Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Cyber risk and advisory programs that identify security gaps and build security strategies to address them.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Seamless integration and threat investigation across your existing tech stack.
Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Extend your team capabilities and prevent business disruption with expertise from eSentire.
We balance automated blocks with rapid human-led investigations to manage threats.
Guard endpoints by isolating and remediating threats to prevent lateral spread.
Defend brute force attacks, active intrusions and unauthorized scans.
Investigation and threat detection across multi-cloud or hybrid environments.
Remediate misconfigurations, vulnerabilities and policy violations.
Investigate and respond to compromised identities and insider threats.
Stop ransomware before it spreads.
Meet regulatory compliance mandates.
Detect and respond to zero-day exploits.
End misconfigurations and policy violations.
Defend third-party and supply chain risk.
Prevent disruption by outsourcing MDR.
Adopt a risk-based security approach.
Meet insurability requirements with MDR.
Protect your most sensitive data.
Build a proven security program.
Operationalize timely, accurate, and actionable cyber threat intelligence.
THE THREAT On January 8th, Ivanti disclosed a zero-day critical vulnerability affecting Connect Secure, Policy Secure, and Neurons for ZTA gateways. CVE-2025-0282 (CVSS: 9.0)…
Jan 08, 2025THE THREAT On December 27th, Cyberhaven confirmed that a malicious version of Cyberhaven’s Chrome extension was published and briefly available on the Google Chrome Web…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Three MDR package tiers are available based on per-user pricing and level of risk tolerance.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
As a security leader, when you think of ‘unlimited logs’, what comes to mind?
For most, it’s the promise of unlimited visibility, infinite retention, and unrestricted access to log data. After all, with so many compliance frameworks to follow, so many incidents to investigate, and so much data being generated every second, having everything at your fingertips sounds like the perfect answer.
But here’s the reality: the promise of unlimited logs rarely means what you think it does.
Often, you’ll find hidden restrictions, unforeseen costs, and operational limitations that can undermine your expectations and blow your budget.
Before committing to a Managed Detection and Response (MDR) service provider that offers unlimited logs as part of their MDR solution, it’s critical to understand what’s actually being promised and what’s not.
In this blog, we break down the nuances of the ‘unlimited logs’ promise, hidden costs, and smarter approaches to log management so you can avoid pitfalls and focus on solutions that truly deliver value.
When security vendors advertise unlimited logs, the promise usually revolves around three core ideas:
But if you dig deeper into contracts and ask the right questions, you’ll likely uncover significant limitations:
The promise of unlimited logs is often less about comprehensive value and more about clever messaging. As a security leader, if you don’t investigate the fine print, you’ll risk paying far more than you anticipated for what you were promised.
The hidden costs of "unlimited" logging solutions fees may not be apparent at first glance but can add up quickly, creating headaches for security leaders trying to manage budgets and investing in more cost-effective solutions.
Here are three common traps to watch out for:
Some MDR vendors often include short-term retention (e.g., 30 days) in their base pricing, but anything beyond that can trigger hefty surcharges.
If your organization is subject to compliance requirements that mandate 6 months, 1 year, or longer retention periods, these costs can spiral out of control.
Need to investigate an incident or run a report? With some providers, every search query can come with a price tag. So, although you may have unlimited logs in theory, accessing or analyzing them could turn into a pay-per-use scenario.
What’s more, some vendors even charge for basic functionalities like logging into their portal or using APIs to integrate log data with other tools. These fees can make routine investigations costly and unpredictable.
Remember, if you want to get the benefits of true 24/7 multi-signal MDR, or even Incident Response (IR), querying and analyzing log data is critical. In many cases, this is not a one-time event; you may need to query and analyze data repeatedly for a single threat investigation.
Your Analysts or IR investigators shouldn’t feel limited in their use of logs, especially when they’re focused on collecting enough threat intel to stop cybercriminals.
Since there are multiple use cases for log data (e.g., compliance checks, debugging, or monitoring server performance), investing in a log monitoring solution that limits usage only for security teams can lead to redundant spending.
Not only will your organization waste money with this siloed approach, but you risk fragmenting your data, which may make it harder to get a complete view of your organization’s activities.
By consolidating log data into a platform that supports multiple use cases, you can improve collaboration, reduce costs, and maximize the value of your logs.
When evaluating MDR vendors, especially those that promise unlimited logs, make sure you ask detailed questions related to their log retention, access, and scoping practices. Here are some key questions to start with:
A transparent MDR provider will give straightforward answers to these questions. But, if you get vague or evasive responses, be cautious since this may signal hidden costs or limitations.
The allure of unlimited logs can be tempting, but as the saying goes, if it sounds too good to be true, it probably is. Hidden fees, siloed platforms, and limited usability often make this promise more of a burden than a benefit.
Ultimately, the key to effective log management isn’t “unlimited” data, it’s actionable data. Here’s what we recommend you should prioritize instead:
When evaluating MDR providers, ask the hard questions, prioritize usability and transparency, and choose a solution that delivers real value.
To learn about how eSentire MDR for Log can deliver critical visibility, compliance, and a system of record across your multi-cloud and hybrid environments, contact an eSentire cybersecurity specialist today.
Mark Gillett is Vice President, Product Management at eSentire. He has nearly 25 years experience in the cybersecurity industry, driving the evolution of detection, investigation, and response from the early days of SIEM to modern-day Managed Detection and Response (MDR) and Extended Detection and Response (XDR). In his current leadership role at eSentire, Mark leads the product management function for the company's core MDR services, with a specific focus on in-house developed technologies that assist in delivering those services to customers. Mark holds a Bachelor of Science degree from Laurier University in Waterloo, Canada.