Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

11/14/2017
09:00 AM
50%
50%

ADT Expands Cybersecurity Business with Purchase of Datashield

Home and business security giant launches ADT Cybersecurity to offer managed detection and response (MDR) service.

Physical security firm ADT today announced its purchase of managed detection and response services company Datashield in a bid to expand its cybersecurity services business for large enterprises and mid-sized companies.

As part of the acquisition, ADT is launching the new ADT Cybersecurity group, which will house Datashield's real-time forensic MDR service as well as ADT's existing network, router and firewall security services business, says Michael Malone, Datashield CEO and ADT's senior vice president of ADT Cybersecurity.

ADT also anticipates adding more cybersecurity offerings to its new group in the coming year, says Malone.

"We can do 24/7 forensics and full-packet capture on the network," Malone says. The new MDR service takes an estimated 15 hours from the time of a compromise to discovery, he says, a process that has shrunk 24 hours and is substantially less than the industry's median time of 80 days.

"Our assumption is attackers are going to get in, but if they do we will stop the attack before it's a big breach," Malone says. "With our technology, we see the entire network, and with full-packet capture we can see what they are trying to take."

Merging into One

The two companies initially met to discuss a potential ADT investment into Datashield back in the May-June timeframe, but those talks soon transitioned into a buyout offer after ADT became interested in MDR technology, Malone recalls.

"Our goal is to provide ADT customers with the most comprehensive security solution to protect their business, and in today's world, this not only means their physical premise, but also their network," Timothy Whall, ADT CEO, said in a statement.

Gartner predicts that approximately 20% of mid-market and enterprise companies will use MDR services by 2020, up from 1% in 2016.

Malone predicts that Datashield competitors Dell SecureWorks, eSentire, and others may find themselves entertaining potential mergers, or some form of business relationship, with brick and mortar security companies in the future.

"Our deal may raise a lot of eyebrows and get people thinking," Malone explains.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19794
PUBLISHED: 2019-12-13
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
CVE-2019-19795
PUBLISHED: 2019-12-13
samurai 0.7 has a heap-based buffer overflow in canonpath in util.c via a crafted build file.
CVE-2019-19796
PUBLISHED: 2019-12-13
Yabasic 2.86.2 has a heap-based buffer overflow in myformat in function.c via a crafted BASIC source file.
CVE-2019-5253
PUBLISHED: 2019-12-13
E5572-855 with versions earlier than 8.0.1.3(H335SP1C233) has an improper authentication vulnerability. The device does not perform a sufficient authentication when doing certain operations, successful exploit could allow an attacker to cause the device to reboot after launch a man in the middle att...
CVE-2019-5260
PUBLISHED: 2019-12-13
Huawei smartphones HUAWEI Y9 2019 and Honor View 20 have a denial of service vulnerability. Due to insufficient input validation of specific value when parsing the messages, an attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices to exploit this vul...