We are a leading global cybersecurity company that protects organizations in the
digitally connected world. We combine visibility from thousands of clients, machine
learning and automation from our industry-leading SecureWorks Counter Threat PlatformTM,
and actionable insights from our team of elite researchers, analysts and consultants
to create a powerful network effect that provides increasingly strong protection
for our clients. By aggregating and analyzing data from various sources around
the world, we prevent security breaches, detect malicious activity in real time,
respond rapidly and predict emerging threats.
Our mission is to unlock the value of our clients’ security investments
by simplifying their complex security operations and amplifying their defenses.
Through our vendor-neutral approach, we create integrated and comprehensive solutions
by proactively managing the collection of “point” products deployed
by our clients to address specific security issues and provide supplemental solutions
where gaps exist in our clients’ defenses. We customize the right level
of security for each clients unique situation, which evolves as the clients
organization grows and changes.
We have pioneered an integrated approach that delivers a broad portfolio of
information security solutions to organizations of varying size and complexity.
Our flexible and scalable solutions support the evolving needs of the largest,
most sophisticated enterprises staffed with in-house security experts, as well
as small and medium-sized businesses and government agencies with limited in-house
capabilities and resources.
Our solutions enable organizations to:
prevent security breaches by fortifying their cyber defenses,
detect malicious activity,
respond rapidly to security breaches, and
predict emerging threats.
The solutions leverage our proprietary technologies, processes and extensive
expertise in the information security industry, which we have developed over
more than 18 years. Key elements of our strategy include:
maintain and extend our technology leadership,
expand and diversify our client base,
deepen our existing client relationships, and
attract and retain top talent.
The fees we charge for our solutions vary based on a number of factors, including
the solutions selected, the number of client devices covered by the selected
solutions, and the level of management we provide for the solutions. Historically,
approximately 80% of our revenue was derived from subscription-based solutions,
provided under managed security services, while approximately 20% was derived
from professional services engagements. As we respond to the evolving needs
of our clients, the relative mix of subscription-based solutions and professional
services we provide our clients may fluctuate.
ncreasing cybersecurity challenges have created a large and fragmented market
for IT security products and services.
We believe that many organizations that use the information technology, or
IT, security products and services available in the market remain vulnerable
to cyber attacks because they rely on a collection of uncoordinated “point”
products that address specific security issues but fall short in identifying
and defending against next-generation cyber threats.
Organizations of all sizes are using new information technologies to make their
businesses more productive and effective.
Modern IT infrastructures are growing in complexity and often include a combination
of on-premises, cloud and hybrid environments. In addition, the adoption of
mobile computing allows access to critical business information from various
devices and locations. The widespread adoption of these advanced IT architectures,
along with the rapid growth of connected devices and new ways of delivering
IT services, enables organizations to benefit from business applications that
are more powerful and easier to deploy, use and maintain.
This rapidly evolving IT environment is increasingly vulnerable to frequent
and sophisticated cyber attacks.
The evolving landscape of applications, modes of communication and IT architectures
makes it increasingly challenging for businesses to protect their critical business
assets from cyber threats. New technologies heighten security risks by increasing
the number of ways a threat actor can attack a target by giving users greater
access to important business networks and information and by facilitating the
transfer of control of underlying applications and infrastructure to third-party
vendors.
Cyber attacks have evolved from computer viruses written by amateur hackers
into highly complex and targeted attacks led by highly skilled adversaries intent
on stealing information or causing financial and reputational damage.
Our Counter Threat PlatformTM constitutes the core of our intelligence-driven
information security solutions and provides our clients with a powerful integrated
perspective regarding their network environments and security threats. Our integrated
suite of solutions includes:
Managed security, through which we provide our clients global visibility and
insight into malicious activity enabling them to detect and effectively remediate
threats quickly
Threat intelligence, through which we deliver early warnings of vulnerabilities
and threats, along with actionable information to help prevent any adverse impact
Security and risk consulting, through which we advise our clients on a variety
of security and risk-related matters, such as how to design and build strategic
security programs, assess and test security capabilities and meet regulatory
requirements
Incident response, through which we help our clients minimize the impact and
duration of security breaches through proactive client preparation, rapid containment
and thorough event analysis followed by effective remediation
As part of our security and risk consulting solutions, we emphasize cloud security,
through which we help clients deliver cloud-based services securely.
Our clients may subscribe to our full suite of solutions or elect to subscribe
to various combinations of our individual solutions. All of our solutions are
enabled by our Counter Threat Platform and our large team of highly-skilled
security experts.
The key capabilities of our solutions currently include:
Global Visibility. We have global visibility into the cyber threat landscape
through our approximately 4,400 subscription-based clients across 59 countries.
We are able to gain near real time insights that enable us to predict, detect
and respond to threats quickly and effectively. We also are able to identify
threats originating within a particular geographic area or relating to a particular
industry and proactively leverage this threat intelligence to protect other
clients against these threats.