Image of the Resources Center

Resource Center

Browse the SAIC Resource Center to find informative whitepapers, presentations, and other materials from SAIC’s industry experts. Register today to access these documents.


Category   Type



image of TREND Enterprise Network CybersecurityTREND Enterprise Network Cybersecurity

Transparent Real-Time Enterprise Network Defense using CloudShield's trusted, multi-bladed platforms for deep packet processing.

Register Now to Download »


image of McAfeeMcAfee's Network Threat Response on CloudShield's CS-4000

Zero in on advanced, persistent malware inside your network.

Register Now to Download »


image of DNS Defender CloudShieldDNS Defender CloudShield

Protect your DNS Infrastructure, Cut Costs and Drive New Monies

Register Now to Download »


image of Trusted InsightTrusted Insight

SAIC's cybersecurity offerings deliver smart, cost-effective solutions tailored to your needs and threat profile. We protect the nation's critical systems from cyber attacks with proven solutions in real time.

Register Now to Download »


image of Modeling and Simulation + CyberModeling and Simulation + Cyber

Infusing proven tactical and campaign modeling with cyber expertise

Register Now to Download »


image of Cyber Defense SolutionsCyber Defense Solutions

SAIC's proven people, processes, and technology enable our customers to trust us to secure essential commercial, government, and defense cyber assets.

Register Now to Download »


image of DonDon't Let Hackers Turn Off the Lights

Helping to secure our nation's critical infrastructures.

Register Now to Download »


image of Security Content Automation Protocol (SCAP) TestingSecurity Content Automation Protocol (SCAP) Testing

Security Content Automation Protocol (SCAP) is a suite of selected (and combined) open standards.

Register Now to Download »


image of Nuclear Cybersecurity SolutionsNuclear Cybersecurity Solutions

SAIC combines a suite of capabilities that enable our solution team to deliver absolute protection of critical infrastructure within the nuclear plant environment.

Register Now to Download »


image of CloudSentry® Solution BriefCloudSentry® Solution Brief

Active threat intelligence on proven cybersecurity platforms.

Register Now to Download »


image of Cyber Workforce ModernizationCyber Workforce Modernization

SAIC's cyber training solutions help advance professional cyber skills and develop the next generation of cyber warriors.

Register Now to Download »


image of CloudSentry®CloudSentry®

Active Threat Intelligence on proven cybersecurity platforms.

Register Now to Download »


image of Big Data Meets Real-Time Processing in the CloudBig Data Meets Real-Time Processing in the Cloud

SAIC's real-time, cloud-based analytic platform capability enables your organization to access and visualize big data rapidly to drive timely, informed decisions.

Register Now to Download »


image of Intelligently Adapt: A New Security ApproachIntelligently Adapt: A New Security Approach

The SAIC-McAfee Team offers carrier class cybersecurity solutions and services to adapt to changing threats.

Register Now to Download »


image of Automated Behavior AnalysisAutomated Behavior Analysis

Automated Behavior Analysis provides a paradigm shift in threat prediction and detection.

Register Now to Download »


image of CloudShield CS-4000CloudShield CS-4000

Multi-function platform for controlling and securing next generation services.

Register Now to Download »


image of Cyber InvestigationCyber Investigation

Tracking and responding to advanced cyber threats.

Register Now to Download »


image of Enterprise Network SecurityEnterprise Network Security

Real-time enterprise network defense using CloudShield technologies

Register Now to Download »


image of Underground EconomiesUnderground Economies

Explore how intellectual capital and sensitive corporate data are now the latest cybercrime currency in this report jointly authored by SAIC and McAfee.

Register Now to Download »


image of Instruction, Exercise, Competition and Certification: The Cyber Defense Training ContinuumInstruction, Exercise, Competition and Certification: The Cyber Defense Training Continuum

Training students in cyber defense requires an educational model that includes instruction, exercise, competition and certification.

Register Now to Download »


image of CyberNEXS Global ServicesCyberNEXS Global Services

A new cyber training, exercising, competition and certification product for protecting your critical data assets.

Register Now to Download »


image of Master Information ManagementMaster Information Management

This white paper proposes an information life-cycle management strategy called Master Information Management (MIM), which is designed to enhance the legal discovery process and reduce the spiraling cost and risk associated with unstructured information retention and discovery.

Register Now to Download »


image of Validation Oversight Review ProcessValidation Oversight Review Process

This paper outlines the process for a common criteria validation using the Validation Oversight Review (VOR) process introduced by the National Information Assurance Partnership. The paper also addresses the change from Common Criteria v2.3 to v3.1 r2.

Register Now to Download »


image of Strengthening the Weakest Link: Organizational Cyber-Defense TrainingStrengthening the Weakest Link: Organizational Cyber-Defense Training

With the cyber threat increasing, we need a meaningful way to train, and certify, the level of cyber competency. A cyber-defense curriculum and live-fire trainers that quantify a student's performance are essential to the survival of our "Information Age" critical assets.

Register Now to Download »


image of Digital Signature Assurance and the Digital Chain of EvidenceDigital Signature Assurance and the Digital Chain of Evidence

Download this white paper to learn about this neutral methodology and reference architecture for assessing the level of reliability of digitally signed records.

Register Now to Download »


image of Building A Cyber Supply Chain Assurance Reference ModelBuilding A Cyber Supply Chain Assurance Reference Model

Fusing the cybersecurity and supply chain risk management fields for better command and control over critical information infrastructure.

Register Now to Download »


Contact Us Today

For more information about our business solutions and capabilities, please contact us today.

Share This Page

Share this page with others! Email it to a friend, post to your blog, or submit to social websites using the link below.

Share



© Science Applications International Corporation. All rights reserved. This page was printed from www.saic.com.