Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Raytheon And SafeNet Team To Deliver Next Generation Malware Detection Technology

Raytheon Company has entered into an exclusive licensing agreement with SafeNet, Inc., a global leader in information security, to market RShield, Raytheon's advanced malware detection product.

Traditional malware detection solutions such as antivirus, spam gateways and firewalls, have failed to address sophisticated, socially engineered, polymorphic, zero-day attacks. As a result, attacks of this nature have eroded the perimeter security of many high-value networks, such as those within the government and industry. RShield was designed for large enterprise deployments, with scalability, to address these types of targeted attacks.

"In just the past few months, the industry has seen a significant evolution in the threat landscape," said Steve Hawkins, vice president of Raytheon's Intelligence and Information Systems' Information Security Solutions business. "Organizations with the most sensitive data are being strategically targeted. We chose SafeNet to help market RShield because of the company's long track record of protecting data for the most security-conscious entities."

RShield analyzes email attachments and embedded URLs by rapidly routing email to virtualized "detection farms" where it is opened and observed for malicious activity. RShield has detected and stopped thousands of attacks including numerous zero-day attacks -- attacks that would have evaded firewalls, desktop anti-virus and other conventional security solutions.

"Cyber threats have evolved from mass exploits to extremely targeted and persistent attacks," said Chris Fedde, president and chief executive officer, SafeNet.

"Cybersecurity requires a layered approach to protect data throughout its entire lifecycle and secures organizations from known and unknown threats. Raytheon's RShield is a critical part of this layered approach and is central to our larger vision of advancing cybersecurity into the cloud and the highly mobile environments of the future."

Related Stories

Related Reading

More Insights

Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013

TechWeb Careers