SecureWorks Inc. is a United States-based subsidiary that provides information security services, protecting its customers' computers, networks and information assets from malicious activity such as cybercrime. The company has approximately 4,400 customers across 61 countries, ranging from Fortune 100 companies to mid-sized businesses in a variety of industries. It became part of Dell in February 2011 and branched off to become a public organization in April 2016. It is still majority-owned by Dell.

Wikipedia
SecureWorks
SecureWorks
Blog Post
  • To prevent executives from becoming exploited data access points for threat actors, sufficient protection must go beyond simply guarding against physical dangerCategory:Leadership InsightsRisk ManagementTo prevent executives from becoming exploited data access points for threat actors, sufficient protection must go beyond simply guarding against physical danger.

SecureWorks
SecureWorks
Blog Post
  • The Frost & Sullivan and Secureworks Security Maturity Model (SMM) analyses companies beyond the layers of defence and examines security maturity across five domains Category:Cloud SecurityIncident Response and ManagementInformation SecurityThe Frost & Sullivan and Secureworks Security Maturity Model (SMM) analyses companies beyond the layers of defence and examines security maturity across five d...

SecureWorks
SecureWorks
Blog Post
  • With changes to the Australian Privacy Act, here’s why testing your environment for existing threat actors might save your organisation a lot of painCategory:Risk ManagementWith changes to the Australian Privacy Act, here’s why testing your environment for existing threat actors might save your organisation a lot of pain.

SecureWorks
SecureWorks
Blog Post
  • As malicious threat actors target online shoppers this season, consumers should adopt strong online safety practices to keep their holidays hack-free.Category:Leadership InsightsInformation SecurityAs malicious threat actors target online shoppers this season, consumers should adopt strong online safety practices to keep their holidays hack-free.

SecureWorks
SecureWorks
Blog Post
  • Organisations have time to strengthen their cybersecurity posture to ensure they are not only compliant with GDPR by May of 2018 but realising its potential as a business enablerCategory:Information SecurityLeadership InsightsOrganisations have time to strengthen their cybersecurity posture to ensure they are not only compliant with GDPR by May of 2018 but realising its potential as a business ena...

SecureWorks
SecureWorks
Blog Post
  • Dalton and Flowsynth help create and test packet capturesCategory:Information SecurityRisk ManagementThe CTU research team publicly released packet capture tools for intrusion detection systems.

SecureWorks
SecureWorks
Blog Post
SecureWorks
SecureWorks
Landing Page

Cyber Security Services & Solutions for Advanced Persistent Threats | SecureWorks

 
SecureWorks
SecureWorks
Blog Post
  • As the threat landscape evolves, our experts dive into the latest actionable intelligence to help organizations prepare for what’s aheadCategory:IntelligenceInformation SecurityAs the threat landscape evolves, our experts dive into the latest actionable intelligence to help organizations prepare for what’s ahead

SecureWorks
SecureWorks
Blog Post
  • The more things change, the more companies need scalable, simplified securityCategory:Risk ManagementInformation SecurityCloud SecuritySee how security monitoring has evolved as cybersecurity resources strain to keep up with the ever-increasing volume of data and security events in the network.

SecureWorks
SecureWorks
Blog Post
  • Teaching your employees how to recognize and prevent phishing schemes can turn your workforce into one of your best defences against cybercrime.Category:Incident Response and ManagementTeaching your employees how to recognize and prevent phishing schemes can turn your workforce into one of your best defences against cybercrime.

SecureWorks
SecureWorks
YouTube Video
  • On some of the more challenging pen tests, the goal is not necessarily to gain a high level of privilege on the network but rather getting to a specific set of data. Watch to learn about an engagement where one of SecureWorks' technical testers utilized pivoting by querying a targeted systems network cards to gain access to sensitive data on an organization's internal network.

SecureWorks
SecureWorks
YouTube Video
  • Phishing is nothing new, however, it remains a tactic more powerful than ever. In a recent engagement, Chris Carlis, Security Analysis Consultant, capitalized on local news about an upcoming storm to build a phishing campaign aimed at an organization to offer a work from home program.

SecureWorks
SecureWorks
YouTube Video
  • Nate Drier, SecureWorks Security Analysis Consultant describes an engagement with a client during a penetration test and some of the discoveries they found that opened a path to compromising the entire network. The lesson learned is for organizations to ensure they are doing their due diligence when hiring vendors and to think about testing the network after major software installations or changes...

SecureWorks
SecureWorks
YouTube Video
  • Avoid common mistakes that could put your organization at additional risk. Hadi Hosn, SecureWorks Head of Security Strategy and GRC Consulting in EMEA, gives an overview of the top 5 common cyber security mistakes seen in client engagements and how your organizations can avoid these common missteps.

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.