Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/21/2020
09:55 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Smarsh Acquires Entreda, Leader in Cybersecurity Risk & Compliance Software for Wealth Management Industry

Smarsh to Expand Product Offerings to Encompass Award-Winning Cybersecurity Risk and Compliance Solutions.

PORTLAND, Ore. & SANTA CLARA, Calif. – May 21, 2020 – Smarsh®, helping customers get ahead – and stay ahead – of the risk within their electronic communications, today announced the acquisition of Entreda, the award-winning developer of integrated cybersecurity risk and compliance management software and services for the wealth management market. Entreda will continue to operate under its own brand and under the leadership of Co-Founder and CEO Sid Yenamandra, as a stand-alone, wholly owned subsidiary of Smarsh. The acquisition enables Smarsh to provide industry-leading enterprise cybersecurity risk and compliance capabilities to broker-dealers, registered investment advisors (RIAs) and banks, at a time when cyber risk mitigation is becoming a key ingredient of a company’s overall risk management strategy.

“In the past few months, more and more companies have asked for our help in addressing the regulatory, compliance and cybersecurity risks associated with the move to long-term remote-work models and the expanded use of mobile and collaborative communications technology, such as Microsoft Teams, Slack and Zoom,” said Brian Cramer, CEO at Smarsh. “They are seeking smarter integrations, highly responsive service and support, as well as enterprise-level solutions that assist in the capture and supervision of these additional platforms. With the acquisition, Smarsh can now offer our customers cutting-edge device, network and user level cybersecurity risk and compliance management capabilities.”

Entreda’s nearly 300 clients comprise some of the top RIAs and broker-dealers in the industry, including Advisor Group, a wealth management firm with over 11,000 independent financial advisors.

“Both Entreda and Smarsh are considered leaders in their respective categories and are part of Advisor Group’s CyberGuard Program,” said Jason Lish, Chief Security, Privacy and Data Officer for Advisor Group. “This combination makes it easier for risk professionals to protect and supervise digital communications as well as advisor systems as the industry deals with escalating cyber threats.”

Mr. Yenamandra said, “Entreda is thrilled to join Smarsh, a proven technology leader and brand for the financial services industry. Our transaction with Smarsh provides us with growth resources and investment capital to accelerate our product innovation, while reinforcing the capabilities that have enabled us to deliver an exceptional service experience to clients across the wealth management space. Our customers should be confident that it remains business as usual in how they interact and engage with Entreda and look forward to the many exciting product enhancements and new solutions that we can roll out, more expeditiously than ever, in partnership with Smarsh.”

Smarsh has been named as a leader in the Gartner Magic Quadrant for Enterprise Information Archiving in each of the past five years and was positioned furthest in vision and highest in execution in 2019. Entreda won the 2019 Wealth Management Industry Award for Cybersecurity and holds most market share in cybersecurity software solutions, according to the 2020 T3/Inside Information survey, which polled more than 5,000 financial advisors. The complementary offerings of Entreda and Smarsh are both featured within the Preferred Pricing Program from the Financial Industry Regulatory Authority (FINRA). For more information, please visit www.smarsh.com and www.entreda.com.

About Smarsh
Smarsh helps financial services organizations get ahead – and stay ahead – of the risk within their electronic communications. Smarsh has established the industry standard for the efficient review and production of content from the diverse range of channels that organizations now use to communicate. With innovative capture, archiving and monitoring solutions that extend across the industry’s widest breadth of channels, customers can leverage the productivity benefits of email, social media, mobile/text messaging, instant messaging/collaboration, websites and voice, while efficiently strengthening their compliance and e-discovery initiatives. A global client base, including the top 10 banks in the United States and the largest banks in Europe, Canada and Asia, manages billions of conversations each month with the Smarsh Connected Suite. The company is headquartered in Portland, Oregon with nine offices worldwide, including locations in Silicon Valley, New York, London and Bangalore, India. For more information, visit www.smarsh.com.

About Entreda
Founded in 2011 with offices in Santa Clara, California, Entreda is the leading provider of comprehensive cybersecurity software, systems and training to the wealth management industry. Entreda developed its award-winning CyberRisk number platform, Unify, to help regulated industries monitor and protect client information and assets with the highest standards of security. Entreda was co-founded by Sid Yenamandra and its senior leadership team has over 100 years of combined experience in cybersecurity technology and 40 years of combined experience in the financial services (RIAs and broker dealers). For more information, visit www.entreda.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27743
PUBLISHED: 2020-10-26
libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAND_bytes()/RAND_pseudo_bytes(). This could lead to use of a non-random/predictable session_id.
CVE-2020-1915
PUBLISHED: 2020-10-26
An out-of-bounds read in the JavaScript Interpreter in Facebook Hermes prior to commit 8cb935cd3b2321c46aa6b7ed8454d95c75a7fca0 allows attackers to cause a denial of service attack or possible further memory corruption via crafted JavaScript. Note that this is only exploitable if the application usi...
CVE-2020-26878
PUBLISHED: 2020-10-26
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
CVE-2020-26879
PUBLISHED: 2020-10-26
Ruckus vRioT through 1.5.1.0.21 has an API backdoor that is hardcoded into validate_token.py. An unauthenticated attacker can interact with the service API by using a backdoor value as the Authorization header.
CVE-2020-15272
PUBLISHED: 2020-10-26
In the git-tag-annotation-action (open source GitHub Action) before version 1.0.1, an attacker can execute arbitrary (*) shell commands if they can control the value of [the `tag` input] or manage to alter the value of [the `GITHUB_REF` environment variable]. The problem has been patched in version ...