 2020
Data Sheet

A visual representation of the data pulled from MeriTalk research and Cohesity's MDF study with a focus on the federal government's journey to IT modernization, the lack of progress despite large budgets and next steps for success.

Added: July 22, 2020
Whitepaper

In partnership with reseller partner, CTG Federal, we created this piece based on an interview with Steve Grewal, focusing on data management at the tactical edge, the DoDs data consolidation challenges and opportunities for technology and process improvements.

Added: July 22, 2020
Whitepaper

​Learn how ​Cloudera can help you choose the right stream processing engine for organization's needs by analyzing key technical and operational differentiators between four modern stream processing engines from the Apache open source community.

Added: July 21, 2020
Whitepaper

CIS released the CIS Amazon Web Services (AWS) Foundations Benchmark, intended for system and application administrators, security specialists, auditors, help desk, platform deployment, and/or DevOps personnel who plan to develop, deploy, assess, or secure solutions in Amazon Web Services.

Added: July 21, 2020
Solution Brief

The line between IT and Security is blurring. What was once a simple delineation between keeping information safe and providing the tools necessary to get work done is no longer clear. In this short paper, we’ll look at why asset management – once a pure IT play – matters for cybersecurity, and how both IT and security teams can benefit from cybersecurity asset management.

Added: July 21, 2020
Solution Brief

After working with hundreds of security professionals and covering over 1 million assets at some of the world’s most innovative brands, the team at Axonius has identified 5 things that security teams discover when they automate cybersecurity asset management. In this short paper, we’ll review each of these findings, discuss their security implications, and show how automating asset management can both find and resolve these challenges.

Added: July 21, 2020
Whitepaper

Eight years after former Forrester analyst John Kindervag introduced the Zero Trust model, the concept has hit the mainstream. As current Forrester analyst Chase Cunningham says, 85% of his calls involve zero trust. With the amount of interest in the concept, many organizations are rushing to understand how to implement the zero-trust model. In this guide, we’ll look at the first step to implementing zero trust: asset management.

Added: July 21, 2020
Whitepaper

Today, security professionals face many challenges in cybersecurity asset management, from aggregating disparate data sets to establishing real-time visibility in a fluid environment. Emerging technology, such as IoT deployments, and workplace modernization like BYOD continue to complicate this situation. Organizations must understand the depth and breadth of the devices on their network.

Added: July 21, 2020
Solution Brief

At its core, patch management is a discipline that combines both knowledge and action. It requires IT and security teams to understand which devices are known and unknown, the version and subsequent vulnerabilities of software being used, and the impact of change. In an environment complicated by always-on, smart devices, a new approach is needed to address what’s known as well as the unknowns that should be known.

Added: July 21, 2020
eBook

IT and security teams are already struggling to find new management and security tools that can keep up. VMs, new devices, and new device types are driving complexity. Most say that they already have too many tools, yet still report visibility gaps in what they can see versus what they want to see across cloud, mobile, and IoT environments. This gap directly translates into added security risk. 85% of organizations plan to increase investment in asset management to help overcome these issues.

Added: July 21, 2020
Data Sheet

By seamlessly integrating with over 200 security and IT management solutions, Axonius deploys in hours (not weeks) to improve threat and vulnerability management, security operations, incident response, and overall security posture.

Added: July 21, 2020
Is this is regarding a renewal?