Dell SecureWorks and Risk I/O team up to deliver a better kind of Vulnerability Management

Apr 29, 2014 11:56:20 AM

On April 23rd, 2014 Dell announced its new Vulnerability Threat Monitoring and Prioritization service delivered through the SecureWorks Counter Threat Platform.  This managed service was created to expand the current Vulnerability Management offerings and increase customer value by creating the ability for customers to integrate their own vulnerability management systems.  With the additional context provided through Risk I/O, remediation and mitigation prioritization are done less in a bubble of the operational environment and more in context with the Internet threat universe.

In investigating the service announcement, I spoke with Chris Collard, the SecureWorks Product Manager whose responsibilities include this new Vulnerability Monitoring and Prioritization service.  He was very excited about the partnership and how it extends their service capabilities.  Additionally, Chris was pleased that Dell could deliver a solution option that increased customer ROI on their existing vulnerability management infrastructure.

I was most impressed that SecureWorks was not only motivated to act on customer input enough to seriously evaluate how to accomplish their requests, a true sign of a leading service provider,  but to think outside the box to get it done.  I don’t know how long the partnership was in the works but it couldn’t have been as long as it would have taken them to build it themselves.

Both Risk I/O and SecureWorks deliver solid service to their customers that are worth taking a look at.

Dell SecureWorks is a recognized provider of world-class information security services to help organizations of all sizes protect their IT assets, comply with regulations and reduce security costs.

Risk I/O is a relative new comer to the security industry.  However, Co-founders Ed Bellis, CEO, and Jeff Heuer, CTO, produced a visionary solution bringing together Internet Threat Data with customer vulnerability data.

 

Enhanced by Zemanta
David Monahan

Written by David Monahan

David is a senior information security executive with several years of experience. He has organized and managed both physical and information security programs, including security and network operations (SOCs and NOCs) for organizations ranging from Fortune 100 companies to local government and small public and private companies. He has diverse audit and compliance and risk and privacy experience such as providing strategic and tactical leadership to develop, architect, and deploy assurance controls; delivering process and policy documentation and training; and working on educational and technical solutions.

    Lists by Topic

    see all

    Posts by Topic

    see all

    Recent Posts