ADT Cybersecurity joins with Arrow Electronics to expand its distribution channel

ADT Cybersecurity joins with Arrow Electronics to expand its distribution channel
ADT, provider of monitored security and interactive home and business automation solutions in the United States and Canada, announced it has teamed with Arrow Electronics to further expand its distribution arm for its ADT Cybersecurity solutions.

ADT Cybersecurity was formed in November 2017 with the acquisition of DATASHIELD and is focused on delivering Managed Detection and Response (MDR) services to commercial and enterprise businesses nationwide. Arrow Electronics is a global provider of products, services and solutions to industrial and commercial users of electronic components and enterprise computing solutions.

"This agreement with Arrow Electronics greatly expands our ability to serve the fast growing MDR market through their thousands of security resellers," said Michael Malone, Senior Vice President, ADT Cybersecurity. "As cybercrime continues to grow, the need for managed detection and response solutions is expanding, and in turn, we're growing our distribution channels to be well positioned to serve the market."

Global statistics from the most recent Ponemon report on the cost of a data breach show dwell time for malicious attacks has stretched to an average of 229 days from day of the attack to discovery.

ADT Cybersecurity solutions include 24/7/365 network monitoring, active hunting, and deep forensic analysis using cyber threat intelligence and real-time threat detection. This allows end-users to focus on validated threats, reducing the complexity of traditional threat detection by leveraging technology coupled with human-based intelligence and internal processes.

ADT Cybersecurity's SHIELDVISION technology employs an innovative approach by applying cyber threat intel to packet-level data. This gives expert analysts the ability to identify compromises that are often missed by other technologies. SHIELDVISION can help close the gap between detection times and remediation of a successful breach.


Share to:
Comments ( 0 )