Threat Intelligence

11/14/2017
09:00 AM
50%
50%

ADT Expands Cybersecurity Business with Purchase of Datashield

Home and business security giant launches ADT Cybersecurity to offer managed detection and response (MDR) service.

Physical security firm ADT today announced its purchase of managed detection and response services company Datashield in a bid to expand its cybersecurity services business for large enterprises and mid-sized companies.

As part of the acquisition, ADT is launching the new ADT Cybersecurity group, which will house Datashield's real-time forensic MDR service as well as ADT's existing network, router and firewall security services business, says Michael Malone, Datashield CEO and ADT's senior vice president of ADT Cybersecurity.

ADT also anticipates adding more cybersecurity offerings to its new group in the coming year, says Malone.

"We can do 24/7 forensics and full-packet capture on the network," Malone says. The new MDR service takes an estimated 15 hours from the time of a compromise to discovery, he says, a process that has shrunk 24 hours and is substantially less than the industry's median time of 80 days.

"Our assumption is attackers are going to get in, but if they do we will stop the attack before it's a big breach," Malone says. "With our technology, we see the entire network, and with full-packet capture we can see what they are trying to take."

Merging into One

The two companies initially met to discuss a potential ADT investment into Datashield back in the May-June timeframe, but those talks soon transitioned into a buyout offer after ADT became interested in MDR technology, Malone recalls.

"Our goal is to provide ADT customers with the most comprehensive security solution to protect their business, and in today's world, this not only means their physical premise, but also their network," Timothy Whall, ADT CEO, said in a statement.

Gartner predicts that approximately 20% of mid-market and enterprise companies will use MDR services by 2020, up from 1% in 2016.

Malone predicts that Datashield competitors Dell SecureWorks, eSentire, and others may find themselves entertaining potential mergers, or some form of business relationship, with brick and mortar security companies in the future.

"Our deal may raise a lot of eyebrows and get people thinking," Malone explains.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
8 Ways Hackers Monetize Stolen Data
Steve Zurier, Freelance Writer,  4/17/2018
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Sara Peters, Senior Editor at Dark Reading,  4/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.