SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Today’s threat landscapes are notably sophisticated with personalized targeting attack methods producing a maximum amount of
mayhem. Persistent targeted cyber-attacks infiltrate enterprise networks to steal financial data, personnel job records, health records
and sensitive corporate secrets, disclosure of which is costly and traumatic to the corporate brand. The financial market impact of
inadequate IT safeguards and dissemination of sensitive corporate records results in overwhelming financial loss. The immense
breadth of this cyber compromise problem is exacerbated when critical, high-value data moves beyond the control of the corporate
network to mobile endpoints. Corporations must take action to protect sensitive internal data that is remotely accessed by their
wireless workforce and customers.
With the ever-changing landscape of IT infrastructures—moving from static to mobile endpoints and the increasing shift to cloud-based
environments—CIOs/CISOs have the daunting task of maintaining strict security compliance against the sheer amount of data that is
created from multi-petabytes of information transmitted and stored within their environment. Networks carrying sensitive informa-
tion are“at risk”without complete monitoring, visibility and security controls—ultimately jeopardizing business models.
In order to identify, react and prevent threats from becoming data breaches, large enterprises need a full range of expertise, hardware,
and software. Network security analysts must have flexibility and complete control over their security posture to adapt protection
levels and take the proper defensive actions, in real-time, as attacks are unfolding.
A new approach to securing the enterprise is overdue. The traditional model of embedded hardware with five-year refresh cycles is
simply being outpaced by the evolving threat landscape and the associated legal liabilities faced by businesses around the world.
Static defense models for high-value networks must intelligently adapt to succeed. Adaptation includes complete visibility, control,
and the ability to accurately provide explicit information to policy-based analytics engines. Real-time intelligence drives adapting
response that safeguards and secures against emerging threats. Incorporating improved analytics and visualization drives clear
situational awareness of corporate networks. Advantages of this approach are manifested in the ability to predict and detect
anomalous and malicious network traffic while actively deploying intelligent mitigation strategies. The key to this approach is to
have real-time intelligence that adapts security profiles in advance of the next attack.
SAIC and Cloudshield have partnered with McAfee to deliver a broad range of carrier-class cybersecurity solutions on hardened platforms
backed by a full spectrum of tiered cybersecurity services that can adapt in real-time to today’s increasing business-damaging cyber threats.
Solutions
McAfee’s industry-leading security solutions can detect and react to attacks across networks without prior knowledge of suspicious
profiles or attack payloads that are constantly evolving and transforming. Coupled with McAfee’s Global Threat Intelligence to detect
and respond to common tactics, techniques, and procedures, IT professionals have a precise understanding of the full scope of threats
to shut down all vectors of an attack. Armed with this knowledge, security teams have the ability to craft comprehensive protection
strategies that intelligently adapt to future threats poised to jeopardize your enterprise.
Platforms
CloudShield’s CS-4000 Trusted Network Security Platform addresses the shortcomings of a network equipment market dominated by
closed, fixed-function appliances. Architected for flexibility, the CS-4000 platform is an adaptable, active network device that combines
CloudShield’s patented L7 packet processing capabilities together with general purpose computing for scalable, flexible performance.
CloudShield has leveraged IBM’s Blade Open Specification to implement its advanced packet processing architecture on IBM’s industry-
leading bladed solution, the IBM BladeCenter®. The IBM BladeCenter is a highly integrated, flexible, and reliable system comprised of
blade servers, storage, management, and networking options that help reduce management complexity while increasing performance
and energy efficiency.
By leveraging the IBM BladeCenter H for datacenter environments and the IBM BladeCenter HT for demanding telecommunications
environments, companies have greater deployment flexibility to adapt to requirements for scalability and convergence of security services.
Security Foundation
Adversaries are persistent. If they can’t succeed on one path, they’ll try elsewhere until they finally breach network defenses. Don’t
assume that you can protect a valuable network if the foundation upon which it is built can be compromised. The CloudShield platform
has been architected and validated by the most demanding pool of security organizations and it is accredited in EAL4+ and DCID 6/3
PL4 environments. To help ensure that your company’s critical infrastructure solutions are secure and robust, the CS-4000 is hardened
against attack, both at the operating system and with physical security countermeasures protecting the system itself. The CloudShield
CS-4000 is a cyber assurance platform available for securing your infrastructure and protecting high value data.
Analytics and Experience
SAIC’s Center of Excellence for Cybersecurity, comprised of more than 600 information assurance specialists and engineers, provides
full-spectrum security services and carrier-grade solutions for commercial and government clients worldwide. McAfee customers
without dedicated resources or expertise can leverage SAIC’s security engineering operations and managed security services through
a world-class security operations center monitoring thousands of security devices across dozens of customers. SAIC’s advanced
forensics and analytics, based on decades of successful programs deployed, across government agencies help enterprises adapt
security for advanced attacks.
Realized Operational Benefits
“Intelligently Adapt”is a concept that promotes awareness and enables rapid response to network threats. It provides the basis to evolve
an enterprise’s security posture to a higher, more secure level. The benefits not only include a more robust ability to detect and react to
threats but also a blueprint for a more efficient security infrastructure.
Highly-flexible packet processing capabilities that can intelligently intercept, re-route, and mitigate traffic while making decisions on the
fly, in real-time—provides for more efficiency for CPU cycles that are spent analyzing traffic easily tagged for specific actions (detect, stop or
analyze). Front end analytics can also enable smart packet capture activity, a major benefit in efficient and effective forensic activity.
CloudShield offers a powerful advantage to security independent software vendors—allowing them to quickly integrate and adapt their
solutions for scalable and trusted cyber solutions. With the latest multi-core processing technologies on the market and zero to limited
development impact, ISVs can rapidly deploy across the most sophisticated enterprise networks. CloudShield’s PN41 for IBM BladeCenter
allows CIO’s and CISO’s to significantly reduce security appliance sprawl and lengthy hardware refresh models. It minimizes connection
management overhead while providing a software-based consolidation approach for efficiently handling“defense in depth”of security
to protect business critical information and services. In addition, this approach offers IT professionals an open environment to work
with SAIC, CloudShield and our ISV partners in selecting the right security applications and capabilities that your network demands.
CloudShield World Headquarters
212 Gibraltar Drive
Sunnyvale, CA 94089
tel: 408.331.6640
fax: 408.331.6742
email: info@cloudshield.com
Visit us online at cloudshield.com
© SAIC 2011. All rights reserved. BladeCenter is a registered trademark of IBM Corp. in the United States and/or other countries.

Más contenido relacionado

La actualidad más candente

Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-managementAmit Bhargava
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recoverySameeu Imad
 
G05.2013 Security Information and Event Management
G05.2013   Security Information and Event ManagementG05.2013   Security Information and Event Management
G05.2013 Security Information and Event ManagementSatya Harish
 
Best-Practices-Web-Usability
Best-Practices-Web-UsabilityBest-Practices-Web-Usability
Best-Practices-Web-UsabilityLarry Wilson
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyHappiest Minds Technologies
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsMaganathin Veeraragaloo
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyFidelis Cybersecurity
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) PwC France
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaFaysal Ghauri
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Vladimir Jirasek
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesDave Reeves
 

La actualidad más candente (20)

Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-management
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
 
G05.2013 Security Information and Event Management
G05.2013   Security Information and Event ManagementG05.2013   Security Information and Event Management
G05.2013 Security Information and Event Management
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
Best-Practices-Web-Usability
Best-Practices-Web-UsabilityBest-Practices-Web-Usability
Best-Practices-Web-Usability
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network Secuirty
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threats
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 

Similar a IntelAdapt

corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdfLolaHel
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integrationMarco Essomba
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Unisys Corporation
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technologyrosswilks1
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudInsight
 
#BARM2022 04. Federico_Santi_DXC_BARM_20220610.pdf
#BARM2022 04. Federico_Santi_DXC_BARM_20220610.pdf#BARM2022 04. Federico_Santi_DXC_BARM_20220610.pdf
#BARM2022 04. Federico_Santi_DXC_BARM_20220610.pdfIIBA-IT
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutionsxband
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - mediumusmsystem
 
Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Markit
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
What is the cyber security.pdf
What is the cyber security.pdfWhat is the cyber security.pdf
What is the cyber security.pdfCyberSoCCapital
 

Similar a IntelAdapt (20)

corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
 
#BARM2022 04. Federico_Santi_DXC_BARM_20220610.pdf
#BARM2022 04. Federico_Santi_DXC_BARM_20220610.pdf#BARM2022 04. Federico_Santi_DXC_BARM_20220610.pdf
#BARM2022 04. Federico_Santi_DXC_BARM_20220610.pdf
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutions
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - medium
 
SIEM Buyer's Guide
SIEM Buyer's GuideSIEM Buyer's Guide
SIEM Buyer's Guide
 
Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
What is the cyber security.pdf
What is the cyber security.pdfWhat is the cyber security.pdf
What is the cyber security.pdf
 

IntelAdapt

  • 1. Today’s threat landscapes are notably sophisticated with personalized targeting attack methods producing a maximum amount of mayhem. Persistent targeted cyber-attacks infiltrate enterprise networks to steal financial data, personnel job records, health records and sensitive corporate secrets, disclosure of which is costly and traumatic to the corporate brand. The financial market impact of inadequate IT safeguards and dissemination of sensitive corporate records results in overwhelming financial loss. The immense breadth of this cyber compromise problem is exacerbated when critical, high-value data moves beyond the control of the corporate network to mobile endpoints. Corporations must take action to protect sensitive internal data that is remotely accessed by their wireless workforce and customers. With the ever-changing landscape of IT infrastructures—moving from static to mobile endpoints and the increasing shift to cloud-based environments—CIOs/CISOs have the daunting task of maintaining strict security compliance against the sheer amount of data that is created from multi-petabytes of information transmitted and stored within their environment. Networks carrying sensitive informa- tion are“at risk”without complete monitoring, visibility and security controls—ultimately jeopardizing business models. In order to identify, react and prevent threats from becoming data breaches, large enterprises need a full range of expertise, hardware, and software. Network security analysts must have flexibility and complete control over their security posture to adapt protection levels and take the proper defensive actions, in real-time, as attacks are unfolding. A new approach to securing the enterprise is overdue. The traditional model of embedded hardware with five-year refresh cycles is simply being outpaced by the evolving threat landscape and the associated legal liabilities faced by businesses around the world. Static defense models for high-value networks must intelligently adapt to succeed. Adaptation includes complete visibility, control, and the ability to accurately provide explicit information to policy-based analytics engines. Real-time intelligence drives adapting response that safeguards and secures against emerging threats. Incorporating improved analytics and visualization drives clear situational awareness of corporate networks. Advantages of this approach are manifested in the ability to predict and detect anomalous and malicious network traffic while actively deploying intelligent mitigation strategies. The key to this approach is to have real-time intelligence that adapts security profiles in advance of the next attack. SAIC and Cloudshield have partnered with McAfee to deliver a broad range of carrier-class cybersecurity solutions on hardened platforms backed by a full spectrum of tiered cybersecurity services that can adapt in real-time to today’s increasing business-damaging cyber threats. Solutions McAfee’s industry-leading security solutions can detect and react to attacks across networks without prior knowledge of suspicious profiles or attack payloads that are constantly evolving and transforming. Coupled with McAfee’s Global Threat Intelligence to detect and respond to common tactics, techniques, and procedures, IT professionals have a precise understanding of the full scope of threats to shut down all vectors of an attack. Armed with this knowledge, security teams have the ability to craft comprehensive protection strategies that intelligently adapt to future threats poised to jeopardize your enterprise. Platforms CloudShield’s CS-4000 Trusted Network Security Platform addresses the shortcomings of a network equipment market dominated by closed, fixed-function appliances. Architected for flexibility, the CS-4000 platform is an adaptable, active network device that combines
  • 2. CloudShield’s patented L7 packet processing capabilities together with general purpose computing for scalable, flexible performance. CloudShield has leveraged IBM’s Blade Open Specification to implement its advanced packet processing architecture on IBM’s industry- leading bladed solution, the IBM BladeCenter®. The IBM BladeCenter is a highly integrated, flexible, and reliable system comprised of blade servers, storage, management, and networking options that help reduce management complexity while increasing performance and energy efficiency. By leveraging the IBM BladeCenter H for datacenter environments and the IBM BladeCenter HT for demanding telecommunications environments, companies have greater deployment flexibility to adapt to requirements for scalability and convergence of security services. Security Foundation Adversaries are persistent. If they can’t succeed on one path, they’ll try elsewhere until they finally breach network defenses. Don’t assume that you can protect a valuable network if the foundation upon which it is built can be compromised. The CloudShield platform has been architected and validated by the most demanding pool of security organizations and it is accredited in EAL4+ and DCID 6/3 PL4 environments. To help ensure that your company’s critical infrastructure solutions are secure and robust, the CS-4000 is hardened against attack, both at the operating system and with physical security countermeasures protecting the system itself. The CloudShield CS-4000 is a cyber assurance platform available for securing your infrastructure and protecting high value data. Analytics and Experience SAIC’s Center of Excellence for Cybersecurity, comprised of more than 600 information assurance specialists and engineers, provides full-spectrum security services and carrier-grade solutions for commercial and government clients worldwide. McAfee customers without dedicated resources or expertise can leverage SAIC’s security engineering operations and managed security services through a world-class security operations center monitoring thousands of security devices across dozens of customers. SAIC’s advanced forensics and analytics, based on decades of successful programs deployed, across government agencies help enterprises adapt security for advanced attacks. Realized Operational Benefits “Intelligently Adapt”is a concept that promotes awareness and enables rapid response to network threats. It provides the basis to evolve an enterprise’s security posture to a higher, more secure level. The benefits not only include a more robust ability to detect and react to threats but also a blueprint for a more efficient security infrastructure. Highly-flexible packet processing capabilities that can intelligently intercept, re-route, and mitigate traffic while making decisions on the fly, in real-time—provides for more efficiency for CPU cycles that are spent analyzing traffic easily tagged for specific actions (detect, stop or analyze). Front end analytics can also enable smart packet capture activity, a major benefit in efficient and effective forensic activity. CloudShield offers a powerful advantage to security independent software vendors—allowing them to quickly integrate and adapt their solutions for scalable and trusted cyber solutions. With the latest multi-core processing technologies on the market and zero to limited development impact, ISVs can rapidly deploy across the most sophisticated enterprise networks. CloudShield’s PN41 for IBM BladeCenter allows CIO’s and CISO’s to significantly reduce security appliance sprawl and lengthy hardware refresh models. It minimizes connection management overhead while providing a software-based consolidation approach for efficiently handling“defense in depth”of security to protect business critical information and services. In addition, this approach offers IT professionals an open environment to work with SAIC, CloudShield and our ISV partners in selecting the right security applications and capabilities that your network demands. CloudShield World Headquarters 212 Gibraltar Drive Sunnyvale, CA 94089 tel: 408.331.6640 fax: 408.331.6742 email: info@cloudshield.com Visit us online at cloudshield.com © SAIC 2011. All rights reserved. BladeCenter is a registered trademark of IBM Corp. in the United States and/or other countries.