Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Cyber risk and advisory programs that identify security gaps and build security strategies to address them.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Seamless integration and threat investigation across your existing tech stack.
Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Extend your team capabilities and prevent business disruption with expertise from eSentire.
We balance automated blocks with rapid human-led investigations to manage threats.
Guard endpoints by isolating and remediating threats to prevent lateral spread.
Defend brute force attacks, active intrusions and unauthorized scans.
Investigation and threat detection across multi-cloud or hybrid environments.
Remediate misconfigurations, vulnerabilities and policy violations.
Investigate and respond to compromised identities and insider threats.
Stop ransomware before it spreads.
Meet regulatory compliance mandates.
Detect and respond to zero-day exploits.
End misconfigurations and policy violations.
Defend third-party and supply chain risk.
Prevent disruption by outsourcing MDR.
Adopt a risk-based security approach.
Meet insurability requirements with MDR.
Protect your most sensitive data.
Build a proven security program.
Operationalize timely, accurate, and actionable cyber threat intelligence.
THE THREAT On November 18th, 2024, Palo Alto disclosed a critical actively exploited authentication bypass zero-day vulnerability impacting Palo Alto Networks PAN-OS. The…
Nov 13, 2024THE THREAT Update: eSentire has observed multiple exploitation attempts targeting CVE-2024-8069. In real-world attacks, threat actors successfully achieved RCE and attempted to…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Three MDR package tiers are available based on per-user pricing and level of risk tolerance.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
Natural disasters aren’t wholly dedicated to any single season. Tornadoes can occur at any time, but generally occur from March through to June. Fire season generally runs from October to January. Earthquakes can occur at any time. The Atlantic hurricane season usually lasts half the year (between June and November), where we presently are once again. Depending where you live, these natural disasters may not directly affect you (or may be less likely than other locales), but it’s certainly a good time to consider how your business would react in the case of a natural disaster. Do you have a plan in place? Has that plan been communicated to all employees at your company? Hopefully the answer to both those questions is “yes.” Either way though, we’re here to talk about a few less obvious aspects of cybersecurity preparedness. Besides a Disaster Recovery/Business Continuity Plan (DR/BCP) and associated physical security concerns (which is of the utmost importance), we’ve highlighted some things to consider.
If you have a BCP, hopefully you’ve an evacuation plan. It’s important to know exactly if and how business will carry on in the event of an evacuation (or emergency in general). Do all your employees have VPN access? If so, is the expectation that all employees will go home and continue working? Do you have sufficient hardware and licenses? What if the roads are closed – where do your employees go?
Another important consideration is communication. How will employees be updated throughout the disaster? Is there a central point of contact within the company that all internal and external communications should be directed?
In addition to communication, there needs to be an overall understanding among all employees about the impact of a natural disaster on business. Your employees should know what to do and what to expect before disaster strikes.
In case DR/BCP weren’t enough, there are a few more acronyms you should be familiar with. Each of these refers to an amount of time in which the firm can determine sufficient “downtime” for different systems within the firm.
Recovery Point Objective (RPO) - the point in time in the past to which you will recover. For example, if the RPO is one hour, backups must be made at least once per hour. In this situation, the most data you would worry about losing is anything from the last hour.
Recovery Time Objective (RTO) - the point in time in the future at which you will be up and running again.
Interruption Window - the maximum time allowed for restoration of critical systems so that its business goals are not negatively affected.
Maximum Tolerable Period of Disruption (MTPOD) - the maximum amount of time that a company’s key products or services can be unavailable or undeliverable after a disruption before its impact is deemed unacceptable.
For each critical system, the CTO should have a well-defined (and accepted) value of RPO, RTO, and MTPOD.
Emergency situations are naturally very chaotic. This can mean an increase in the likelihood of sensitive data being accidentally leaked. Amid confusion, employees are unlikely to place high priority on information security, yet these are precisely the moments cybercriminals may choose to test your cybersecurity defenses in creative and relevant ways. Here’s three things to watch out for online during a natural disaster:
1) Phishing scams disguised as charitable donations
Cybercriminals have been known to take advantage of compassionate people who want to help in a time of need. If a website is asking you to provide credit card information, make sure that it’s a valid site and organization.
2) Photos or videos that claim to be “just released” or “exclusive”
A photo or video that claims to be “never before seen” may actually lead you to click on a malicious link. This goes the same for websites offering exclusive information about the disaster. Always look for signs that the link you’re about to click on is legitimate, and remember that if something is truly worth seeing, you’ll probably be able to find it on a site you know is reputable. Cybercriminals will also take advantage of trending topics to spread malware, so remember that just because a post has “#hurricane,” it doesn’t mean that it’s safe to click.
3) Posts or messages from “friends” on social networks
Cybercriminals can hack into accounts and send fraudulent messages to everyone in the victim’s list of contacts. Remember, just because the messages seem somewhat tailored to the recipient, it doesn’t mean they won’t contain malicious links or files. If you’re ever unsure, contact your friend directly to confirm they sent the message through a different means of communication.
There’s a lot to worry about during a natural disaster, and trying to think of everything may feel impossible. Fortunately, your security provider can help you. For example, during Hurricane Sandy in 2012, eSentire saw an increase in a certain amount of inbound attacks against clients across the Northeast USA. After investigating, we identified these attacks as fraudulent and alerted our clients to the possible danger.
With eSentire, each client has a sensor, and our Security Operations Center (SOC) is alerted when a client’s sensor becomes unreachable. If this happens, we immediately escalate the situation to confirm what is causing the sensor outage and reach out to the client to alert them. From there we can help the client with their escalation and emergencies procedures to ensure no data is lost in the event of a natural disaster.
These situations are difficult and responding to them can be stressful. With Managed Detection and Response service, our SOC can be a great resource to monitor operations when you can’t. We’ve got your back. Let us know what we can do to help.
Eldon Sprickerhoff is the original pioneer and inventor of what is now referred to as Managed Detection and Response (MDR). In founding eSentire, he responded to the incipient yet rapidly growing demand for a more proactive approach to preventing and investigating information security breaches. Now with over 20 years of tactical experience, Eldon is acknowledged as a subject matter expert in information security analysis. Eldon holds a Bachelor of Mathematics, Computer Science degree from the University of Waterloo.