News Feed Item

Secureworks Innovates Its Advanced Endpoint Threat Detection Solution, Powered By Red CloakTM Technology, to Include Active Threat Hunting

Secureworks® (NASDAQ: SCWX), a leading global cybersecurity company that protects organizations in the digitally connected world, today announced a new service level for its Advanced Endpoint Threat Detection (AETD) solution leveraging its award winning, proprietary Red CloakTM technology. While Secureworks has provided point-in-time Targeted Threat Hunting service since 2013, AETD Elite adds Active Threat Hunting to deliver a comprehensive managed detection, investigation, and response solution that focuses on uncovering cyber threats through a continuous hunting process in collaboration with an organization’s cybersecurity team.

The Secureworks AETD Red Cloak service is supported by Secureworks Counter Threat UnitTM (CTU) researchers, comprising a total of 850 years of security experience, always-on Threat Intelligence (gained from visibility monitoring 330 vendor products), and a Senior Intrusion Analyst (SIA) team specially trained to identify advanced threats. The service provides organizations an early warning that their endpoints may be hosting unauthorized intruders. It also provides high-fidelity visibility to validate true cyber threats. This precision also accelerates response efforts by enabling an organization to eradicate cyber threats much earlier in the cyberattack lifecycle to prevent greater impact. AETD provides actionable guidance on how to remediate threat actors with strategic and tactical remediation efforts. As a result, response efforts can be more targeted, more effective and less costly.

The AETD Elite solution offers all of the benefits of the AETD service, plus Active Threat Hunting by a designated team of seasoned Secureworks threat hunters. These threat hunters, working hand-in-hand with the organization’s in-house cybersecurity team, continually hunt for cyber threats that have evaded other cybersecurity controls. This adds a layer of human intelligence to machine learning and behavior analytics that helps organizations look beyond electronic logs, leveraging expertise to interpret the business-level risk of potential threats and providing the confidence to take the right action. This close relationship with Secureworks’ threat hunters provides an organization’s cybersecurity team with additional insights that can be applied to improve detections and overall cybersecurity operations.

“We have a proven methodology for delivering threat hunting to a variety of customer environments that we’ve been refining over the years consisting of purpose-built technology, strategic and tactical threat intelligence, and hard-to-find analyst expertise,” said Wendy Thomas, Senior Vice President of Strategy and Product Management. “AETD Elite allows us to expand our point-in-time Targeted Threat Hunting service to offer continuous hunting for our clients. This helps our cybersecurity experts establish a deeper understanding of our clients’ environment, resulting in better interpretation of the business risk of potential threats.”

“AETD Elite is infused with high-fidelity CTU countermeasures for identifying adversarial indicators and behaviors that have evaded cybersecurity controls,” continued Thomas. “Machine and human intelligence, derived from Secureworks’ incident response engagements and threat hunting, is continuously synthesized and disseminated to protect all of our 4,400 clients. As such, our threat hunting approach is one of very few available options in the marketplace that emphasizes detecting adversarial behaviors rather than relying on low-fidelity threat indicator matches.”

AETD Elite Benefits:

  • Heightened visibility to see activity from the initial intrusion of an endpoint to lateral movement across the organization
  • Enhanced detections leveraging behavioral analytics and proprietary threat intelligence to help identify threats bypassing other cybersecurity technologies
  • A designated team of Secureworks threat hunters, working in concert with in-house cybersecurity teams, resulting in customized and effective threat hunting experiences
  • Ongoing threat hunting with weekly status reports and calls
  • Accelerated response with critical event escalation, including guidance on how to remediate cyber threats
  • Reduced impact due to identifying affected systems and data more quickly
  • Speed time to protection and reduce Total Cost of Ownership (TCO) with a fully managed and hosted solution

Utilizing Secureworks’ threat intelligence and proprietary Red Cloak technology, Secureworks’ threat hunters are able to identify:

  • When an endpoint cyber intrusion has occurred
  • Which endpoints are impacted
  • Where the cyber threat may have spread throughout the organization
  • What next steps are appropriate for remediation

AETD Elite is available worldwide.

About Secureworks

Secureworks® (NASDAQ: SCWX) is a leading global cybersecurity company that keeps organizations safe in a digitally connected world. We combine visibility from thousands of clients, artificial intelligence and automation from our industry-leading Secureworks Counter Threat Platform™, and actionable insights from our team of elite researchers and analysts to create a powerful network effect that provides increasingly strong protection for our clients. By aggregating and analyzing data from any source, anywhere, we prevent security breaches, detect malicious activity in real time, respond rapidly, and predict emerging threats. We offer our clients a cyber-defense that is Collectively Smarter. Exponentially Safer.™ www.secureworks.com

Special Note Regarding Forward-Looking Statements

Statements in this press release concerning Secureworks’ plans and objectives relating to its capabilities and solutions are forward-looking statements within the meaning of Section 21E of the Securities Exchange Act of 1934 and Section 27A of the Securities Act of 1933 and are based on Secureworks’ current expectations. Because forward-looking statements inherently involve risks and uncertainties, actual future results may differ materially from those expressed or implied by such forward-looking statements. These risks and uncertainties include, but are not limited to, competitive uncertainties and general economic and business conditions in Secureworks’ markets as well as the other risks and uncertainties that are described in Secureworks’ periodic reports and other filings with the Securities and Exchange Commission, which are available for review through the Securities and Exchange Commission’s website at www.sec.gov. Secureworks undertakes no obligation to update any statements in this press release for changes that happen after the date of this release.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of ...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
JETRO showcased Japan Digital Transformation Pavilion at SYS-CON's 21st International Cloud Expo® at the Santa Clara Convention Center in Santa Clara, CA. The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
In this presentation, you will learn first hand what works and what doesn't while architecting and deploying OpenStack. Some of the topics will include:- best practices for creating repeatable deployments of OpenStack- multi-site considerations- how to customize OpenStack to integrate with your existing systems and security best practices.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Archi...
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. ...
"With Digital Experience Monitoring what used to be a simple visit to a web page has exploded into app on phones, data from social media feeds, competitive benchmarking - these are all components that are only available because of some type of digital asset," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abilit...
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.