SAIC partners with McAfee to offer protection from zero day and reconnaissance attacks


Science Applications International Corporation (SAIC), a
scientific, engineering, and cybersecurity company, and McAfee, a security
technology company, announced their partnership to provide new cyber security
solutions to meet the sophisticated threats faced by enterprises.


The partnership will provide carrier grade security
solutions to intelligence, national governments, telco’s and enterprises around
the world.


During the first part of the agreement, McAfee will
integrate McAfee Network Threat Response technology into CloudShield’s PN41 for
the IBM Blade Center and CS4000 platforms. McAfee Network Threat Response is an
out-of-band appliance that captures, deconstructs, and analyzes malware in real
time.


When it is paired with the PN41, CloudShield’s DPI
architecture supporting critical security and control applications, or the
CS4000, a modular chassis supporting high-speed packet and software-driven
content processing, an effective solution to the demand for agile and secure
threat detection emerges.


Cyber threats are outpacing the traditional hardware based
defense-in-depth models used to protect high value networks at an alarming
rate, at a time when critical data must move beyond the company network to the
mobile endpoint.


“Our combined approach augments these historical investments
with active threat intelligence and out-of-band, reprogrammable hardware
platforms that intelligently adapt to anticipate, detect and remediate
cyber-threats in sophisticated network infrastructures,” said Charles Beard, SAIC’s
chief information officer and director for cyber security products and
solutions.


“Customers are looking for security platforms, applications
and services that can take a commanding role in establishing threat readiness
and ultimately protecting high value networks,” said Joe Sexton, executive vice
president of global sales at McAfee
.


The combined offerings meet key needs of CIOs and CISOs. The
traditional model of embedded hardware with five year refresh cycles is simply
inconsistent with the emerging threat landscape and legal liabilities faced by
businesses around the world. 


A more aggressive model that allows CIOs and CISOs to
consume virtualized services and applications based on their unique threat
vectors and desired security posture is an alternative approach that is long
overdue. Corporate boards understand cybersecurity is an enterprise risk issue
that is evolving and CIOs and CISOs need solutions that can adapt to this ever
changing landscape.


By Telecomlead.com Team
[email protected]