Threat Intelligence

11/14/2017
09:00 AM
50%
50%

ADT Expands Cybersecurity Business with Purchase of Datashield

Home and business security giant launches ADT Cybersecurity to offer managed detection and response (MDR) service.

Physical security firm ADT today announced its purchase of managed detection and response services company Datashield in a bid to expand its cybersecurity services business for large enterprises and mid-sized companies.

As part of the acquisition, ADT is launching the new ADT Cybersecurity group, which will house Datashield's real-time forensic MDR service as well as ADT's existing network, router and firewall security services business, says Michael Malone, Datashield CEO and ADT's senior vice president of ADT Cybersecurity.

ADT also anticipates adding more cybersecurity offerings to its new group in the coming year, says Malone.

"We can do 24/7 forensics and full-packet capture on the network," Malone says. The new MDR service takes an estimated 15 hours from the time of a compromise to discovery, he says, a process that has shrunk 24 hours and is substantially less than the industry's median time of 80 days.

"Our assumption is attackers are going to get in, but if they do we will stop the attack before it's a big breach," Malone says. "With our technology, we see the entire network, and with full-packet capture we can see what they are trying to take."

Merging into One

The two companies initially met to discuss a potential ADT investment into Datashield back in the May-June timeframe, but those talks soon transitioned into a buyout offer after ADT became interested in MDR technology, Malone recalls.

"Our goal is to provide ADT customers with the most comprehensive security solution to protect their business, and in today's world, this not only means their physical premise, but also their network," Timothy Whall, ADT CEO, said in a statement.

Gartner predicts that approximately 20% of mid-market and enterprise companies will use MDR services by 2020, up from 1% in 2016.

Malone predicts that Datashield competitors Dell SecureWorks, eSentire, and others may find themselves entertaining potential mergers, or some form of business relationship, with brick and mortar security companies in the future.

"Our deal may raise a lot of eyebrows and get people thinking," Malone explains.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Researchers Offer a 'VirusTotal for ICS'
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.