Resource Center
Browse the SAIC Resource Center to find informative whitepapers, presentations, and other materials from SAIC’s industry experts. Register today to access these documents.
TREND Enterprise Network Cybersecurity
Transparent Real-Time Enterprise Network Defense using CloudShield's trusted, multi-bladed platforms for deep packet processing.
McAfee's Network Threat Response on CloudShield's CS-4000
Zero in on advanced, persistent malware inside your network.
DNS Defender CloudShield
Protect your DNS Infrastructure, Cut Costs and Drive New Monies
Trusted Insight
SAIC's cybersecurity offerings deliver smart, cost-effective solutions tailored to your needs and threat profile. We protect the nation's critical systems from cyber attacks with proven solutions in real time.
Modeling and Simulation + Cyber
Infusing proven tactical and campaign modeling with cyber expertise
Cyber Defense Solutions
SAIC's proven people, processes, and technology enable our customers to trust us to secure essential commercial, government, and defense cyber assets.
Don't Let Hackers Turn Off the Lights
Helping to secure our nation's critical infrastructures.
Security Content Automation Protocol (SCAP) Testing
Security Content Automation Protocol (SCAP) is a suite of selected (and combined) open standards.
Nuclear Cybersecurity Solutions
SAIC combines a suite of capabilities that enable our solution team to deliver absolute protection of critical infrastructure within the nuclear plant environment.
CloudSentry® Solution Brief
Active threat intelligence on proven cybersecurity platforms.
Cyber Workforce Modernization
SAIC's cyber training solutions help advance professional cyber skills and develop the next generation of cyber warriors.
Big Data Meets Real-Time Processing in the Cloud
SAIC's real-time, cloud-based analytic platform capability enables your organization to access and visualize big data rapidly to drive timely, informed decisions.
Intelligently Adapt: A New Security Approach
The SAIC-McAfee Team offers carrier class cybersecurity solutions and services to adapt to changing threats.
Automated Behavior Analysis
Automated Behavior Analysis provides a paradigm shift in threat prediction and detection.
CloudShield CS-4000
Multi-function platform for controlling and securing next generation services.
Enterprise Network Security
Real-time enterprise network defense using CloudShield technologies
Underground Economies
Explore how intellectual capital and sensitive corporate data are now the latest cybercrime currency in this report jointly authored by SAIC and McAfee.
Instruction, Exercise, Competition and Certification: The Cyber Defense Training Continuum
Training students in cyber defense requires an educational model that includes instruction, exercise, competition and certification.
CyberNEXS Global Services
A new cyber training, exercising, competition and certification product for protecting your critical data assets.
Master Information Management
This white paper proposes an information life-cycle management strategy called Master Information Management (MIM), which is designed to enhance the legal discovery process and reduce the spiraling cost and risk associated with unstructured information retention and discovery.
Validation Oversight Review Process
This paper outlines the process for a common criteria validation using the Validation Oversight Review (VOR) process introduced by the National Information Assurance Partnership. The paper also addresses the change from Common Criteria v2.3 to v3.1 r2.
Strengthening the Weakest Link: Organizational Cyber-Defense Training
With the cyber threat increasing, we need a meaningful way to train, and certify, the level of cyber competency. A cyber-defense curriculum and live-fire trainers that quantify a student's performance are essential to the survival of our "Information Age" critical assets.
Digital Signature Assurance and the Digital Chain of Evidence
Download this white paper to learn about this neutral methodology and reference architecture for assessing the level of reliability of digitally signed records.
Building A Cyber Supply Chain Assurance Reference Model
Fusing the cybersecurity and supply chain risk management fields for better command and control over critical information infrastructure.
Contact Us Today
For more information about our business solutions and capabilities, please contact us today.
Share This Page
Share this page with others! Email it to a friend, post to your blog, or submit to social websites using the link below.








