Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

9/22/2020
04:55 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Secureworks Completes Acquisition of Delve Laboratories, Inc.

SaaS solution expands Secureworks' software portfolio with vulnerability management capabilities.

ATLANTA, Sept. 22, 2020 (GLOBE NEWSWIRE) -- Secureworks® (NASDAQ:SCWX), a leader in software-driven security solutions, today announced it has completed the acquisition of Delve.

Delve’s SaaS solution uses artificial intelligence (AI) and machine learning to automate vulnerability detection and prioritization across an organization's network, endpoint or cloud environment, providing CISOs, CIOs and IT Security departments accurate and prioritized insights to protect themselves against adversaries.

Secureworks plans to integrate vulnerability discovery and prioritization technology into new offerings within its cloud-based portfolio, including its Red Cloak Platform and Threat Detection and Response (TDR) application, expanding visibility and insights for users.

“We’re bringing Delve into Secureworks at a time when we’re accelerating our transformation and have marked momentum for our software solutions,” said Michael R. Cote, Chief Executive Officer of Secureworks. “We’re in a position of strength, offering greater value by delivering deeper intelligence, a differentiated end-to-end experience, and a collaborative community built to protect our customers as they digitally transform.”

"Secureworks’ acquisition of Delve is a good pivot from detection/response to cyber-risk assessment and security validation to complete the circle as Secureworks transforms to a software company,” said Jon Oltsik, Senior Principal Analyst & ESG Fellow, ESG.

The Delve Solution will be available to Secureworks customers by the end of the Company’s fiscal quarter. With the acquisition, Secureworks also grows its channel partner and direct sales footprint in Canada.

About Secureworks 
Secureworks® (NASDAQ:SCWX) a global cybersecurity leader, enables our customers and partners to outpace and outmaneuver adversaries with more precision, so they can rapidly adapt and respond to market forces to meet their business needs. With a unique combination of cloud-native, SaaS security platform and intelligence-driven security solutions, informed by 20+ years of threat intelligence and research, no other security platform is grounded and informed with this much real-world experience.

Contact: 
Ashley Vandiver
[email protected]
[email protected]
+1 404-432-8657

Visit Secureworks.com

Connect with Secureworks via Twitter, LinkedIn and Facebook 
Read the Secureworks Blog 

Special Note Regarding Forward-Looking Statements

This press release contains forward-looking statements within the meaning of Section 21E of the Securities Exchange Act of 1934 and Section 27A of the Securities Act of 1933 and are based on Secureworks' current expectations. In some cases, you can identify these statements by such forward-looking words as “anticipate,” “believe,” “confidence,” “could,” “estimate,” “expect,” “guidance,” “intend,” “may,” “plan,” “potential,” “outlook,” “should,” “will” and “would,” or similar words or expressions that refer to future events or outcomes. Because forward-looking statements inherently involve risks and uncertainties, actual future results may differ materially from those expressed or implied by such forward-looking statements. These risks and uncertainties include, but are not limited to, competitive uncertainties and general economic and business conditions in Secureworks' markets as well as the other risks and uncertainties that are described in Secureworks' periodic reports and other filings with the Securities and Exchange Commission, which are available for review through the Securities and Exchange Commission's website at www.sec.gov. Any forward-looking statement speaks only as of the date as of which such statement is made, and, except as required by law, we undertake no obligation to update any forward-looking statement after the date as of which such statement was made, whether to reflect changes in circumstances or our expectations, the occurrence of unanticipated events, or otherwise. Any future product, service, feature, benefit or related specification referenced in this press release are for information purposes only and are not commitments to deliver any technology or enhancement.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Where Are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7747
PUBLISHED: 2020-10-20
This affects all versions of package lightning-server. It is possible to inject malicious JavaScript code as part of a session controller.
CVE-2020-7748
PUBLISHED: 2020-10-20
This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
CVE-2020-7749
PUBLISHED: 2020-10-20
This affects all versions of package osm-static-maps. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page wh...
CVE-2020-5640
PUBLISHED: 2020-10-20
Local file inclusion vulnerability in OneThird CMS v1.96c and earlier allows a remote unauthenticated attacker to execute arbitrary code or obtain sensitive information via unspecified vectors.
CVE-2020-15256
PUBLISHED: 2020-10-19
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and settin...