Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Cyber risk and advisory programs that identify security gaps and build security strategies to address them.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Seamless integration and threat investigation across your existing tech stack.
Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Extend your team capabilities and prevent business disruption with expertise from eSentire.
We balance automated blocks with rapid human-led investigations to manage threats.
Guard endpoints by isolating and remediating threats to prevent lateral spread.
Defend brute force attacks, active intrusions and unauthorized scans.
Investigation and threat detection across multi-cloud or hybrid environments.
Remediate misconfigurations, vulnerabilities and policy violations.
Investigate and respond to compromised identities and insider threats.
Stop ransomware before it spreads.
Meet regulatory compliance mandates.
Detect and respond to zero-day exploits.
End misconfigurations and policy violations.
Defend third-party and supply chain risk.
Prevent disruption by outsourcing MDR.
Adopt a risk-based security approach.
Meet insurability requirements with MDR.
Protect your most sensitive data.
Build a proven security program.
Operationalize timely, accurate, and actionable cyber threat intelligence.
THE THREAT On November 18th, 2024, Palo Alto disclosed a critical actively exploited authentication bypass zero-day vulnerability impacting Palo Alto Networks PAN-OS. The…
Nov 13, 2024THE THREAT Update: eSentire has observed multiple exploitation attempts targeting CVE-2024-8069. In real-world attacks, threat actors successfully achieved RCE and attempted to…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Three MDR package tiers are available based on per-user pricing and level of risk tolerance.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
The Securities and Exchange Commission (SEC) recently released a report that examined 75 finance firms registered with the SEC, including broker-dealers, investment advisers and investment companies (“funds”). The report assessed overall industry practices as well as legal and compliance issues associated with cybersecurity preparedness.[1]
While several of the findings were positive, clearly there is still much to be done. Fortunately, the report showed that cybersecurity is being taken seriously. No longer are firms insisting they’re too small to worry about cyberattacks. The threat is out there and companies are aware they need to protect against them.
Cybersecurity preparedness is an ongoing commitment that requires firms to:
And these steps are just the beginning! That is why, when a firm wants to assess their cybersecurity practices, I usually recommend starting by answering 6 key questions. Let’s break these questions down, using the SEC report as a reference.
The report found that all broker-dealers and a large majority of advisers and funds maintained cybersecurity organizational charts and/or identified and described cybersecurity roles and responsibilities for the firms’ workforce. This is a great start.
Almost all firms either conducted vendor risk assessments or required that vendors provide the firms with risk management and performance reports (i.e., internal and/or external audit reports) and security reviews or certification reports.
Additionally, while vendor risk assessments are typically conducted at the outset of a relationship, over half of the firms also required updating such risk assessments at least annually. Many firms also required third-party vendors to periodically provide logs of their activity on the firms’ networks.
This marks a major improvement compared with how vendor assessments were previously conducted. Firms are recognizing the risk that vendors can pose to their network and are taking action to prevent it.
Nearly all the firms had plans in place for addressing access incidents. In addition, most had plans for denial of service incidents and unauthorized intrusions.
However, while the vast majority of broker-dealers maintained plans for data breach incidents and most firms had plans for notifying customers of material events, less than two-thirds of the advisers and funds appeared to maintain such plans.
Plan maintenance is where firms prove their commitment cybersecurity preparedness and determine a cyberattack will not wipe them out. By having a plan in place, firms have already done most of the work. If your current plan is not being maintained, you should consider it a priority.
While the report found that many of the firms required all employees to complete cybersecurity awareness training, there were no substantial policies in place to ensure training occurred nor were there protocols surrounding employees who did not complete the required training.
Cybersecurity training for employees should be mandatory—not just as part of new-employee orientation, but as an ongoing practice. It’s important that training is offered in a way that is engaging and memorable so your employees will retain the information. And of course, policies must be in place to ensure employees take this training seriously. We offer some ideas about Security Awareness training here.
Most of the firms examined conducted penetration tests and vulnerability scans on systems they considered critical. Unfortunately, it appeared that a number of firms did not actually fully remediate some of the high-risk observations discovered from these tests.
This lack of remediation efforts is problematic. Vulnerabilities should be addressed immediately to reduce the risk to your network. Learn more about vulnerability assessments and penetration tests.
For the most part, the firms had policies and procedures in place to meet SEC regulatory requirements. However, some firms were not adequately conducting system maintenance, such as the installation of software patches to address security vulnerabilities and other operational safeguards to protect customer records and information. Part of the problem is the use of outdated operating systems that were no longer supported by security patches.
This is a significant oversight. It was negligence like this that led to the spread of ransomware such as WannaCry earlier this year. After a cyberattack of that scale, it is clear that patches must be completed as they come available, not as a reactive measure.
Furthermore, there are the impending requirements of GDPR. Any firms that do business with Europe (in any capacity) will be affected by these new regulations. It is important that firms are aware of what will be required of them and are actively taking measures to prepare themselves for additional compliance obligations.
Conclusion
The firms mentioned in this report have taken critical steps in protecting their network and preparing for a cyberattack. But the job is never done. All organizations – regardless of their industry – need to be constantly evolving their cybersecurity practices to stay current. It is the firms that fall behind that are most susceptible to attack.
Learn more
eSentire offers security experts to help you assess risks, develop cybersecurity roadmaps to address known gaps and build a comprehensive program that meets the requirements of your industry.
Eldon Sprickerhoff is the original pioneer and inventor of what is now referred to as Managed Detection and Response (MDR). In founding eSentire, he responded to the incipient yet rapidly growing demand for a more proactive approach to preventing and investigating information security breaches. Now with over 20 years of tactical experience, Eldon is acknowledged as a subject matter expert in information security analysis. Eldon holds a Bachelor of Mathematics, Computer Science degree from the University of Waterloo.