News releases

eSentire launches Host Interceptor for essential east-west endpoint control

October 1, 2014 | 1 MIN READ

To be spotlighted next week at Gartner Symposium ITxpo, Host Interceptor delivers intelligent threat mitigation within the corporate network by isolating compromised devices.

NEW YORK Oct. 1, 2014 – eSentire, Inc., a leader in Active Threat Protection solutions and managed security services, today announced general availability of Host Interceptor, a new managed security service that enables the containment and control of network endpoints exhibiting malicious behavior within an enterprise. Senior eSentire executives will showcase Host Interceptor at Gartner Symposium ITxpo 2014, Oct. 5-9, in Orlando.

Host Interceptor helps prevent the spread of malware within the network, which may otherwise elude containment. Working in conjunction with eSentire’s flagship Network Interceptor, Host Interceptor leverages technology and human-driven analysis to identify and isolate compromised devices, and augments eSentire’s endpoint behavioral analysis; a key pillar of Gartner Research’s Advanced Threat Defense architecture.

“The pervasiveness of diverse devices creates a new threat frontier where more mobile phones, tablets and other devices are permitted within the network. Host Interceptor mitigates this critical threat head-on,” said eSentire Chief Technology Officer Mark McArdle. “Host Interceptor provides an important capability to control endpoint behavior and enables our Security Operations Center to isolate compromised devices affecting client networks.”

Host Interceptor:

eSentire is the leading managed security service provider to more than 450 financial services firms, legal, extractive and healthcare organizations. eSentire pioneered Continuous Advanced Threat Protection, which leading analyst firm Gartner Research began covering in June 2014 as a best practices framework for defending against the most egregious cyber security attacks. eSentire delivers continuous monitoring, real-time threat detection and containment technology as a service with human threat analysts on a 24x7x365 basis. The company challenges legacy security approaches, combining behavior-based analytics, immediate mitigation and advanced threat intelligence.