Skip to Content

ADT Cybersecurity joins with Arrow Electronics to expand its distribution channel

ADT Cybersecurity joins with Arrow Electronics to expand its distribution channel

BOCA RATON, Fla.—ADT announced it has teamed up with Arrow Electronics to further expand its distribution arm for its ADT Cybersecurity solutions.

ADT Cybersecurity was formed in November 2017 with the acquisition of DATASHIELD and is focused on delivering Managed Detection and Response (MDR) services to commercial and enterprise businesses nationwide. Arrow Electronics is a global provider of products, services and solutions to industrial and commercial users of electronic components and enterprise computing solutions.

“This agreement with Arrow Electronics greatly expands our ability to serve the fast growing MDR market through their thousands of security resellers,” Michael Malone, senior vice president, ADT Cybersecurity, said in the announcement. “As cybercrime continues to grow, the need for managed detection and response solutions is expanding, and in turn, we're growing our distribution channels to be well positioned to serve the market.”

ADT noted in the press release that global statistics from the most recent Ponemon report on the cost of a data breach show dwell time for malicious attacks has stretched to an average of 229 days from day of the attack to discovery.

ADT Cybersecurity solutions include 24/7/365 network monitoring, active hunting, and deep forensic analysis using cyber threat intelligence and real-time threat detection. This allows end-users to focus on validated threats, reducing the complexity of traditional threat detection by leveraging technology coupled with human-based intelligence and internal processes.

“ADT Cybersecurity's SHIELDVISION technology employs an innovative approach by applying cyber threat intel to packet-level data,” the press release reads. “This gives expert analysts the ability to identify compromises that are often missed by other technologies. SHIELDVISION can help close the gap between detection times and remediation of a successful breach.”

Comments

To comment on this post, please log in to your account or set up an account now.