Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

N-able: Patch Now or Pay Later

Truth in IT
05/09/2025
92
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 41,000 people I've heard recently. Uh, lots and lots of energy going on here at the show. We are talking with N-able right now to find out what they're doing in the security space. I've got, uh. Troels Rasmussen. It's a hard one. Danish name, Danish name. I know it's Troels, but I was like, oh, where do we get to that? Uh, so let's just step back a bit. N-able known in the past as a company that's done a little bit more. What? I might say it stuff IT ops, IT, data management and so on. But now here at a security show. So how's that happening? Yeah, yeah. As we talked about Mike going into this conversation is we see the convergence of IT operations and security operations really come together. And you can't really have the disciplines separate. Um, and we feel like we have a right to play and really, um, credibility through our legacy, which is the, um, technologies we excel in patching, asset device management and so forth, and a really strong data protection, but come in and help people secure their whole environment. Proactive security now also reactive security and kind of work through that workflow. So you definitely see this. Coming together of the two worlds, right. There used to be silo security people. Silo it people. And now it's converging. And you're bringing the solutions together to do that technically. Yeah. That's right. So we recently had an acquisition of a company called lumen where we're excited about the technology. And what that essentially does is connect the proactive and then reactive. So now thinking through the framework at a very high level, you can identify, protect, detect, respond and recover through us. And we have the data to help you achieve compliance and then do your governance as well. So what kind of what kind of size of customer are you aiming at here. Is this mid market small market. Big market. Yeah. So we're a little unique in that place. We have two routes to market these service providers. And then the traditional channel. But what who we ultimately try to protect is the small medium sized enterprises. So it's really about becoming staff efficient, about becoming more automatic, about doing things to help do the entire life cycle with with fewer resources. So all that, all that good stuff is not necessarily about adding fancy features at the edges. That's right. I'd say we do have fancy features, but I look at it like from a race car perspective, right? You want a car, you can drive. You can operate. Right? If you were to get into Formula One car, you wouldn't be able to get it out of the grid. We want to give you all the power, but be able to utilize that in a in an efficient way. So we look at it two ways. It's efficiency, but it also access to capabilities that you can utilize. So you become a I'd say have a high level of efficacy. And the thing we've seen is as security has gotten more complex than it's become harder to to protect yourself, the skill level requirements has significantly grown. Right. So so making your technology more accessible but then also augmenting teams. So that's why we provide an MDM service as well. It's to allow people to augment their operations so they can run 24/7 365. And we can take some of the burden of scaling out their operations in-house. And we can we can help drive some of the cost efficiency, but also allow our expertise to help customers kind of do what they do best to help our partners do what they do best, and ultimately put them in at a place where they can provide enterprise grade security without having to do all the upfront investments and so forth. Okay, Charles, so what kind of is an example use case or problem set that combining it, you know, like data protection security and development together does for people. Yeah. Um, so one of the areas and one of the threat vectors we see get compromised most is identity. And that usually starts with an IT problem I'll call it a stale account, stale passwords, people having privileges they shouldn't have and so forth. And what our technology allows to do is it allows you to be proactive. We do scans. We look at at your deployments and whether or not there's anyone who shouldn't have a certain level of access or like certain exposures, still accounts and so forth. And then we allow you to remediate that. Let's say you don't get to do that in time. We can also do the detection and response through a Soar action. So we can help take appropriate security actions as well. So we try to come in ahead of the curve and say like, hey, you should resolve this right now because you have a major security problem If it goes wrong and it hits the fan, then we can help you take remediation and make sure you're covered on that side as well. Okay, so we're here at RSA conference. I have to say that because separate from RSA, RSA conference, 41,000 people, people coming by the booth. What are you hearing most from them and how are you positioning and able to them to help solve their problems? Yeah, I think it's the default. I'd say life cycle or coverage of what you need to stay resilient, right. We have our UAMs that allows you to be proactive. You have our XDR, MDR offering and service that allows you to detect and respond to take actions and and if needed, then we have our code data protection tool that allows you to recover, um, in case it's needed. That would be security then. But it could also be like an operational event. All right. So if I heard you right, you start that started with like business resilience being one of the bigger challenges people are really facing if they own up to it instead of something tactical, they're really saying like, how do I how do I keep the thing going? Rather than how do I respond to something? Yeah. And as we saw many years back, it's really gone from if to when I get breached or compromised. So you need to take appropriate steps and you need to have a stack that allows you to react in case and when an event hits. So, so very much so driving that resiliency and ensure that you can operate no matter what happens. All right. If you had one message that you'd like to tell the 41,000 people here about N-able and have them take that as a takeaway, what would that be? Uh, yeah. Um, to get above the security poverty line, uh, there's many companies who aren't willing to make the investments ahead of the curve, and that means they have massive headaches afterwards. We can help you get there. And we have a strong solution set that allows you to really, um, get above that poverty line and be proactive. I mean, I like that phrase security, poverty line. I like a lot of the ways you're talking about this problem set, because I'm originally from the IT side of the house as well. And looking at security, I like to see these worlds converging because I think that's the right thing to be doing. Um, let me ask you this. If someone is in this crowd and they're trying to get started in this, and they're looking to say, where should I start researching? Maybe what are the first steps I should be taking? What would you recommend? Yeah. Um, so there's a lot of guidelines that you can work from. I'd probably look at insurance like, what are they requiring for you to obtain a policy and to get like a good premium, right. That's that's a good way to start. Regulation. So most companies they work in a vertical. You'll have government regulations and so forth that will tell you what's the minimum to to go play. Like those are good areas to start. But be curious. There's a lot of opinions out there. It's a jungle. And security is ultimately a sliding scale. How much protection are you willing and capable to pay for? But paying in advance and then don't do it afterwards because there's usually four times the cost. All right. And if someone wants to then dig into N-able and they want to look at some of the solutions you've managed to put together here, the the ad lumen piece or the Cove data protection piece, or how those work together. Where would you point them at? Well, I'd go to n-able.com for starters. We're at most trade shows as well. So if you're around swing by our booth. Um but yeah that's that's pretty much it. All right. Thank you so much for for being here today. Yeah. No, I appreciate it. Thanks. All right. Check it out. N-able.

Mike Matchett of Small World Big Data speaks with Troels Rasmussen from N-able about the convergence of IT operations and security. The N‑able mission is to protect businesses against evolving cyberthreats with a unified cyber resiliency platform to manage, secure, and recover. Following their recent acquisition of Adlumin, they now bridge proactive and reactive security workflows. N-able’s focus is resilience, not bells and whistles—delivering a tech stack that’s practical, efficient, and keeps companies above the security poverty line.

Categories:
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • cybersecurity
  • nable
  • n-able
  • it
  • and
  • security
  • convergence
  • patch
  • management
  • resilience
  • xdr
  • msp
  • tools
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: N-able: Patch Now or Pay Later

              Upcoming Webinar Calendar

              • 01/20/2026
                01:00 PM
                01/20/2026
                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap
                https://www.truthinit.com/index.php/channel/1756/beyond-the-basics-it-service-delivery-workflows-that-close-the-efficiency-gap/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/
              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/27/2026
                01:00 PM
                01/27/2026
                Mastering AD CS Protection for Enhanced Threat Prevention 8.0
                https://www.truthinit.com/index.php/channel/1775/mastering-ad-cs-protection-for-enhanced-threat-prevention-8-0/
              • 01/28/2026
                10:00 AM
                01/28/2026
                Strategies for Safeguarding Data in the AI Era through DSPM
                https://www.truthinit.com/index.php/channel/1797/strategies-for-safeguarding-data-in-the-ai-era-through-dspm/
              • 01/28/2026
                10:55 AM
                01/28/2026
                Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization
                https://www.truthinit.com/index.php/channel/1769/transforming-insights-into-action-a-comprehensive-security-strategy-for-scalable-data-democratization/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Preparing Your Cybersecurity Strategy for the Challenges of 2026
                https://www.truthinit.com/index.php/channel/1705/preparing-your-cybersecurity-strategy-for-the-challenges-of-2026/
              • 01/29/2026
                12:00 PM
                01/29/2026
                Transforming Secure Access through Netskope One Private Access Solutions
                https://www.truthinit.com/index.php/channel/1772/transforming-secure-access-through-netskope-one-private-access-solutions/
              • 02/03/2026
                04:00 AM
                02/03/2026
                De la visibilidad a la protección: seguridad integral para datos sensibles
                https://www.truthinit.com/index.php/channel/1792/de-la-visibilidad-a-la-protección-seguridad-integral-para-datos-sensibles/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/
              • 02/19/2026
                03:00 AM
                02/19/2026
                DACH Partner Insights - Breakfast Webinar on Keepit Solutions
                https://www.truthinit.com/index.php/channel/1786/dach-partner-insights-breakfast-webinar-on-keepit-solutions/

              Upcoming Spotlight Events

              • Jan
                20

                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap

                01/20/202601:00 PM ET
                • Jan
                  22

                  Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                  01/22/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Jan
                    27

                    Mastering AD CS Protection for Enhanced Threat Prevention 8.0

                    01/27/202601:00 PM ET
                    • Jan
                      28

                      Strategies for Safeguarding Data in the AI Era through DSPM

                      01/28/202610:00 AM ET
                      • Jan
                        28

                        Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization

                        01/28/202610:55 AM ET
                        More events

                        Recent Spotlight Events

                        • Dec
                          10

                          The Next Generation of Managed Data Security Services

                          12/10/202501:00 PM ET
                          • Dec
                            02

                            The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                            12/02/202501:00 PM ET
                            • Nov
                              20

                              Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                              11/20/202501:00 PM ET
                              More events

                              Recent Industry Events

                              • Dec
                                18

                                Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                                12/18/202501:00 PM ET
                                • Dec
                                  16

                                  HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                                  12/16/202501:00 PM ET
                                  • Dec
                                    11

                                    Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                                    12/11/202501:00 PM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version