Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Networking
    • The Edge
    • Virtualization
    • Converged Infrastructure
  • Data Security ▼
    • Backup & Recovery
    • Cybersecurity
    • Application Security
  • Cloud ▼
    • Private Cloud
    • Public Cloud
    • Hybrid Cloud
  • Storage ▼
    • Software Defined Storage
    • Object Storage
    • Physical Storage
  • DevOps ▼
    • Analytics
    • Applications
    • Open Source

N-able: Patch Now or Pay Later

Truth in IT
05/09/2025
9
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 41,000 people I've heard recently. Uh, lots and lots of energy going on here at the show. We are talking with N-able right now to find out what they're doing in the security space. I've got, uh. Troels Rasmussen. It's a hard one. Danish name, Danish name. I know it's Troels, but I was like, oh, where do we get to that? Uh, so let's just step back a bit. N-able known in the past as a company that's done a little bit more. What? I might say it stuff IT ops, IT, data management and so on. But now here at a security show. So how's that happening? Yeah, yeah. As we talked about Mike going into this conversation is we see the convergence of IT operations and security operations really come together. And you can't really have the disciplines separate. Um, and we feel like we have a right to play and really, um, credibility through our legacy, which is the, um, technologies we excel in patching, asset device management and so forth, and a really strong data protection, but come in and help people secure their whole environment. Proactive security now also reactive security and kind of work through that workflow. So you definitely see this. Coming together of the two worlds, right. There used to be silo security people. Silo it people. And now it's converging. And you're bringing the solutions together to do that technically. Yeah. That's right. So we recently had an acquisition of a company called lumen where we're excited about the technology. And what that essentially does is connect the proactive and then reactive. So now thinking through the framework at a very high level, you can identify, protect, detect, respond and recover through us. And we have the data to help you achieve compliance and then do your governance as well. So what kind of what kind of size of customer are you aiming at here. Is this mid market small market. Big market. Yeah. So we're a little unique in that place. We have two routes to market these service providers. And then the traditional channel. But what who we ultimately try to protect is the small medium sized enterprises. So it's really about becoming staff efficient, about becoming more automatic, about doing things to help do the entire life cycle with with fewer resources. So all that, all that good stuff is not necessarily about adding fancy features at the edges. That's right. I'd say we do have fancy features, but I look at it like from a race car perspective, right? You want a car, you can drive. You can operate. Right? If you were to get into Formula One car, you wouldn't be able to get it out of the grid. We want to give you all the power, but be able to utilize that in a in an efficient way. So we look at it two ways. It's efficiency, but it also access to capabilities that you can utilize. So you become a I'd say have a high level of efficacy. And the thing we've seen is as security has gotten more complex than it's become harder to to protect yourself, the skill level requirements has significantly grown. Right. So so making your technology more accessible but then also augmenting teams. So that's why we provide an MDM service as well. It's to allow people to augment their operations so they can run 24/7 365. And we can take some of the burden of scaling out their operations in-house. And we can we can help drive some of the cost efficiency, but also allow our expertise to help customers kind of do what they do best to help our partners do what they do best, and ultimately put them in at a place where they can provide enterprise grade security without having to do all the upfront investments and so forth. Okay, Charles, so what kind of is an example use case or problem set that combining it, you know, like data protection security and development together does for people. Yeah. Um, so one of the areas and one of the threat vectors we see get compromised most is identity. And that usually starts with an IT problem I'll call it a stale account, stale passwords, people having privileges they shouldn't have and so forth. And what our technology allows to do is it allows you to be proactive. We do scans. We look at at your deployments and whether or not there's anyone who shouldn't have a certain level of access or like certain exposures, still accounts and so forth. And then we allow you to remediate that. Let's say you don't get to do that in time. We can also do the detection and response through a Soar action. So we can help take appropriate security actions as well. So we try to come in ahead of the curve and say like, hey, you should resolve this right now because you have a major security problem If it goes wrong and it hits the fan, then we can help you take remediation and make sure you're covered on that side as well. Okay, so we're here at RSA conference. I have to say that because separate from RSA, RSA conference, 41,000 people, people coming by the booth. What are you hearing most from them and how are you positioning and able to them to help solve their problems? Yeah, I think it's the default. I'd say life cycle or coverage of what you need to stay resilient, right. We have our UAMs that allows you to be proactive. You have our XDR, MDR offering and service that allows you to detect and respond to take actions and and if needed, then we have our code data protection tool that allows you to recover, um, in case it's needed. That would be security then. But it could also be like an operational event. All right. So if I heard you right, you start that started with like business resilience being one of the bigger challenges people are really facing if they own up to it instead of something tactical, they're really saying like, how do I how do I keep the thing going? Rather than how do I respond to something? Yeah. And as we saw many years back, it's really gone from if to when I get breached or compromised. So you need to take appropriate steps and you need to have a stack that allows you to react in case and when an event hits. So, so very much so driving that resiliency and ensure that you can operate no matter what happens. All right. If you had one message that you'd like to tell the 41,000 people here about N-able and have them take that as a takeaway, what would that be? Uh, yeah. Um, to get above the security poverty line, uh, there's many companies who aren't willing to make the investments ahead of the curve, and that means they have massive headaches afterwards. We can help you get there. And we have a strong solution set that allows you to really, um, get above that poverty line and be proactive. I mean, I like that phrase security, poverty line. I like a lot of the ways you're talking about this problem set, because I'm originally from the IT side of the house as well. And looking at security, I like to see these worlds converging because I think that's the right thing to be doing. Um, let me ask you this. If someone is in this crowd and they're trying to get started in this, and they're looking to say, where should I start researching? Maybe what are the first steps I should be taking? What would you recommend? Yeah. Um, so there's a lot of guidelines that you can work from. I'd probably look at insurance like, what are they requiring for you to obtain a policy and to get like a good premium, right. That's that's a good way to start. Regulation. So most companies they work in a vertical. You'll have government regulations and so forth that will tell you what's the minimum to to go play. Like those are good areas to start. But be curious. There's a lot of opinions out there. It's a jungle. And security is ultimately a sliding scale. How much protection are you willing and capable to pay for? But paying in advance and then don't do it afterwards because there's usually four times the cost. All right. And if someone wants to then dig into N-able and they want to look at some of the solutions you've managed to put together here, the the ad lumen piece or the Cove data protection piece, or how those work together. Where would you point them at? Well, I'd go to n-able.com for starters. We're at most trade shows as well. So if you're around swing by our booth. Um but yeah that's that's pretty much it. All right. Thank you so much for for being here today. Yeah. No, I appreciate it. Thanks. All right. Check it out. N-able.

Mike Matchett of Small World Big Data speaks with Troels Rasmussen from N-able about the convergence of IT operations and security. N-able empowers MSPs and mid-sized enterprises with unified solutions that span patching, asset management, detection, response, and data recovery. Following their recent acquisition of Luma, they now bridge proactive and reactive security workflows. N-able’s focus is resilience, not bells and whistles—delivering a tech stack that’s practical, efficient, and keeps companies above the ‘security poverty line.’

Categories:
  • » Small World Big Data
  • » Technology Communities » Data Security » Cybersecurity
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • cybersecurity
  • nable
  • n-able
  • it
  • and
  • security
  • convergence
  • patch
  • management
  • resilience
  • xdr
  • msp
  • tools
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: N-able: Patch Now or Pay Later

            Upcoming Spotlight Events

            • May
              20

              Taming the Hacker Storm: Your Framework for Defeating Cybercriminals and Malware

              05/20/2025
              More events

              Upcoming 360 View Events

              • May
                22

                360View: AI Powered Innovation in the Enterprise

                05/22/2025
                • Jun
                  18

                  360View: The Data Resilience Imperative – Securing, Scaling & Optimizing Enterprise Data

                  06/18/2025
                  • Jul
                    24

                    360View: API Security & the Expanding Attack Surface

                    07/24/2025
                    More events

                    Upcoming Partner Events

                    • May
                      29

                      Dispelling Misconceptions Surrounding API Security

                      05/29/2025
                      More events
                      Truth in IT
                      • Advertise
                      • About Us
                      • Terms of Service
                      • Privacy Policy
                      • Contact Us
                      • Be Our Guest
                      • Preference Management
                      Desktop version
                      Standard version