Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

9/22/2020
04:55 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Secureworks Completes Acquisition of Delve Laboratories, Inc.

SaaS solution expands Secureworks' software portfolio with vulnerability management capabilities.

ATLANTA, Sept. 22, 2020 (GLOBE NEWSWIRE) -- Secureworks® (NASDAQ:SCWX), a leader in software-driven security solutions, today announced it has completed the acquisition of Delve.

Delve’s SaaS solution uses artificial intelligence (AI) and machine learning to automate vulnerability detection and prioritization across an organization's network, endpoint or cloud environment, providing CISOs, CIOs and IT Security departments accurate and prioritized insights to protect themselves against adversaries.

Secureworks plans to integrate vulnerability discovery and prioritization technology into new offerings within its cloud-based portfolio, including its Red Cloak Platform and Threat Detection and Response (TDR) application, expanding visibility and insights for users.

“We’re bringing Delve into Secureworks at a time when we’re accelerating our transformation and have marked momentum for our software solutions,” said Michael R. Cote, Chief Executive Officer of Secureworks. “We’re in a position of strength, offering greater value by delivering deeper intelligence, a differentiated end-to-end experience, and a collaborative community built to protect our customers as they digitally transform.”

"Secureworks’ acquisition of Delve is a good pivot from detection/response to cyber-risk assessment and security validation to complete the circle as Secureworks transforms to a software company,” said Jon Oltsik, Senior Principal Analyst & ESG Fellow, ESG.

The Delve Solution will be available to Secureworks customers by the end of the Company’s fiscal quarter. With the acquisition, Secureworks also grows its channel partner and direct sales footprint in Canada.

About Secureworks 
Secureworks® (NASDAQ:SCWX) a global cybersecurity leader, enables our customers and partners to outpace and outmaneuver adversaries with more precision, so they can rapidly adapt and respond to market forces to meet their business needs. With a unique combination of cloud-native, SaaS security platform and intelligence-driven security solutions, informed by 20+ years of threat intelligence and research, no other security platform is grounded and informed with this much real-world experience.

Contact: 
Ashley Vandiver
[email protected]
[email protected]
+1 404-432-8657

Visit Secureworks.com

Connect with Secureworks via Twitter, LinkedIn and Facebook 
Read the Secureworks Blog 

Special Note Regarding Forward-Looking Statements

This press release contains forward-looking statements within the meaning of Section 21E of the Securities Exchange Act of 1934 and Section 27A of the Securities Act of 1933 and are based on Secureworks' current expectations. In some cases, you can identify these statements by such forward-looking words as “anticipate,” “believe,” “confidence,” “could,” “estimate,” “expect,” “guidance,” “intend,” “may,” “plan,” “potential,” “outlook,” “should,” “will” and “would,” or similar words or expressions that refer to future events or outcomes. Because forward-looking statements inherently involve risks and uncertainties, actual future results may differ materially from those expressed or implied by such forward-looking statements. These risks and uncertainties include, but are not limited to, competitive uncertainties and general economic and business conditions in Secureworks' markets as well as the other risks and uncertainties that are described in Secureworks' periodic reports and other filings with the Securities and Exchange Commission, which are available for review through the Securities and Exchange Commission's website at www.sec.gov. Any forward-looking statement speaks only as of the date as of which such statement is made, and, except as required by law, we undertake no obligation to update any forward-looking statement after the date as of which such statement was made, whether to reflect changes in circumstances or our expectations, the occurrence of unanticipated events, or otherwise. Any future product, service, feature, benefit or related specification referenced in this press release are for information purposes only and are not commitments to deliver any technology or enhancement.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.