Secureworks

Last updated
Secureworks Inc.
Type Public subsidiary
Industry Cybersecurity
Headquarters,
U.S.
Area served
  • North America
  • Europe
  • Middle East
  • Asia
  • Africa
  • South America
Key people
ProductsSecureworks Taegis XDR, Secureworks Taegis ManagedXDR
RevenueDecrease2.svgUS$463 million (2023)
Decrease2.svgUS$−148 million (2023)
Decrease2.svgUS$−114 million (2023)
Total assets Decrease2.svgUS$841 million (2023)
Total equity Decrease2.svgUS$558 million (2023)
Number of employees
2,149 (2023)
Parent Dell Technologies (82.6%)
Website secureworks.com
Footnotes /references
Financials as of February 3,2023 [1]

Secureworks Inc. is an American cybersecurity company. The company has approximately 4,000 customers in more than 50 countries, [2] ranging from Fortune 100 companies to mid-sized businesses in a variety of industries. [3]

Contents

It became part of Dell Technologies in February 2011 and was later the subject of an IPO to again become a publicly traded company in April 2016. [4] It is still majority-owned by Dell. [1] :15

History

Secureworks was founded as a privately held company in 1998 [5] by Michael Pearson and Joan Wilbanks. In 2002, Michael R. Cote became President and CEO. In 2005, and again in 2006, the company was named to the Inc. 500 and Inc. 5000 lists [6] 2006 [7] and Deloitte’s Fast 500. [8]

In 2006, Secureworks merged with LURHQ Corporation and the new entity continued under the Secureworks corporate name. [9] LURHQ was founded in 1996 in Myrtle Beach, SC and provided managed security services to large enterprises. [10] With the merger, Secureworks was able to leverage Sherlock, LURHQ's portal, to unify its combined customer base onto a single integrated security management platform. [10]

In 2009, Secureworks acquired the Managed Security Services (MSS) business from VeriSign, Inc. and grew to more than 500 employees worldwide. [11] The acquisition expanded its clients to approximately 2,600 in more than 50 countries, including the United Kingdom, Saudi Arabia, Taiwan, Finland, Spain, Brazil and Mexico. This includes four of the Fortune 10.

In December 2009, Secureworks acquired managed security and consulting firm dns Limited. [12] [13] This acquisition expanded Secureworks' operation to include a UK-based operations center and additional offices in London and Edinburgh. [14]

On January 4, 2011, Dell announced that it would acquire Secureworks to be part of Dell Services. Dell Secureworks officially began operating as a Dell subsidiary on February 7, 2011. [15]

Dell Secureworks expanded into Australia and New Zealand region in 2013. [16] Dell Secureworks opened an operations center in Sydney to meet demands from local Australia businesses, the most in demand services in this area being Penetration Testing, forensic investigations and ongoing monitoring of environments for attacks. [17]

On December 17, 2015, Secureworks filed to go public. [18] [19] Subsequently, on April 22, 2016, announced its IPO, raising $112 million after pricing its IPO at $14 per share. However, the company was expecting the initial price to be between $15.50-$17.50. This was the first tech IPO in the U.S. in 2016. [20] In August 2017, Secureworks rebranded its logo and changed capitalization of the 'W' in its name to lower case.

In an evolution of its long standing business of selling Managed Security Services (MSSP), in April 2019, Secureworks announced the availability of Red Cloak Threat Detection and Response a cloud based, SaaS next-generation SIEM product designed to analyse, detect, investigate and respond to malicious threats across an organizations endpoints, network and cloud environment. [21] As of June 2020, [22] the company reported 40% Annual Recurring Revenue growth from its SaaS solution.

Along with 20 other cyber security software providers, Secureworks took part in the MITRE ATT&CK Endpoint Protection Product Evaluation. MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. Secureworks Red Cloak Threat Detection and Response was 100% successful at detecting activity for the Persistence, Privilege Escalation, Discovery and Lateral Movement tactics and techniques, which underscores Secureworks’ ability to detect attacks early in the kill chain. Red Cloak TDR had telemetry visibility across the MITRE ATT&CK Framework and was able to capture attacker activity during each step of the evaluation, as well as provide visibility or generated detections across 90% of technique categories used in the evaluation [23]

May 21, 2020 Secureworks signaled a shift away from a primarily direct go to market model to a channel focused business model with the announcement of the Secureworks Global Partner Program, designed to attract and reward resellers and referral partners who sell Secureworks software. [24]

On September 3, 2021, Wendy K. Thomas became President and CEO of Secureworks following the retirement of Michael R. Cote. [25]

Accolades

Counter Threat Unit

The Secureworks Counter Threat Unit (CTU) monitors, tracks, and analyzes threat vulnerabilities of its global client base. [29] [30]

In May 2020, the Secureworks Counter Threat Unit (CTU) research team began publishing Threat Group profiles on the Secureworks website. Threat Groups are "intrusion sets" or "clusters of observed activity"; that exist in cyberspace; attempt to cause harm to organizations or businesses.

The published Threat Group profiles include a summary of the groups, their objectives, other aliases by which the groups are known, and the malware they use. Both criminal and government-sponsored Threat Groups are included.

Related Research Articles

<span class="mw-page-title-main">Verisign</span> American Internet company

Verisign Inc. is an American company based in Reston, Virginia, United States, that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the authoritative registry for the .com, .net, and .name generic top-level domains and the .cc country-code top-level domains, and the back-end systems for the .jobs and .edu sponsored top-level domains.

<span class="mw-page-title-main">Mitre Corporation</span> American not-for-profit corporation

The Mitre Corporation is an American not-for-profit organization with dual headquarters in Bedford, Massachusetts, and McLean, Virginia. It manages federally funded research and development centers (FFRDCs) supporting various U.S. government agencies in the aviation, defense, healthcare, homeland security, and cybersecurity fields, among others.

<span class="mw-page-title-main">Trend Micro</span> Japanese multinational cyber security company

Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.

Panda Security is a Spanish cybersecurity software company. Panda Security's core offering is an antivirus software and more recently has expanded into providing and developing cybersecurity software. This includes security products and services for both businesses and home users, as well as protection tools for systems, networks, emails, and other private information. Panda Security employs around 458 people.

Fortinet is a cybersecurity company with headquarters in Sunnyvale, California. The company develops and sells security solutions like firewalls, endpoint security and intrusion detection systems. Fortinet has offices located all over the world.

Qualys, Inc. is an American technology firm based in Foster City, California, specializing in cloud security, compliance and related services.

<span class="mw-page-title-main">Splunk</span> American technology company

Splunk Inc. is an American software company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated data via a web-style interface.

An advanced persistent threat (APT) is a stealthy threat actor, typically a state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals.

Veracode is an application security company based in Burlington, Massachusetts. Founded in 2006, it provides SaaS application security that integrates application analysis into development pipelines.

ExtraHop is a cybersecurity company providing AI-based network intelligence that stops advanced threats across cloud, hybrid, and distributed environments.

Trustwave Holdings is an American standalone business unit cybersecurity independent subsidiary and brand of multinational telecommunications company Singtel Group Enterprise. It focuses on providing managed detection and response (MDR), managed security services (MSS), database security, and email security to organizations around the globe.

<span class="mw-page-title-main">Palo Alto Networks</span> American technology company

Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. It is a partner organization of the World Economic Forum.


AT&T Cybersecurity is a managed security service provider for network security, extended detection and response, and endpoints. From traditional computing to edge computing, the company focuses on providing strategic services to customers. AT&T Cybersecurity also offers consulting services that are product neutral.

Lastline, Inc. is an American cyber security company and breach detection platform provider based in Redwood City, California. The company offers network-based security breach detection and other security services that combat malware used by advanced persistent threat (APT) groups for businesses, government organizations and other security service providers. Lastline has offices in North America, Europe, and Asia.

Absolute Software Corporation is an American-Canadian company that provides products and services in the fields of endpoint security and zero trust security. It was publicly traded company on the Toronto Stock Exchange (TSX) and Nasdaq until it was acquired by Crosspoint Capital Partners in July 2023.

CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in investigations of several high-profile cyberattacks, including the 2014 Sony Pictures hack, the 2015–16 cyber attacks on the Democratic National Committee (DNC), and the 2016 email leak involving the DNC.

<span class="mw-page-title-main">Anomali</span> American cybersecurity company

Anomali Inc. is an American cybersecurity company that develops and provides threat intelligence products. In 2023, the company moved into providing Security Analytics powered by AI.

Endpoint detection and response (EDR), also known as endpoint threat detection and response (ETDR), is a cybersecurity technology that continually monitors an "endpoint" to mitigate malicious cyber threats.

Extended detection and response (XDR) is a cybersecurity technology that monitors and mitigates cyber security threats.

Identity threat detection and response (ITDR) is a cybersecurity discipline that includes tools and best practices to protect identity management infrastructure from attacks. ITDR can block and detect threats, verify administrator credentials, respond to various attacks, and restore normal operations. Common identity threats include phishing, stolen credentials, insider threats, and ransomware.

References

  1. 1 2 "Secureworks Inc. fiscal 2023 Annual Report (Form 10-K)". 23 March 2023.
  2. "Secureworks Reports Fiscal 2017 Fourth Quarter and Full Year Results". Yahoo Finance. March 29, 2017. Retrieved 2017-04-26.
  3. "Secureworks, Inc., Atlanta, GA United States". Hoovers. Hoover's, Inc. Retrieved 18 March 2011.
  4. Morgan, Steve. "Dell's SecureWorks To IPO Tomorrow". Forbes. Retrieved 2022-11-26.
  5. Porter, Kiel (2019-12-23). "Dell to Explore Purchase of Rest of Secureworks". Bloomberg.com. Retrieved 2022-11-26.
  6. "No. 79 – Secureworks". Inc. Magazine (Mansueto Ventures LLC). 2005. Retrieved 18 March 2011.
  7. "Inc. 500 Security Firm Wins Innovation Prize". Inc. Magazine (Mansueto Ventures LLC). 5 March 2007. Retrieved 18 March 2011.
  8. "Secureworks Ranks Third Among Georgia's Fastest Growing Technology Companies in Deloitte's Technology Fast 50 Program". redOrbit (Atlanta, Georgia). 7 October 2005. Retrieved 18 March 2011.
  9. McMillan, Robert (2006-09-20). "Security vendors SecureWorks, LURHQ merge". Network World. Retrieved 2022-10-16.
  10. 1 2 Kavanagh, Kelly M. (18 March 2011). "Secureworks/LURHQ Merger Creates a Stronger MSSP Player". Gartner Research. Gartner Inc. Archived from the original on October 18, 2006. Retrieved 25 September 2006.
  11. "Secureworks Closes Acquisition of VeriSign's Managed Security Services Business". VeriSign News. 7 July 2009. Retrieved 18 March 2011.
  12. "SecureWorks expands UK footprint with dns acquisition". IT PRO. 2009-12-10. Retrieved 2022-11-26.
  13. "SecureWorks Moves Into Europe With DNS Buy". PCWorld. Retrieved 2022-11-26.
  14. WebsiteGear.com, 2009
  15. Frink, David (18 March 2011). "Dell To Acquire Secureworks". Dell Financial News (Round Rock, Texas: Dell, Inc). Retrieved 4 January 2011.
  16. Braue, David (May 22, 2013). "Dell targets ANZ security opportunities as Secureworks debuts locally". CSO Online. IDG Enterprise. CSO. Archived from the original on January 18, 2021. Retrieved 27 May 2015.
  17. Kidman, Angus (22 May 2013). "Dell Secureworks: Australians Eager For Penetration Testing". lifehacker. Allure Media. Archived from the original on August 13, 2020. Retrieved 27 May 2015.
  18. Alex Wilhelm, TechCrunch. “Dell Subsidiary Secureworks Files To Go Public, Shows Ramping Losses.” Dec 17, 2015. Dec 17, 2015.
  19. "Dell Files for IPO to Spin Off Secureworks Business Unit". The VAR Guy. Jan 6, 2016.
  20. Katie Roof, TechCrunch. “Dell's Secureworks stumbles in first tech IPO of the year.” April 22, 2016. April 22, 2016.
  21. "Secureworks Launches New Cybersecurity Analytics Application". www.secureworks.com. Retrieved 2020-08-20.
  22. "Secureworks Reports First Quarter Fiscal 2021 Results | Secureworks Corporation". investors.secureworks.com. Retrieved 2020-08-20.
  23. "Secureworks Delivers Visibility and Detection Across the MITRE ATT&CK® Framework in First Evaluation of Red Cloak Threat Detection and Response". www.secureworks.com. Retrieved 2020-08-20.
  24. "Secureworks Launches New Global Partner Program to Address Growing Demand for Cybersecurity Solutions". www.secureworks.com. Retrieved 2020-08-20.
  25. "Wendy K. Thomas Assumes Role of President & CEO of Secureworks". www.secureworks.com. Retrieved 2021-09-14.
  26. "Secureworks Positioned as a Leader in the Gartner Magic Quadrant for MSS Worldwide 2019". www.secureworks.com. Retrieved 2020-08-21.
  27. "Secureworks MDR Solution Cited By Forrester in a 2018 Report". www.secureworks.com. Retrieved 2020-08-21.
  28. "IDC MarketScape Report: Worldwide Managed Security Services 2020 Vendor Assessment". www.secureworks.com. Retrieved 2020-09-24.
  29. "Information Security Services" (PDF). Dell Secure Works.
  30. "Secureworks - Endpoint Security & Threat Detection". www.carahsoft.com. Retrieved 2022-11-15.