Managed Detection & Response (MDR) , Open XDR , Security Operations

Inside Arctic Wolf's SecOps Growth Strategy From MDR to ITDR

CEO Nick Schneider on the Company's Security Operations Cloud and Concierge Model
Nick Schneider, president and CEO, Arctic Wolf (Image: Arctic Wolf)

A diversified product portfolio, geographic expansion and a robust services delivery model have helped security operations stalwart Arctic Wolf expand its customer footprint.

See Also: Effective Communication Is Key to Successful Cybersecurity

The Minneapolis-area firm married its heritage in managed detection and response with new assets such as identity threat detection and response, vulnerability management, and security awareness training, said President and CEO Nick Schneider. Arctic Wolf also expanded rapidly in Europe and Asia to help midmarket organizations globally achieve multiple security outcomes from a single, centralized system (see: Arctic Wolf CEO on Why His Company Is Buying a SOAR Vendor).

"We've seen growth from all of our emerging product sets while also maintaining significant strong growth in our core, which has been extended detection and response," Schneider said. "We've also done a really good job over the last few years of bringing our platform into new and expanding regions."

In this video interview with Information Security Media Group, Schneider also discussed:

  • Expansion into geographic regions including Europe, Asia and Australia/New Zealand;
  • Increased demand for MDR and new products such as cyber resiliency assessments;
  • Adaptation of Arctic Wolf's service delivery to meet diverse customer needs.

Schneider has more than 15 years of experience in building global, high-growth technology companies spanning both emerging and established markets. As a veteran in the security industry, he has developed expertise in creating best-of-breed technology platforms and world-class sales organizations.


About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.