Artificial Intelligence & Machine Learning
,
Governance & Risk Management
,
GRC
Acquisition Adds Advisory, GRC and Vulnerability Services to ImagineX’s MDR Core

TekStream purchased a cybersecurity services vendor led by a former Accenture manager to move from being a predominantly reactive provider to a more comprehensive partner.
See Also: Uncertainty, Undone: A 2026 OT/IoT Cybersecurity Strategy for Converged Environments
The Atlanta-based digital resilience vendor said its acquisition of ImagineX’s cybersecurity business will help TekStream shift from managed detection and response to preventing incidents, assessing risk posture and aligning security strategy with business objectives, said CEO Rob Jansen. ImagineX’s forward-looking approach includes advisory services, security strategy and proactive risk identification.
“We have been looking for a capability to add advisory and strategy services as well as proactive security services,” Jansen told ISMG. “So, I think adding vulnerability and CTEM-type technology to our offerings gives our clients a larger and fuller spectrum of capabilities.”
ImagineX’s cybersecurity business employed roughly 25 people as part of a larger operation focused on digital services, software engineering, data and artificial intelligence. The division has been led since 2015 by Neel Sata, who previously spent four-and-a-half years as a client service lead at Slalom Consulting and more than 11 years as a senior manager at Accenture focused on IT consulting services (see: Cyber Workforce Demands Specialized Skills Amid AI Growth).
From Reactive Security to Proactive Security
While TekStream excelled in detection and response, it lacked capabilities in areas such as vulnerability management, governance, risk and compliance, and virtual CISO advisory service, said Chief Solutions Officer Taylor Morgan. By integrating ImagineX, TekStream can now offer a continuous security life cycle from identifying vulnerabilities to advising on remediation and detecting and responding to threats.
“We want to be able to understand vulnerabilities, understand your IAM situation, understand your GRC and talk to your CISO at the highest level, so that we can make recommendations on tooling, people, process and technology,” Morgan said. “For us, this was a really attractive move to help us round out and have the full spectrum.”
Organizations traditionally relied on different vendors for consulting, vulnerability management and detection and response, which Morgan said often leads to inefficiencies, miscommunication and unimplemented recommendations. An integrated approach ensures insights generated during advisory engagements are directly translated into operational improvements within security operations centers.
“Bringing those two worlds together, you’re closing the gap between advisory capacity and protection capacity, which is exactly what needs to happen as we face these offensive capabilities that are getting more sophisticated at higher scale with greater speed,” Morgan said.
In many organizations, advisory recommendations are generated but never fully implemented, often because of organizational silos or lack of coordination, Morgan said. By bringing these capabilities together, TekStream aims to create a continuous cycle in which proactive insights inform detection strategies, and real-world threat data from incident response feeds back into risk assessments and strategic planning.
“If you’re going to an organization for strategy and advice and you’re going to another organization for detection and response, there’s a lot that gets lost in the sauce,” Morgan said. “A lot of it goes into a folder somewhere and then it’s just never addressed.”
Integrating Attacker Tactics Into Automated Workflows
Modern attack techniques can now automate complex processes such as chaining zero-day vulnerabilities and moving across systems at unprecedented speed, meaning that what once required weeks or months of effort can now be accomplished in minutes. As a result, organizations must rethink their security architectures and adopt more automated, intelligence-driven approaches, he said.
“What used to take months or weeks now takes minutes, and that fundamentally changes the approach defenders are going to have to take to the market,” Morgan said. “So, we can’t sit back and have human-speed defensive capabilities that are going to be able to stand up to machine-speed offense.”
The combined organization is focused on reducing manual processes and increasing automation. This includes improving how threat intelligence is ingested and utilized, enhancing the efficiency of SOCs and reducing the volume of low-value alerts. By integrating advisory insights and attacker tactics into automated workflows, TekStream aims to create an intelligent and responsive security environment.
“Our customers on the leading edge are asking us for that, and the ones that haven’t yet asked for it are going to be asking today and tomorrow, because they’re going to need it,” Jansen said.
Jansen and Morgan see attach rates as a primary metric for evaluating the success of the acquisition. This includes both the adoption of proactive services within TekStream’s existing customer base and the uptake of MDR services among ImagineX’s clients. Strong attach rates will indicate successful integration and validation of the company’s strategy to deliver a full-spectrum cybersecurity offering.
“The holistic motion is going to be better for the CISO community as well,” Morgan said. “So, they don’t have to go to multiple vendors or providers for different services. They can have a one-stop shop and one partner to work with that can solve the full gamut of problems.”
