Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Cyber risk and advisory programs that identify security gaps and build security strategies to address them.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Seamless integration and threat investigation across your existing tech stack.
Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Extend your team capabilities and prevent business disruption with expertise from eSentire.
We balance automated blocks with rapid human-led investigations to manage threats.
Guard endpoints by isolating and remediating threats to prevent lateral spread.
Defend brute force attacks, active intrusions and unauthorized scans.
Investigation and threat detection across multi-cloud or hybrid environments.
Remediate misconfigurations, vulnerabilities and policy violations.
Investigate and respond to compromised identities and insider threats.
Stop ransomware before it spreads.
Meet regulatory compliance mandates.
Detect and respond to zero-day exploits.
End misconfigurations and policy violations.
Defend third-party and supply chain risk.
Prevent disruption by outsourcing MDR.
Adopt a risk-based security approach.
Meet insurability requirements with MDR.
Protect your most sensitive data.
Build a proven security program.
Operationalize timely, accurate, and actionable cyber threat intelligence.
THE THREAT On November 18th, 2024, Palo Alto disclosed a critical actively exploited authentication bypass zero-day vulnerability impacting Palo Alto Networks PAN-OS. The…
Nov 13, 2024THE THREAT Update: eSentire has observed multiple exploitation attempts targeting CVE-2024-8069. In real-world attacks, threat actors successfully achieved RCE and attempted to…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Three MDR package tiers are available based on per-user pricing and level of risk tolerance.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
Note: This post is part two of The Untold History of MDR; if you haven’t done so yet, be sure to check out Part I: “Collaborative Threat Management” and “Embedded Incident Response.”
It was by early 2002 that it turned out we were onto something with our approach to cybersecurity: our clients valued the peace of mind that came with knowing we were protecting them with our “Collaborative Threat Management” and “Embedded Incident Response.”
Through existing networks and word-of-mouth in the financial and legal services sectors, eSentire added more customers and brought on more team members to keep pace with the increasing demands.
It wasn’t long before we needed some real office space and in mid-2002 we moved into a unit in Cambridge, Ontario. That first office was nothing fancy: we had a server under the table, which kept the place warm in the winter but necessitated having a good A/C unit for the summer months. This setup worked really well: we were a collection of nerds at work and we didn’t need anything fancy.
This minimalist approach could occasionally create some funny scenarios. I recall one time we had signed a new customer and they had a policy of doing a walk-through of every supplier’s or partner’s office. Their rep landed in Toronto; I picked him up and drove us the hour to Cambridge to our headquarters. He walked up the stairs, strolled around the office—which must have taken all of a few minutes—and, satisfied that we were a real company with a real team and real technology, he went downstairs to the car that was waiting for him.
From that time until we packed up and moved to our new Waterloo offices, we incrementally took over the additional units in the office complex until, eventually, we occupied all available space. It worked out to five office expansions in four years and in that time we’d gone from three people to well over three hundred.
Of course, growing the “human” part of the business was only part of the story. From our inception, we’ve always strived to pair people and technology to optimally leverage and enable both.
Even in the early 2000s, security was a data problem: we always wanted more telemetry, which increased the likelihood that we would observe direct or indirect evidence of a threat; but we also needed to continually improve our ability to analyze that telemetry to spot the needle in the haystack.
Beyond the network IDS component that we introduced and new modules to acquire and analyze telemetry (whether automatically or to make our analysts more efficient), one of the first pieces of technology we built was a website to aggregate the ever-growing volume of signals we collected.
While the primary short-term intent of this utility was to make us more efficient—and it did—centralizing the signals from our customer base provided important benefits that enabled the next stage in our evolution: getting proactive.
By efficiently analyzing signals, we—and our customers—were able to benefit from a network effect: if we spotted a threat against one customer, then we could learn how to look for that threat against any and all of our other customers.
Across our ever-growing customer base—and, it should be noted, a customer base disproportionately made up of high-value targets including hedge funds, lawyers, and critical infrastructure providers—we were able to see the state of the art when it comes to cyberattacks.
Plus, it was a little bit like seeing into the future: attackers often try out particular Tactics, Techniques and Procedures (TTPs) on a smaller scale before rolling them out widely. We would see these experiments play out against one or two customers, and then we knew what we would be facing on a larger scale.
To operationalize our intelligence and apply it toward proactive defense, we developed something we came to call AMP (for “Asset Manager Protection”), which we introduced in November 2012.
AMP—which is still active today—is a threat intelligence feed which draws upon our vast network of clients and sensors. Because of our expansive visibility, AMP provides unique and earlier visibility than third-party threat intelligence feeds:
One of the most important factors behind AMP’s success is that it is manually curated by our security experts. Unlike auto-generated lists which are prone to error, this human curation practically eliminates false positives and unnecessary alerts by ensuring only active threats are included.
Of course, building a system which allowed us to truly operationalize the intelligence we gathered—that is, to collect, analyze and action at scale—was an engineering challenge and ties back to the “people plus technology” ethos I mentioned above.
Perhaps nowhere is that approach more important than building and operating a world-class Security Operations Center. Through years of diligence and discipline, we have built a robust, resilient SOC capability. In good times, our SOCs are our secret sauce. In the changing and unpredictable world of 2020, our ability to continue to operate a world-class SOC when our analysts are remote is even more critical.
Essentially, MDR is a combination of advanced threat detection technologies, extensive processes to monitor and react to those technologies and, most importantly, cybersecurity experts who decide if/when a response is needed to attacks on customers.
While we employ countless technologies to automatically locate that “needle in the haystack” of potential threats, there is no way we can 100 percent make a response decision without relying on some “grey matter” correlation.
The SOC analysts are indispensable to the MDR delivery model. We are in our nineteenth year of delivering this mode of cybersecurity, and one truism we have come to learn is that threat actors are always changing their game to evade state-of-the-art cybersecurity protective controls.
Because the human analyst has always been (and will always be) key to effective MDR service delivery, we designed our SOC and supporting business processes to enable our team while protecting them from the burn-out that plagues the industry and contributes to the well-documented global shortage in cybersecurity experts.
I won’t go too deep into the details here, because we’ve done so elsewhere, but I will briefly explore one particular example that illustrates the people plus technology model.
Our threat pooling model is core to how we manage threats. This model utilizes the equivalent of an automated call display, as found in call centers, to implement a first-in and first-out model for threat investigations. What makes it through our vast array of filtering, correlation and analytics models—which leverage proprietary machine learning technologies built and acquired over two decades—is on average one threat signal to be investigated per 1,000 raw event signals.
The threat pooling model allows us to always assign the next available analyst to the next threat to be investigated in the queue. If we have a surge of threats, we modulate the number of analysts analyzing threats versus “off board” duties. Typically, this hovers around 25 percent, but we have capacity to handle substantially more. We strive to triage threat signals within a couple of minutes against a service level objective of 20 minutes. Year over year, our average threat investigation is closed in about 10 minutes–today, even with a distributed SOC due to the pandemic, we are averaging 8.7 minutes.
Plus, by taking care of our people, we—and our customers—benefit from extremely low turnover. It’s one of those hidden differentiators that really matters over the long run.
Throughout our almost two-decade history, the spirit of innovation and the philosophy of people plus technology has allowed eSentire to be a pioneer in the cybersecurity space. In the future, these approaches will be just as important—but that’s a story for Part III.
And if you want to read more about MDR, I highly recommend Gartner’s 2020 Market Guide to Managed Detection and Response Services.
Eldon Sprickerhoff is the original pioneer and inventor of what is now referred to as Managed Detection and Response (MDR). In founding eSentire, he responded to the incipient yet rapidly growing demand for a more proactive approach to preventing and investigating information security breaches. Now with over 20 years of tactical experience, Eldon is acknowledged as a subject matter expert in information security analysis. Eldon holds a Bachelor of Mathematics, Computer Science degree from the University of Waterloo.