Raja Patel

Raja Patel is a vice president general manager of corporate security products at McAfee. He is responsible for defining and executing the strategic direction for McAfee's corporate products portfolio, which includes solutions for endpoint security, advanced threat detection, security and event management, and cloud security. Patel leads strategy, product management, & user experience teams responsible for building security solutions for the corporate products group.

Prior to this role, Patel was general manager for the network security business unit, within Intel. Patel joined Intel from Cisco where he led its cloud security services business, with a focus on content security, threat intelligence and advanced threat solutions.

Patel also held other senior positions at Cisco, including strategy development across the enterprise networking portfolio, product management for its integrated services routing portfolio, overseeing development, go-to-market and lifecycle management for a broad range of hardware and software offerings.

Prior to Cisco, Patel worked in business development, application and flight test engineering at Honeywell.

Patel holds a bachelor's degree in aerospace engineering with a minor in mathematics from Embry-Riddle Aeronautical University in Prescott, Arizona, and an MBA degree in global management from the University of Phoenix.
As enterprises continue their journey to the cloud, many are using a hybrid model that engages both the private and public cloud.  McAfee has embraced this “hybrid cloud” strategy to enable companies to migrate to the public cloud, and we are investing in the tools and relationships to enable the transition. Working with Amazon Web ...
Read Blog
At some point as a child, a parent likely told you, “actions speak louder than words.” It’s a good life lesson—and it can hold just as true when fighting malware. Cybercriminals have become extremely skilled at disguising the true nature of malware attacks. The best way to protect your users is to employ a layered ...
Read Blog
There has been a lot of press articles recently with titles like “Robots are Coming for Your Job” and “Will Artificial Intelligence Be the Fall of Humankind?”, etc.  Most predictions of the future inevitably turn out to be wrong (or, as Yogi Berra said, “The future isn’t what it used be.”). Science fiction aside, there ...
Read Blog
The Software Defined Data Center (SDDC) has fundamentally changed how IT delivers infrastructure and services. SDDC rethinks traditional ways of using virtualized resources by adding virtual networks (SDN) and virtualized storage (SDS) to virtual compute as a better way to build data centers, improve security and keep costs down. The included automation and orchestration of ...
Read Blog
As a pilot, flying an aircraft, visibility is fundamental.  In cyber security, our needs are just as fundamental: You can’t protect what you can’t see. In the past, we relied on visibility and controls at the edge of the network – the perimeter. But today, that perimeter is dissolving, and fast. We live in a ...
Read Blog
Traditional IT security solutions need modifications to successfully defend critical infrastructure on tomorrow's cyber battlefields. There has recently been a great amount of discussion regarding critical infrastructure and its inherent security vulnerabilities. Critical infrastructure primarily comprises aging supervisory control and data acquisition (SCADA) and industrial control systems (ICS), which are far more pervasive than most ...
Read Blog
Learning more about your attackers helps to improve your security profile and reduce the possibility of a breach. Sophisticated criminals using advanced techniques are behind most of the recent security breaches, targeting small network openings and user weaknesses left vulnerable by even the latest shiny new technology. The painful reality is that security operations are ...
Read Blog
As-a-service models offer huge opportunities, but also complicate security. Sometimes the easiest way to migrate to a new architectural modelis to let others do the work, others who are experts in their field. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While ...
Read Blog