Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

9/22/2020
04:55 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Secureworks Completes Acquisition of Delve Laboratories, Inc.

SaaS solution expands Secureworks' software portfolio with vulnerability management capabilities.

ATLANTA, Sept. 22, 2020 (GLOBE NEWSWIRE) -- Secureworks® (NASDAQ:SCWX), a leader in software-driven security solutions, today announced it has completed the acquisition of Delve.

Delve’s SaaS solution uses artificial intelligence (AI) and machine learning to automate vulnerability detection and prioritization across an organization's network, endpoint or cloud environment, providing CISOs, CIOs and IT Security departments accurate and prioritized insights to protect themselves against adversaries.

Secureworks plans to integrate vulnerability discovery and prioritization technology into new offerings within its cloud-based portfolio, including its Red Cloak Platform and Threat Detection and Response (TDR) application, expanding visibility and insights for users.

“We’re bringing Delve into Secureworks at a time when we’re accelerating our transformation and have marked momentum for our software solutions,” said Michael R. Cote, Chief Executive Officer of Secureworks. “We’re in a position of strength, offering greater value by delivering deeper intelligence, a differentiated end-to-end experience, and a collaborative community built to protect our customers as they digitally transform.”

"Secureworks’ acquisition of Delve is a good pivot from detection/response to cyber-risk assessment and security validation to complete the circle as Secureworks transforms to a software company,” said Jon Oltsik, Senior Principal Analyst & ESG Fellow, ESG.

The Delve Solution will be available to Secureworks customers by the end of the Company’s fiscal quarter. With the acquisition, Secureworks also grows its channel partner and direct sales footprint in Canada.

About Secureworks 
Secureworks® (NASDAQ:SCWX) a global cybersecurity leader, enables our customers and partners to outpace and outmaneuver adversaries with more precision, so they can rapidly adapt and respond to market forces to meet their business needs. With a unique combination of cloud-native, SaaS security platform and intelligence-driven security solutions, informed by 20+ years of threat intelligence and research, no other security platform is grounded and informed with this much real-world experience.

Contact: 
Ashley Vandiver
[email protected]
[email protected]
+1 404-432-8657

Visit Secureworks.com

Connect with Secureworks via Twitter, LinkedIn and Facebook 
Read the Secureworks Blog 

Special Note Regarding Forward-Looking Statements

This press release contains forward-looking statements within the meaning of Section 21E of the Securities Exchange Act of 1934 and Section 27A of the Securities Act of 1933 and are based on Secureworks' current expectations. In some cases, you can identify these statements by such forward-looking words as “anticipate,” “believe,” “confidence,” “could,” “estimate,” “expect,” “guidance,” “intend,” “may,” “plan,” “potential,” “outlook,” “should,” “will” and “would,” or similar words or expressions that refer to future events or outcomes. Because forward-looking statements inherently involve risks and uncertainties, actual future results may differ materially from those expressed or implied by such forward-looking statements. These risks and uncertainties include, but are not limited to, competitive uncertainties and general economic and business conditions in Secureworks' markets as well as the other risks and uncertainties that are described in Secureworks' periodic reports and other filings with the Securities and Exchange Commission, which are available for review through the Securities and Exchange Commission's website at www.sec.gov. Any forward-looking statement speaks only as of the date as of which such statement is made, and, except as required by law, we undertake no obligation to update any forward-looking statement after the date as of which such statement was made, whether to reflect changes in circumstances or our expectations, the occurrence of unanticipated events, or otherwise. Any future product, service, feature, benefit or related specification referenced in this press release are for information purposes only and are not commitments to deliver any technology or enhancement.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We are really excited about our new two tone authentication system!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7335
PUBLISHED: 2020-12-01
Privilege Escalation vulnerability in Microsoft Windows client McAfee Total Protection (MTP) prior to 16.0.29 allows local users to gain elevated privileges via careful manipulation of a folder by creating a junction link. This exploits a lack of protection through a timing issue and is only exploit...
CVE-2020-15257
PUBLISHED: 2020-12-01
containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.3, the containerd-shim API is improperly exposed to host network containers. Access controls for the shim’s API socket verified that...
CVE-2020-9114
PUBLISHED: 2020-12-01
FusionCompute versions 6.3.0, 6.3.1, 6.5.0, 6.5.1 and 8.0.0 have a privilege escalation vulnerability. Due to improper privilege management, an attacker with common privilege may access some specific files and get the administrator privilege in the affected products. Successful exploit will cause pr...
CVE-2020-9117
PUBLISHED: 2020-12-01
HUAWEI nova 4 versions earlier than 10.0.0.165(C01E34R2P4) and SydneyM-AL00 versions earlier than 10.0.0.165(C00E66R1P5) have an out-of-bounds read and write vulnerability. An attacker with specific permissions crafts malformed packet with specific parameter and sends the packet to the affected prod...
CVE-2020-4126
PUBLISHED: 2020-12-01
HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later.