SecureWorks
Encyclopedia
SecureWorks, Inc Headquartered in Atlanta, Georgia
Georgia (U.S. state)
Georgia is a state located in the southeastern United States. It was established in 1732, the last of the original Thirteen Colonies. The state is named after King George II of Great Britain. Georgia was the fourth state to ratify the United States Constitution, on January 2, 1788...

, SecureWorks, Inc. is a U.S.-based managed security services
Managed Security Service
In computing, managed security services are network security services that have been outsourced to a service provider. A company providing such a service is a managed security service provider Also Managed security services is a systematic approach to managing an organization's security needs...

 provider that provides information security services and protection of computer, network and information assets from malicious activity or cybercrime
Computer crime
Computer crime, or cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet. Such crimes may threaten a nation’s security and financial health...

 for its customers. The company had more than 2,800 clients, most of which are mid-sized businesses in a variety of industries.
It became part of Dell
Dell
Dell, Inc. is an American multinational information technology corporation based in 1 Dell Way, Round Rock, Texas, United States, that develops, sells and supports computers and related products and services. Bearing the name of its founder, Michael Dell, the company is one of the largest...

 in 2011.

History

SecureWorks was founded as a privately held company in 1998 by Michael Pearson and Joan Wilbanks. In 2002 Michael R. Cote
Michael R. Cote
Mike Cote is the president and CEO of SecureWorks. SecureWorks is an managed security services provider based in Atlanta, GA.-History:Prior to joining SecureWorks in January 2002, Cote negotiated the sale of 2 companies worth $450 million and $65 million, approximately 35 acquisitions worth $1.6...

 became President and CEO. In 2005, and again in 2006, the company was named to the Inc. 500 and Inc. 5000 lists (2005, 2006) and Deloitte’s Fast 500.

In 2006, SecureWorks merged with LURHQ Corporation and the new entity continued under the SecureWorks corporate name. LURHQ, which was founded in 1996 in Myrtle Beach, SC and provided managed security services to large enterprises, had similar company cultures and leadership to SecureWorks. According to Gartner, the merger created a stronger company. With the merger, SecureWorks was able to leverage Sherlock, LURHQ's portal, to unify its combined customer base onto a single integrated security management platform.

In 2009, SecureWorks acquired the Managed Security Service
Managed Security Service
In computing, managed security services are network security services that have been outsourced to a service provider. A company providing such a service is a managed security service provider Also Managed security services is a systematic approach to managing an organization's security needs...

s (MSS) business from VeriSign
VeriSign
Verisign, Inc. is an American company based in Dulles, Virginia that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the authoritative registry for the .com, .net, and .name generic top-level domains and the .cc and .tv country-code...

, Inc., a trusted provider of Internet infrastructure services for the networked world, and grew to more than 500 employees worldwide. The acquisition expanded its clients to approximately 2,600 in more than 50 countries, including the United Kingdom
United Kingdom
The United Kingdom of Great Britain and Northern IrelandIn the United Kingdom and Dependencies, other languages have been officially recognised as legitimate autochthonous languages under the European Charter for Regional or Minority Languages...

, Saudi Arabia
Saudi Arabia
The Kingdom of Saudi Arabia , commonly known in British English as Saudi Arabia and in Arabic as as-Sa‘ūdiyyah , is the largest state in Western Asia by land area, constituting the bulk of the Arabian Peninsula, and the second-largest in the Arab World...

, Taiwan
Taiwan
Taiwan , also known, especially in the past, as Formosa , is the largest island of the same-named island group of East Asia in the western Pacific Ocean and located off the southeastern coast of mainland China. The island forms over 99% of the current territory of the Republic of China following...

, Finland
Finland
Finland , officially the Republic of Finland, is a Nordic country situated in the Fennoscandian region of Northern Europe. It is bordered by Sweden in the west, Norway in the north and Russia in the east, while Estonia lies to its south across the Gulf of Finland.Around 5.4 million people reside...

, Spain
Spain
Spain , officially the Kingdom of Spain languages]] under the European Charter for Regional or Minority Languages. In each of these, Spain's official name is as follows:;;;;;;), is a country and member state of the European Union located in southwestern Europe on the Iberian Peninsula...

, Brazil
Brazil
Brazil , officially the Federative Republic of Brazil , is the largest country in South America. It is the world's fifth largest country, both by geographical area and by population with over 192 million people...

 and Mexico
Mexico
The United Mexican States , commonly known as Mexico , is a federal constitutional republic in North America. It is bordered on the north by the United States; on the south and west by the Pacific Ocean; on the southeast by Guatemala, Belize, and the Caribbean Sea; and on the east by the Gulf of...

. This includes four of the Fortune 10. Also in 2009, SecureWorks acquired the then 10 year old dns Limited. This acquisition expanded SecureWorks' operation to include a UK-based operations center and additional offices in London
London
London is the capital city of :England and the :United Kingdom, the largest metropolitan area in the United Kingdom, and the largest urban zone in the European Union by most measures. Located on the River Thames, London has been a major settlement for two millennia, its history going back to its...

 and Edinburgh
Edinburgh
Edinburgh is the capital city of Scotland, the second largest city in Scotland, and the eighth most populous in the United Kingdom. The City of Edinburgh Council governs one of Scotland's 32 local government council areas. The council area includes urban Edinburgh and a rural area...

.

On January 4, 2011, Dell
Dell
Dell, Inc. is an American multinational information technology corporation based in 1 Dell Way, Round Rock, Texas, United States, that develops, sells and supports computers and related products and services. Bearing the name of its founder, Michael Dell, the company is one of the largest...

 announced that it would acquire SecureWorks to be part of Dell Services. SecureWorks officially began operating as a Dell brand on February 7, 2011.

Services

Through secure operations centers (SOCs), in Atlanta, Georgia, Myrtle Beach, South Carolina, Chicago, Illinois, and Providence, Rhode Island the company's managed services are offered at varying levels of involvement, including:
  • Fully outsourced security management and monitoring
  • Co-management of security devices (i.e. firewalls
    Firewall (computing)
    A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

    , intrusion prevention systems, and intrusion detection systems)
  • Monitoring for security incidents
  • Supply of a hosted security information management (SIM) platform for organizations monitoring security activity internally


SecureWorks additionally provides host intrusion prevention, vulnerability scanning
Vulnerability assessment
A vulnerability assessment is the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Examples of systems for which vulnerability assessments are performed include, but are not limited to, information technology systems, energy supply systems, water supply...

, email filtering
E-mail filtering
Email filtering is the processing of email to organize it according to specified criteria. Most often this refers to the automatic processing of incoming messages, but the term also applies to the intervention of human intelligence in addition to anti-spam techniques, and to outgoing emails as well...

 and email encryption.
Additionally, SecureWorks offers consulting services to aid with information security program development and implementation, IT controls assessments, pen testing
Penetration test
A penetration test, occasionally pentest, is a method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders and malicious insiders...

, web application testing, Experian and Equifax certifications, PCI compliance services, phishing take-down
Phishing
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT...

, incident response
Computer security incident management
In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events...

, computer forensics
Computer forensics
Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media...

 and many other custom services.

Software

While SecureWorks is not a computer software
Computer software
Computer software, or just software, is a collection of computer programs and related data that provide the instructions for telling a computer what to do and how to do it....

 manufacturer or reseller, the company does develop technologies that enable or enhance its services. The first such software was iSensor, a network intrusion prevention device that allows for rapid countermeasure deployment and updates across all clients in short periods of time.

Further reading



External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK