Subscribe

Cloud Computing, Data & Storage
  DLT has been a partner of Ansible for several years, and in 2015 when another partner of ours, Red Hat, acquired Ansible, our government customers gained new opportunity to make the automated enterprise a reality. What is Ansible?
Cybersecurity
  Identity management, the process of identifying individuals in your system and controlling the access they have to certain resources, is an area of cyber security that state and local government employees have quite a bit of confidence in. Yet data shows there’s room for improvement.
Cybersecurity
DLT partner, Symantec, has put together a list of seven items you must add to any incident response plan. Here’s how it translates to government agencies. 1. Have a Workable Plan
Digital Design
Making the move to AutoCAD Civil 3D is a big step up for many agencies and public sector teams. Whether you’re coming off using Land Desktop or AutoCAD for your civil infrastructure projects, Civil 3D can seem like a daunting leap forward, despite the many benefits the software brings in terms of greater efficiencies, long-term cost-savings, and reduced errors. It’s something we often hear from our government clients.
Cybersecurity
Getting to know the “enemy with no face” is critical to winning the cyber war. In fact, it’s the tagline from the U.S. Army’s latest cyber warrior recruitment ad. Yet, one of the biggest challenges to doing so is that most organizations have zero visibility into a significant percentage of the endpoints on their network. That’s because they are either not managed (BYOD, guest, and IoT), have disabled or broken agents, or aren’t detected by periodic scans.
Cybersecurity
When it comes to controlling logins and privileges on Unix/Linux servers, Centrify’s philosophy is aligned with modern NIST recommendations, as opposed to traditional vendors whose solutions are centered around a Password Vault. Centrify believes users should login directly as themselves and elevate privileges granularly as needed and authorized.