CINXE.COM
eSentire | Stop Ransomware Before It Spreads
<!doctype html> <html lang="en-US"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <meta name="robots" content="noodp,noydir"> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-57Z6ZWR'); </script> <!-- End Google Tag Manager --> <script> (function () { var zi = document.createElement('script'); zi.type = 'text/javascript'; zi.async = true; zi.src = 'https://ws.zoominfo.com/pixel/3k8XsFBkOniCq5dTRwpV'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(zi, s); })(); </script> <link rel="stylesheet" href="/style.css?v=4.11.57"> <link rel="stylesheet" href="https://unpkg.com/aos@2.3.1/dist/aos.css"> <link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/swiper@9/swiper-bundle.min.css"/> <link rel="shortcut icon" href="https://esentire-dot-com-assets.s3.ca-central-1.amazonaws.com/assetsV4/External/blue_favicon_48x48.ico?v=2024"> <link rel="stylesheet" href="https://use.typekit.net/evh1ctd.css"> <link rel="stylesheet" href="https://use.typekit.net/amm2djb.css"> <!-- Start VWO SmartCode --> <script referrerPolicy="no-referrer-when-downgrade" src="https://dev.visualwebsiteoptimizer.com/lib/780243.js" id="vwoCode"></script> <!-- End VWO SmartCode --> <title>eSentire | Stop Ransomware Before It Spreads</title><meta name="generator" content="SEOmatic"> <meta name="description" content="Stop ransomware attacks before they spread. Learn how eSentire MDR hunts, investigates, and stops ransomware attacks before they disrupt your business."> <meta name="referrer" content="no-referrer-when-downgrade"> <meta name="robots" content="all"> <meta content="https://www.facebook.com/eSentireMDR/" property="fb:profile_id"> <meta content="en_US" property="og:locale"> <meta content="eSentire" property="og:site_name"> <meta content="website" property="og:type"> <meta content="https://www.esentire.com/how-we-do-it/use-cases/ransomware" property="og:url"> <meta content="Stop Ransomware Before It Spreads" property="og:title"> <meta content="Stop ransomware attacks before they spread. Learn how eSentire MDR hunts, investigates, and stops ransomware attacks before they disrupt your business." property="og:description"> <meta content="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV3/External/SEO/esentire-ransomware-meta.jpg" property="og:image"> <meta content="eSentire - The Authority in Managed Detection and Response" property="og:image:alt"> <meta name="twitter:card" content="summary_large_image"> <meta name="twitter:site" content="@eSentire"> <meta name="twitter:creator" content="@eSentire"> <meta name="twitter:title" content="Stop Ransomware Before It Spreads"> <meta name="twitter:description" content="Stop ransomware attacks before they spread. Learn how eSentire MDR hunts, investigates, and stops ransomware attacks before they disrupt your business."> <meta name="twitter:image" content="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV3/External/SEO/esentire-ransomware-meta.jpg"> <meta name="twitter:image:alt" content="eSentire - The Authority in Managed Detection and Response"> <link href="https://www.esentire.com/how-we-do-it/use-cases/ransomware" rel="canonical"> <link href="https://www.esentire.com" rel="home"></head> <body class="no-sidebar useCasesV3"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-57Z6ZWR" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Set Cookie for GCLID tracking --> <script type="text/javascript"> function readCookie(c_name) { var c_value = document.cookie; var c_start = c_value.indexOf(" " + c_name + "="); if (c_start == -1) { c_start = c_value.indexOf(c_name + "="); } if (c_start == -1) { c_value = null; } else { c_start = c_value.indexOf("=", c_start) + 1; var c_end = c_value.indexOf(";", c_start); if (c_end == -1) { c_end = c_value.length; } c_value = unescape(c_value.substring(c_start, c_end)); } return c_value; } function setCookie(a, d, b) { var c = new Date; c.setTime(c.getTime() + 864E5 * b); b = "; expires=" + c.toGMTString(); document.cookie = a + "=" + d + b } function getParam(a) { return (a = RegExp("[?&]" + a + "=([^&]*)").exec(window.location.search)) && decodeURIComponent(a[1].replace(/\+/g, " ")) } if (getParam("gclid")) { setCookie("gclid", getParam("gclid"), 270); }; if (getParam("utm_source")) { setCookie("utm_source", getParam("utm_source"), 270); }; if (getParam("utm_medium")) { setCookie("utm_medium", getParam("utm_medium"), 270); }; if (getParam("utm_campaign")) { setCookie("utm_campaign", getParam("utm_campaign"), 270); }; if (getParam("utm_content")) { setCookie("utm_content", getParam("utm_content"), 270); }; if (getParam("kpid")) { setCookie("kpid", getParam("kpid"), 270); }; if (getParam("sfcampaignid")) { setCookie("sfcampaignid", getParam("sfcampaignid"), 270) }; if (getParam("msclid")) { setCookie("msclid", getParam("msclid"), 270) }; if (getParam("li_fat_id")) { setCookie("li_fat_id", getParam("li_fat_id"), 270) }; </script> <!-- Block: NavBar --> <div class="NavBar"> <div class="NavBar__Content"> <div class="NavBar__Left"> <a class="NavBar__Logo" href="https://www.esentire.com"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 230 32" xml:space="preserve"><path d="M55.8 22c0 1.6-.3 3-1 4.2-.6 1.2-1.5 2.3-2.6 3.1-1.1.9-2.4 1.5-3.8 1.9-1.5.4-3 .6-4.6.6-2.4 0-4.5-.3-6.5-.9-1.9-.6-3.7-1.7-5.3-3.3l4.9-4.9c.8.8 1.9 1.4 3.1 1.7 1.2.3 2.5.5 3.8.5 3 0 4.4-.9 4.4-2.8 0-.8-.2-1.4-.6-1.8-.4-.4-1.1-.7-2-.8l-3.7-.5c-2.8-.4-4.8-1.3-6.2-2.8-1.4-1.5-2.1-3.6-2.1-6.3 0-1.4.2-2.7.8-4 .5-1.2 1.3-2.3 2.2-3.1 1-.9 2.2-1.6 3.5-2.1 1.4-.5 3-.7 4.7-.7 2.2 0 4.2.3 5.9.8 1.7.6 3.3 1.6 4.5 2.9l-4.8 4.8c-.4-.5-1-.8-1.6-1.1-.5-.2-1.1-.4-1.6-.5-.5-.1-1-.2-1.5-.2h-1.2c-.6 0-1.2.1-1.7.3-.4.2-.8.4-1.2.7-.3.3-.5.6-.7.9-.1.3-.2.7-.2 1 0 .2.1.5.1.7.1.3.3.5.5.7.2.2.5.4.8.6.4.2.9.3 1.3.4l3.7.5c2.7.4 4.8 1.2 6.1 2.6.8.8 1.4 1.8 1.8 2.9.6 1.4.8 2.7.8 4m7.4 9.6V.3h21v6.9H70.8v5.2h11.5v6.9H70.8v5.5h13.4v6.8h-21zm46.4 0-9.9-15.7v15.7h-7.6V.3h6.6l9.9 15.8V.3h7.6v31.3h-6.6zm28.8-24.5v24.4h-7.6V7.1h-7.6V.2H146v6.9h-7.6zm14.5 24.5V.3h7.6v31.3h-7.6zm31.9 0L179.3 20h-2.6v11.6h-7.6V.3h12.3c1.6 0 3.1.3 4.5.9 1.2.5 2.4 1.3 3.3 2.3.9.9 1.6 2 2 3.2.4 1.2.7 2.5.7 3.7 0 1-.1 2-.4 2.9-.3.8-.7 1.6-1.2 2.3-.5.7-1 1.2-1.6 1.7-.6.5-1.2.9-1.8 1.2l6.7 13.1h-8.8zm-.4-21.2c0-.8-.3-1.6-.9-2.2-.6-.6-1.4-1-2.4-1h-4.3v6.3h4.3c1 0 1.9-.3 2.4-1 .6-.5.9-1.3.9-2.1M200 31.6V.3h21v6.9h-13.4v5.2h11.5v6.9h-11.5v5.5H221v6.9l-21-.1zM22.7 3.9C19.8.2 14.9.2 14.9.2H10S5.1.2 2.2 3.9C.4 6.2 0 8.4 0 9.9V22c0 1.5.4 3.7 2.2 5.9C5 31.6 10 31.6 10 31.6h14.9v-7H11.4s-2 0-3.1-1.5c-.5-.7-.8-1.5-.9-2.4v-1.4h17.3V9.9c.1-1.5-.3-3.7-2-6M7.5 10.6c0-.9.3-1.7.9-2.4 1.2-1.5 3.1-1.5 3.1-1.5h2s2 0 3.1 1.5c.5.7.8 1.5.9 2.4v1.8h-10v-1.8zm218.3 15.7c1.5 0 2.7 1.2 2.7 2.7s-1.2 2.7-2.7 2.7c-1.5 0-2.7-1.2-2.7-2.7 0-1.5 1.2-2.7 2.7-2.7zm0 4.7c1.1 0 2.1-.9 2.1-2.1 0-1.1-.9-2.1-2.1-2.1-1.1 0-2.1.9-2.1 2.1 0 1.2.9 2.1 2.1 2.1zm-1.1-.7v-2.7h1.1c.8 0 1 .5 1 .8 0 .4-.2.7-.6.8l.7 1.1h-.6l-.7-1h-.4v1h-.5zm1-1.5c.4 0 .6-.1.6-.4 0-.3-.2-.4-.5-.4h-.5v.8h.4z" style="fill:#19234d"></path></svg> </a> </div> <div class="NavBar__Right"> <div class="NavBar__MobileGetStarted"> <a href="/get-started">Get Started</a> </div> <div class="NavBar__MainItems"> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="whatWeDo">What We Do</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="howWeDo">How We Do It</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="resources">Resources</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="company">Company</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="partners">Partners</div> </div> </div> <div class="NavBar__SecondaryItems"> <div class="NavBar__ButtonSubtleTriggerContainer NavBar__ButtonSubtleTriggerContainer--HideMobile"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleSearchIcon NavBar__ButtonSubtleTrigger" data-nav="search"> <svg data-name="New Layer" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" style="width: 26px;"><ellipse cx="12.18" cy="12.42" rx="10.18" ry="10.42" fill="none" stroke="#000" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2.5"></ellipse><path fill="none" stroke="#000" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2.5" d="M20.45 20.23L30 30"></path></svg> </div> </div> <div class="NavBar__ButtonGetStarted"> <div id="NavBar__Button-GetStarted" class="NavBar__ButtonSubtleTrigger NavBar__Button" data-nav="getStarted"> Get Started <svg class="NavBar__Button--Close" xmlns="http://www.w3.org/2000/svg" width="17.081" height="7.498" viewBox="0 0 17.081 7.498"> <path id="Path_34" data-name="Path 34" d="M1156.073,389.624l7.959,5.685,7.959-5.685" transform="translate(-1155.492 -388.811)" fill="none" stroke="#fff" stroke-linejoin="round" stroke-width="2"/> </svg> </div> </div> <button class="NavBar__MobileNavicon" data-mobile-nav-toggle> <span class="navicon"></span> </button> </div> </div> </div> <div class="NavBar__MobileDropdown" data-mobile-nav> <div class="NavBar__MobileButtons"> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="whatWeDo"> What we do <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="howWeDo"> How we do it <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="resources"> Resources <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="company"> Company <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="partners"> Partners <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> </div> <div class="NavBar__MobileCTA"> <a href="/get-started" class="NavBar__MobileCTAButton">Get Started</a> </div> </div> </div> <!-- WHAT WE DO --> <div class="WhatWeDo NavBar__SubMenu" data-menu="whatWeDo"> <div class="WhatWeDo__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">What We Do</div> </div> <div class="WhatWeDo__Content"> <div class="WhatWeDo__Links"> <h6>ESENTIRE SERVICES</h6> <a href="/what-we-do/esentire-managed-detection-and-response" class="WhatWeDo__LinksIconBox WhatWeDo__LinksIconBox--WithSubLinks"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/mdr_nav_1.png" alt="MDR Icon"> <div> <h5>Managed Detection and Response</h5> <p>Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.</p> </div> </a> <div class="WhatWeDo__LinksIconBoxInner"> <a href="/what-we-do/esentire-managed-detection-and-response"> <h5>All-In-One MDR Solution →</h5> </a> <a href="/what-we-do/esentire-managed-detection-and-response/microsoft-mdr"> <h5>MDR for Microsoft →</h5> </a> <a href="/what-we-do/esentire-managed-detection-and-response/mdr-for-genai"> <h5>MDR for GenAI →</h5> </a> </div> <a href="/what-we-do/digital-forensics-and-incident-response" class="WhatWeDo__LinksIconBox"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/dfir_nav_1.png" alt="DFIR Icon"> <div> <h5>Digital Forensics and Incident Response</h5> <p>Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.</p> </div> </a> <a href="/what-we-do/exposure-vulnerability-and-risk-management" class="WhatWeDo__LinksIconBox"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/exposure_nav_1.png" alt="Exposure Vulnerability and Risk Management Icon"> <div> <h5>Exposure Management Services</h5> <p>Cyber risk and advisory programs that identify security gaps and build security strategies to address them.</p> </div> </a> </div> <div class="WhatWeDo__Links"> <h6>PLATFORM, PEOPLE AND RESPONSE</h6> <div class="WhatWeDo__LinksBox"> <div class="WhatWeDo__LinksBoxLeft"> <a href="/what-we-do/security-operations-center"> <h5>Security Operations Center (SOC)</h5> <p>24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.</p> </a> <a href="/what-we-do/xdr-extended-detection-and-response"> <h5>Extended Detection and<br> Response (XDR)</h5> <p>XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.</p> </a> <a href="/what-we-do/mdr-integrations"> <h5>Technology Integrations</h5> <p>Seamless integration and threat investigation across your existing tech stack.</p> </a> </div> <div class="WhatWeDo__LinksBoxRight"> <a href="/what-we-do/threat-response-unit"> <h5>Threat Response Unit (TRU)</h5> <p>Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.</p> </a> <a href="/what-we-do/cyber-resilience-team"> <h5>Cyber Resilience Team</h5> <p>Extend your team capabilities and prevent business disruption with expertise from eSentire.</p> </a> <a href="/what-we-do/esentire-managed-detection-and-response/response-and-remediation"> <h5>Response and Remediation</h5> <p>We balance automated blocks with rapid human-led investigations to manage threats.</p> </a> </div> </div> </div> </div> </div> </div> <!-- HOW WE DO IT --> <div class="HowWeDo NavBar__SubMenu" data-menu="howWeDo"> <div class="HowWeDo__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">How We Do</div> </div> <div class="HowWeDo__Content"> <div class="HowWeDo__Links HowWeDo__Links-Icons"> <h6>24/7 MDR SIGNALS</h6> <a href="/how-we-do-it/signals/mdr-for-endpoint"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 58 58"><defs><style>.cls-endpointherosv1{fill:#fff}</style></defs><g id="Layer_2"><g id="Layer_2-2"><g id="Component_2459_7"><path id="Path_5133" d="M29 0c16 0 29 13 29 29S45 58 29 58 0 45 0 29 13 0 29 0Z" style="fill:#7f4ee5"/><g id="Group_1494"><g id="Group_1493"><path id="Path_5109" d="M45 38.6c-.4 0-.8-.4-.8-.8V16.7c0-.2-.2-.4-.4-.4H14.3c-.2 0-.4.2-.4.4v21.1c0 .4-.3.8-.7.9s-.8-.3-.9-.7V16.7c0-1.1.9-2 2-2h29.5c1.1 0 2 .9 2 2v21.1c0 .4-.4.8-.8.8" class="cls-endpointherosv1"/><path id="Path_5110" d="M24.1 38.6H10.6c-.4 0-.8-.4-.7-.9 0-.4.3-.7.7-.7h13.5c.4 0 .8.3.9.7s-.3.8-.7.9h-.2" class="cls-endpointherosv1"/><path id="Path_5111" d="M47.4 38.6H33.9c-.4 0-.8-.4-.7-.9 0-.4.3-.7.7-.7h13.5c.4 0 .8.3.9.7s-.3.8-.7.9h-.2" class="cls-endpointherosv1"/><path id="Path_5112" d="M46.1 43.4H11.9c-1.1 0-2-.9-2-2v-3.6c0-.4.3-.8.7-.9s.8.3.9.7v3.8c0 .2.2.4.4.4h34.3c.2 0 .4-.2.4-.4v-3.6c0-.4.4-.8.9-.7.4 0 .7.3.7.7v3.6c0 1.1-.9 2-2 2" class="cls-endpointherosv1"/><path id="Path_5113" d="M33.8 40.2h-9.6c-.4 0-.8-.4-.8-.8v-1.6c0-.4.3-.8.7-.9s.8.3.9.7v1h8v-.8c0-.4.4-.8.9-.7.4 0 .7.3.7.7v1.6c0 .4-.4.8-.8.8" class="cls-endpointherosv1"/><path id="Path_5114" d="M18.6 24.2c-.4 0-.8-.4-.8-.8v-3.2c0-.4.3-.8.7-.9.4 0 .8.3.9.7v3.3c0 .4-.4.8-.8.8" class="cls-endpointherosv1"/></g></g></g></g></g></svg><div> <h5>Endpoint</h5> <p>Guard endpoints by isolating and remediating threats to prevent lateral spread.</p> </div> </a> <a href="/how-we-do-it/signals/mdr-for-network"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 58 58"><defs><path d="M15.6 13.7h26.9v30.7H15.6z" style="fill:none"/><style>.cls-Networkherosv2{fill:#fff}</style></defs><g id="Layer_2"><g id="Layer_2-2"><g id="Component_2459_8"><path id="Path_5133-2" d="M29 0c16 0 29 13 29 29S45 58 29 58 0 45 0 29 13 0 29 0Z" style="fill:#6c67d5"/><g id="Group_1502"><g id="Group_1501"><path id="Path_5139" d="M40.8 44.3H17.3c-.9 0-1.7-.8-1.7-1.7V15.3c0-.9.8-1.7 1.7-1.7h23.5c.9 0 1.7.8 1.7 1.7v27.3c0 .9-.8 1.7-1.7 1.7M17.2 15.1c-.2 0-.3.1-.3.3v27.3c0 .2.1.3.3.3h23.5c.2 0 .3-.1.3-.3V15.3c0-.2-.1-.3-.3-.3H17.2Z" class="cls-Networkherosv2"/><path id="Path_5140" d="M41.7 24.6H16.2c-.4 0-.7-.3-.7-.7 0-.4.3-.7.7-.7h25.5c.4 0 .7.3.7.7 0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5141" d="M20.1 21.4c-.4 0-.7-.3-.7-.7v-2.5c0-.4.3-.7.7-.7s.7.3.7.7v2.5c0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5142" d="M20.1 31c-.4 0-.7-.3-.7-.7v-2.5c0-.4.3-.7.7-.7s.7.3.7.7v2.5c0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5143" d="M20.1 40.5c-.4 0-.7-.3-.7-.7v-2.5c0-.4.3-.7.7-.7s.7.3.7.7v2.5c0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5144" d="M41.7 34.8H16.2c-.4 0-.7-.3-.7-.7 0-.4.3-.7.7-.7h25.5c.4 0 .7.3.7.7s-.3.7-.7.7" class="cls-Networkherosv2"/></g></g></g></g></g></svg> <div> <h5>Network</h5> <p>Defend brute force attacks, active intrusions and unauthorized scans.</p> </div> </a> <a href="/how-we-do-it/signals/mdr-for-log"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><path d="M16 0c8.84 0 16 7.16 16 16s-7.16 16-16 16S0 24.84 0 16 7.16 0 16 0Z" style="stroke-width:0;fill:#687dd5"/><path d="M22.16 12.23a.278.278 0 0 0-.07-.23l-4.17-4.17a.235.235 0 0 0-.25-.06c-.03 0-.05-.01-.08-.01H12.4a.476.476 0 0 0-.48.47v13.46a.476.476 0 0 0 .48.48h9.29a.476.476 0 0 0 .48-.48V12.24m-4.18-3.6 3.29 3.29H18V8.64Zm3.66 13.01h-9.21V8.27h5.04v3.91c0 .14.12.26.26.26h3.91v9.22Zm-2.06 2.6h-9.28a.476.476 0 0 1-.48-.48V10.31c0-.26.21-.48.47-.48h.47c.14 0 .26.11.26.26s-.11.26-.26.26h-.43v13.38h9.2v-.44c0-.14.11-.26.26-.26s.26.11.26.26v.48a.476.476 0 0 1-.48.48m.24-4.52c-.14 0-.26-.12-.26-.26v-1.39c0-.14.11-.26.26-.26s.26.11.26.26v1.39c0 .14-.12.26-.26.26" style="fill:#fff;stroke-width:0"/></svg> <div> <h5>Log</h5> <p>Investigation and threat detection across multi-cloud or hybrid environments.</p> </div> </a> <a href="/how-we-do-it/signals/cloud"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><path d="M16 0c8.84 0 16 7.16 16 16s-7.16 16-16 16S0 24.84 0 16 7.16 0 16 0Z" style="stroke-width:0;fill:#40C3D9"/><path d="M20.52 21.64h-9.68c-2.06 0-3.72-1.69-3.72-3.75 0-1.52.93-2.88 2.34-3.45-.02-.2-.04-.39-.04-.59a5.416 5.416 0 0 1 5.34-5.49 5.423 5.423 0 0 1 5.14 3.5h.12c2.69 0 4.86 2.2 4.85 4.89 0 2.42-1.5 4.88-4.35 4.89ZM14.84 8.87c-2.71 0-4.91 2.2-4.91 4.91v.06c0 .24.02.48.06.72.02.12-.05.24-.17.28-1.69.57-2.59 2.4-2.03 4.09a3.204 3.204 0 0 0 3.04 2.19h9.66c2.54 0 3.87-2.21 3.87-4.38 0-2.41-1.94-4.37-4.35-4.38-.09 0-.17 0-.26.02a.262.262 0 0 1-.27-.17c-.67-2-2.55-3.34-4.66-3.34m6.64 8.91v-1.53c0-.14-.11-.25-.25-.25s-.25.11-.25.25v1.53c0 .14.11.25.25.25s.25-.11.25-.25" style="fill:#fff;stroke-width:0"/></svg> <div> <h5>Cloud</h5> <p>Remediate misconfigurations, vulnerabilities and policy violations.</p> </div> </a> <a href="/how-we-do-it/signals/identity"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" data-name="Layer 2" version="1.1" viewBox="0 0 58 58"><defs><clipPath id="clippath"><path d="M12.9 14.8h32.3v28.5H12.9z" style="stroke-width:0;fill:none"/></clipPath><style>.clsInsider-threat-4{stroke-width:0;fill:#fff}</style></defs><g id="Layer_2-2" data-name="Layer 2-2"><g id="Component_2459_11" data-name="Component 2459 11"><path id="Path_5133-5" d="M29 0c16 0 29 13 29 29S45 58 29 58 0 45 0 29 13 0 29 0Z" data-name="Path 5133-5" style="fill:#2cb1e2;stroke-width:0"/><g id="Group_1790" data-name="Group 1790" style="clip-path:url(#clippath)"><g id="Group_1789" data-name="Group 1789"><path id="Path_5151" d="M43.4 43.2H14.6c-1 0-1.8-.8-1.8-1.8V20.7c0-1 .8-1.8 1.8-1.8h28.7c1 0 1.8.8 1.8 1.8v20.7c0 1-.8 1.8-1.8 1.8M14.6 20.5c-.2 0-.3.1-.3.3v20.7c0 .2.1.3.3.3h28.7c.2 0 .3-.1.3-.3V20.8c0-.2-.1-.3-.3-.3H14.6Z" class="clsInsider-threat-4" data-name="Path 5151"/><path id="Path_5152" d="M44.4 29.2H13.6c-.4 0-.7-.3-.7-.7s.3-.7.7-.7h30.8c.4 0 .7.3.7.7s-.3.7-.7.7" class="clsInsider-threat-4" data-name="Path 5152"/><path id="Path_5153" d="M34.4 20.5c-.4 0-.7-.3-.7-.7v-2.1c0-.8-.6-1.4-1.4-1.4h-6.4c-.8 0-1.4.6-1.4 1.4v2.1c0 .4-.3.7-.7.7s-.7-.3-.7-.7v-2.1c0-1.6 1.3-2.9 2.9-2.9h6.4c1.6 0 2.9 1.3 2.9 2.9v2.1c0 .4-.3.7-.7.7" class="clsInsider-threat-4" data-name="Path 5153"/><path id="Path_5154" d="M29 26.4c-.4 0-.7-.3-.7-.7V23c0-.4.3-.7.7-.7s.7.3.7.7v2.7c0 .4-.3.7-.7.7" class="clsInsider-threat-4" data-name="Path 5154"/></g></g></g></g></svg> <div> <h5>Identity</h5> <p>Investigate and respond to compromised identities and insider threats.</p> </div> </a> </div> <div class="HowWeDo__RightLinks"> <div class="HowWeDo__Links"> <h6>INDUSTRIES</h6> <a href="/how-we-do-it/industries/insurance-cybersecurity"> <h5>Insurance</h5> </a> <a href="/how-we-do-it/industries/construction-cybersecurity"> <h5>Construction</h5> </a> <a href="/how-we-do-it/industries/financial-services-cybersecurity"> <h5>Finance</h5> </a> <a href="/how-we-do-it/industries/legal-cybersecurity"> <h5>Legal</h5> </a> <a href="/how-we-do-it/industries/manufacturing-cybersecurity"> <h5>Manufacturing</h5> </a> <a href="/how-we-do-it/industries/private-equity-cybersecurity"> <h5>Private Equity</h5> </a> <a href="/how-we-do-it/industries/healthcare-cybersecurity"> <h5>Healthcare</h5> </a> <a href="/how-we-do-it/industries/retail-cybersecurity"> <h5>Retail</h5> </a> <a href="/how-we-do-it/industries/food-supply-cybersecurity"> <h5>Food Supply</h5> </a> <a href="/how-we-do-it/industries/state-local-governments-cybersecurity"> <h5>Government and Education</h5> </a> <a href="/how-we-do-it/industries/automotive-dealerships"> <h5>Automotive Dealerships</h5> </a> </div> <div class="HowWeDo__Links"> <h6>USE CASES</h6> <div class="HowWeDo__Links-2"> <a href="/how-we-do-it/use-cases/ransomware"> <h5>Ransomware</h5> <p>Stop ransomware before it spreads.</p> </a> <a href="/how-we-do-it/use-cases/cybersecurity-compliance"> <h5>Cybersecurity Compliance</h5> <p>Meet regulatory compliance mandates.</p> </a> <a href="/how-we-do-it/use-cases/zero-day-exploits"> <h5>Zero Day Attacks</h5> <p>Detect and respond to zero-day exploits.</p> </a> <a href="/how-we-do-it/use-cases/cloud-misconfiguration-breaches"> <h5>Cloud Misconfiguration</h5> <p>End misconfigurations and policy violations.</p> </a> <a href="/how-we-do-it/use-cases/third-party-cyber-risk"> <h5>Third-Party Risk</h5> <p>Defend third-party and supply chain risk.</p> </a> <a href="/how-we-do-it/use-cases/mdr-outsourcing"> <h5>Do More With Less</h5> <p>Prevent disruption by outsourcing MDR.</p> </a> <a href="/how-we-do-it/use-cases/cyber-risk-management"> <h5>Cyber Risk</h5> <p>Adopt a risk-based security approach.</p> </a> <a href="/how-we-do-it/use-cases/meet-cyber-insurance-requirements"> <h5>Cyber Insurance</h5> <p>Meet insurability requirements with MDR.</p> </a> <a href="/how-we-do-it/use-cases/sensitive-data"> <h5>Sensitive Data Security</h5> <p>Protect your most sensitive data.</p> </a> <a href="/how-we-do-it/use-cases/security-leadership"> <h5>Security Leadership</h5> <p>Build a proven security program.</p> </a> <a href="/how-we-do-it/use-cases/cyber-threat-intelligence"> <h5>Cyber Threat Intelligence</h5> <p>Operationalize timely, accurate, and actionable cyber threat intelligence.</p> </a> </div> </div> </div> </div> <div class="HowWeDo__Box"> <div class="HowWeDo__BoxInner"> <div class="HowWeDo__BoxLeft"> <div class="HowWeDo__Links"> <a href="/how-we-do-it/mdr-pricing-packaging"> <h5>MDR Pricing</h5> <p>Three MDR package tiers are available based on per-user pricing and level of risk tolerance to enhance your existing defenses and resources.</p> </a> </div> </div> <div class="HowWeDo__BoxRight"> <a href="/how-we-do-it/mdr-pricing-packaging">EXPLORE MDR PACKAGES <span>→</span></a> </div> </div> </div> </div> </div> <!-- Resources --> <div class="Resources NavBar__SubMenu" data-menu="resources"> <div class="Resources__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Resources</div> </div> <div class="Resources__Content"> <div class="Resources__BlogResources"> <div class="Resources__Links Resources__Links-Blogs"> <div> <h6>From The Blog</h6> <a href="https://www.esentire.com/blog/bored-beavertail-invisibleferret-yacht-club-a-lazarus-lure-pt-2"> <span class="Resources__Eyebrow">Nov 14, 2024</span> <h5>Bored BeaverTail & InvisibleFerret Yacht Club – A Lazarus Lure Pt.2 </h5> </a> <a href="https://www.esentire.com/blog/bored-beavertail-yacht-club-a-lazarus-lure"> <span class="Resources__Eyebrow">Oct 17, 2024</span> <h5>Bored BeaverTail Yacht Club – A Lazarus Lure </h5> </a> <a href="https://www.esentire.com/blog/cybersecurity-spending-where-to-allocate-your-budget-in-2025"> <span class="Resources__Eyebrow">Oct 17, 2024</span> <h5>Cybersecurity Spending: Where to Allocate Your Budget in 2025 </h5> </a> </div> <div class="Resources__BoxCTA"> <a href="/resources/blog"> VIEW ARTICLES <span>→</span> </a> </div> </div> <div class="Resources__Links"> <div class="Resources__Links Resources__Links-Library"> <h6>Resources</h6> <a href="/resources/mdr-and-cybersecurity-case-studies"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsCaseStudiesIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1940"><circle id="Ellipse_16" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1906"><path id="Path_5883" d="M20.3 22.37c-1.12 0-2.03-.91-2.03-2.03 0-1.12.91-2.03 2.03-2.03s2.03.91 2.03 2.03c0 1.12-.91 2.03-2.03 2.03m0-3.47c-.8 0-1.44.64-1.44 1.44s.64 1.44 1.44 1.44 1.44-.64 1.44-1.44c0-.79-.65-1.44-1.44-1.44" class="clsCaseStudiesIcon-2"/><path id="Path_5884" d="M22.62 22.95c-.08 0-.15-.03-.21-.09l-1.09-1.09c-.1-.14-.06-.32.07-.42.1-.07.24-.07.35 0l1.09 1.09a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08" class="clsCaseStudiesIcon-2"/><path id="Path_5885" d="M17.41 22.95h-5.48c-.33 0-.6-.27-.6-.6V9.65c0-.33.27-.6.6-.6h5.78c.16-.03.32.08.35.24s-.08.32-.24.35H11.95v12.71h5.48c.16-.03.32.08.35.24s-.08.32-.24.35h-.1" class="clsCaseStudiesIcon-2"/><path id="Path_5886" d="M21.46 17.45c-.17 0-.3-.13-.3-.3V13.1c-.03-.16.08-.32.24-.35.16-.03.32.08.35.24V17.14c0 .17-.13.3-.3.3" class="clsCaseStudiesIcon-2"/><path id="Path_5887" d="M21.46 13.4H17.7c-.17 0-.3-.13-.3-.3V9.34c0-.17.15-.29.31-.29.07 0 .13.03.19.08l3.76 3.76a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08m-3.46-.59h2.75l-2.75-2.75v2.75Z" class="clsCaseStudiesIcon-2"/></g></g></svg> <h5>Case Studies</h5> </a> <a href="/resources/tru-intelligence-center"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><defs><clipPath id="a"><path d="M8 7h15.75v18.17H8z" style="stroke-width:0;fill:none"/></clipPath></defs><circle cx="16" cy="16" r="16" style="fill:#19234d;stroke-width:0"/><g style="clip-path:url(#a)"><path d="M15.5 21.37h1.25v.4H15.5v-.4Zm4.78-.02v.44h1.27v1.69h.44v-1.69h.37v.88h.44v-.88h.37v1.31h.44v-1.31h.14v-.44h-3.47Zm-8.27 0h-1.47a.844.844 0 0 0-1.49-.79c-.03.05-.05.11-.07.17-.46-.08-.9.23-.98.69a.849.849 0 0 0 .98.98c.12.45.58.72 1.03.59s.72-.58.59-1.03a.865.865 0 0 0-.07-.17H12v-.44Zm5.46 1.95a5.85 5.85 0 0 1-.82 1.59c-.12.17-.31.27-.52.28-.21 0-.41-.11-.53-.28a5.85 5.85 0 0 1-.82-1.59c.09 0 .17-.03.26-.06.38-.16.63-.54.61-.96h.95c-.01.42.23.8.61.96.08.03.17.05.26.06m-1.2-4.36-.33 1.8h-.3a.908.908 0 0 0-.54-.93c-.38-.12-.79-.14-1.18-.06 0 0-.36-.9-.94-2.77-.35-1.1-.54-2.25-.56-3.41.39.46.97.71 1.57.67.69.02 1.38-.15 1.97-.51l-.9 2.36.95-.15-.55 3.15.81-.15Zm3-1.96c-.58 1.87-.94 2.77-.94 2.77-.39-.08-.8-.06-1.18.06-.33.14-.55.47-.54.84v.09h-.37l.93-2.66-.95.15.97-3.15-1.19.13.3-1.46c.59.35 1.27.52 1.95.5.6.05 1.19-.2 1.57-.67-.02 1.16-.21 2.31-.56 3.41m-.28 2.98c1.12-2.28 1.7-4.78 1.71-7.31 0 0 2.81 3.66-1.71 7.31m-5.71 0c-4.52-3.66-1.72-7.32-1.72-7.32 0 2.54.59 5.04 1.71 7.31m5.72-12.02-.07.03c-.99.3-1.92.8-2.72 1.47l-.02.03-.02-.03a8.165 8.165 0 0 0-2.82-1.5l-.08-.03s.1-.09.25-.19c.79-.48 1.7-.73 2.63-.73 1 0 1.97.32 2.79.9l.07.05ZM13.03 20.8v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.08 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.07 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m2.6 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.08 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.07 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m.5-10c-.11-.73-.31-1.45-.59-2.14l-.02-.03c.14-.22.27-.46.38-.7l-.06-.04c-.48.41-1.01.75-1.58 1.02-.88.3-1.69.77-2.38 1.39-.04.03-.09.03-.13 0-.68-.6-1.46-1.06-2.32-1.35-.59-.28-1.14-.63-1.64-1.06l-.05.04c.1.23.22.45.36.66l-.02.03c-.24.64-.42 1.3-.53 1.98s0 .03 0 .04a2.238 2.238 0 0 0 2.17 2.75c.47.02.93-.13 1.28-.44-.15-.32-.26-.66-.33-1.01-.21.21-.51.32-.81.3-.74 0-1.34-.6-1.34-1.34.01-.47.1-.94.25-1.39.23.27.47.53.74.77a.59.59 0 0 0 .06.84.59.59 0 0 0 .92-.18c.24.13.47.26.68.39.03.64.24 1.27.62 1.79l.02.03.02-.03c.38-.52.59-1.15.62-1.79.21-.14.45-.27.7-.4.14.3.5.42.79.28s.42-.5.28-.79c-.03-.05-.06-.1-.1-.15.26-.23.5-.49.72-.76.15.45.23.92.25 1.39 0 .74-.6 1.34-1.34 1.34-.3.02-.6-.09-.81-.3-.07.35-.18.68-.33 1.01.36.3.82.46 1.28.44a2.232 2.232 0 0 0 2.2-2.59" style="fill:#fff;stroke-width:0"/></g></svg> <h5>TRU Intelligence Center</h5> </a> <a href="/cybersecurity-tools"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsDisplayCybersecurityIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1934"><circle id="Ellipse_47" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1911"><path id="Path_6011" d="M12.47 13.21h-1.43a.26.26 0 0 1-.17-.07l-1.8-1.8a.23.23 0 0 1 0-.34l1.47-1.43c.09-.09.25-.09.34 0l1.76 1.77s.07.11.07.17v1.47c0 .13-.11.24-.24.24m-1.33-.49h1.09V11.6l-1.52-1.52-1.12 1.09 1.56 1.56Z" class="clsDisplayCybersecurityIcon-2"/><g id="Group_1910"><path id="Path_6012" d="M15.11 15.86a.26.26 0 0 1-.17-.07l-2.64-2.64c-.09-.1-.09-.25.01-.34.09-.09.24-.09.33 0l2.64 2.64c.09.09.09.25 0 .34-.05.05-.11.07-.17.07" class="clsDisplayCybersecurityIcon-2"/><path id="Path_6013" d="M12.21 23.51c-.36 0-.72-.06-1.07-.17a.24.24 0 0 1-.1-.4l1.28-1.28-.74-.74s-.02-.02-.03-.04l-.7-.7-1.29 1.28c-.1.09-.25.09-.34 0a.207.207 0 0 1-.06-.1c-.36-1.02-.12-2.15.62-2.94a2.18 2.18 0 0 1 2.64-.46l5.04-5.03c-.47-.88-.28-1.96.46-2.63.79-.75 1.93-1 2.97-.65a.24.24 0 0 1 .1.4l-1.28 1.28.74.74.03.03.71.71 1.29-1.28c.1-.09.25-.09.34 0 .03.03.05.06.06.1.33 1.06.06 2.22-.7 3.03-.69.68-1.75.83-2.6.37l-5.04 5.03c.48.89.31 2-.42 2.71-.51.49-1.19.76-1.9.74m-.53-.53c.74.17 1.51-.04 2.07-.55.62-.61.73-1.57.26-2.3a.26.26 0 0 1 .04-.29l5.28-5.28c.08-.07.19-.09.28-.04.69.44 1.59.35 2.19-.21.54-.57.79-1.35.67-2.13l-1.15 1.15c-.09.09-.25.09-.34 0l-.91-.91-.03-.03-.88-.88c-.09-.09-.1-.25 0-.34l1.15-1.15c-.75-.13-1.52.1-2.07.63-.63.56-.76 1.5-.3 2.22.05.09.03.21-.04.29l-5.28 5.28a.23.23 0 0 1-.28.04 1.74 1.74 0 0 0-2.23.3c-.52.54-.74 1.31-.6 2.04l1.16-1.15c.09-.09.25-.09.34 0l.91.91s.02.02.03.04l.88.88c.09.09.1.25 0 .34l-1.15 1.15Z" class="clsDisplayCybersecurityIcon-2"/><path id="Path_6014" d="M20.99 23.49a.26.26 0 0 1-.17-.07l-4.11-4.11s-.03-.04-.05-.06l-.59-1.17a.23.23 0 0 1 .05-.28l1.17-1.17c.07-.07.19-.09.28-.04l1.17.59s.04.03.06.04l4.11 4.11c.09.09.09.25 0 .34l-1.76 1.76s-.11.07-.17.07m-3.9-4.5 3.91 3.91 1.42-1.42-3.91-3.91-.98-.49-.93.93.49.98Z" class="clsDisplayCybersecurityIcon-2"/></g></g></g></svg> <h5>Cybersecurity Tools</h5> </a> <a href="/resources/video-library"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsVicoIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1935"><circle id="Ellipse_43" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1912"><path id="Path_6009" d="M16.15 22.9C12.2 22.9 9 19.7 9 15.75s3.2-7.15 7.15-7.15 7.15 3.2 7.15 7.15-3.2 7.15-7.15 7.15m0-13.83c-3.68 0-6.67 2.99-6.67 6.67s2.99 6.67 6.67 6.67 6.67-2.99 6.67-6.67c0-3.68-2.99-6.67-6.67-6.67" class="clsVicoIcon-2"/><path id="Path_6010" d="M14.35 18.99c-.13 0-.24-.11-.24-.24v-6.01a.243.243 0 0 1 .36-.21l5.11 3.01c.11.07.15.22.08.33-.02.04-.05.06-.08.08l-5.11 3s-.08.03-.12.03m.24-5.82v5.17l4.39-2.58-4.39-2.58Z" class="clsVicoIcon-2"/></g></g></svg> <h5>Videos</h5> </a> <a href="/resources/library?resourceType%5B%5D=Report"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsReportIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1936"><circle id="Ellipse_44" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1895"><path id="Path_5961" d="M21.42 22.95h-9.24c-.33 0-.6-.27-.6-.6V9.65c0-.33.27-.6.6-.6h5.77c.16-.03.32.08.35.24.03.16-.08.32-.24.35H12.19v12.71h9.24v-9.26c-.03-.16.08-.32.24-.35s.32.08.35.24v9.35c0 .33-.27.59-.59.59" class="clsReportIcon-2"/><path id="Path_5962" d="M21.71 13.4h-3.76c-.17 0-.3-.13-.3-.3V9.34c0-.17.15-.29.31-.29.07 0 .13.03.19.08l3.76 3.76a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08m-3.46-.59h2.75l-2.75-2.75v2.75Z" class="clsReportIcon-2"/><path id="Path_5963" d="M16.79 21.21c-1.92 0-3.48-1.56-3.48-3.48s1.56-3.48 3.48-3.48 3.48 1.56 3.48 3.48-1.56 3.48-3.48 3.48m0-6.36c-1.59 0-2.89 1.29-2.89 2.89s1.29 2.89 2.89 2.89 2.89-1.29 2.89-2.89c0-1.59-1.29-2.89-2.89-2.89" class="clsReportIcon-2"/><path id="Path_5964" d="M19.98 18.03H16.8c-.17 0-.3-.13-.3-.3v-3.18c.03-.16.18-.27.35-.24.12.02.22.12.24.24v2.89h2.89c.16-.03.32.08.35.24.03.16-.08.32-.24.35h-.1" class="clsReportIcon-2"/><path id="Path_5965" d="M14.67 20.15c-.17 0-.29-.15-.29-.31 0-.07.03-.13.08-.19l2.12-2.12c.1-.14.28-.17.42-.07.14.1.17.28.07.42-.02.03-.04.05-.07.07l-2.12 2.12c-.06.05-.13.09-.21.09" class="clsReportIcon-2"/></g></g></svg> <h5>Reports</h5> </a> <a href="/resources/library?resourceType%5B%5D=Webinar"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsWebinarIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1937"><path id="Path_6008" d="M16 0c8.84 0 16 7.16 16 16s-7.16 16-16 16S0 24.84 0 16 7.16 0 16 0Z" style="stroke-width:0;fill:#19234d"/><g id="Group_1896"><path id="Path_5966" d="M15.95 11.33c-.17 0-.3-.13-.3-.3V9.29c.03-.16.18-.27.35-.24.12.02.22.12.24.24v1.74c0 .17-.13.3-.3.3" class="clsWebinarIcon-2"/><path id="Path_5967" d="M20 22.9c-.1 0-.19-.05-.24-.13l-1.83-2.6a.29.29 0 0 1 0-.42.29.29 0 0 1 .42 0c.03.02.05.05.06.09l1.83 2.6a.307.307 0 0 1-.25.47" class="clsWebinarIcon-2"/><path id="Path_5968" d="M11.9 22.9c-.17 0-.3-.14-.29-.31 0-.06.02-.11.05-.16l1.83-2.6c.07-.15.25-.22.4-.14.15.07.22.25.14.4-.01.03-.04.06-.06.09l-1.83 2.6c-.06.08-.15.13-.24.12" class="clsWebinarIcon-2"/><path id="Path_5969" d="M21.73 20.29H10.16c-.17 0-.3-.13-.3-.3v-8.68c-.03-.16.08-.32.24-.35s.32.08.35.24v8.48h10.99v-.86c-.03-.16.08-.32.24-.35s.32.08.35.24v1.26c0 .17-.13.3-.3.3" class="clsWebinarIcon-2"/><path id="Path_5970" d="M21.73 15.38c-.17 0-.3-.13-.3-.3v-3.76c-.03-.16.08-.32.24-.35s.32.08.35.24v3.86c0 .17-.13.3-.3.3" class="clsWebinarIcon-2"/><path id="Path_5971" d="M22.6 11.33H9.3a.299.299 0 0 1-.24-.35c.02-.12.12-.22.24-.24h13.3c.16.03.27.18.24.35-.02.12-.12.22-.24.24" class="clsWebinarIcon-2"/><path id="Path_5972" d="M22.6 17.4s-.07 0-.1-.02l-8.1-2.89a.306.306 0 0 1-.11-.41c.06-.11.19-.17.31-.15l8.1 2.89c.15.07.22.25.15.4-.04.1-.14.17-.25.18" class="clsWebinarIcon-2"/></g></g></svg> <h5>Webinars</h5> </a> <a href="/resources/library?resourceType%5B%5D=Data%20Sheet%20/%20Solution%20Brief"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsdatasheetIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1938"><circle id="Ellipse_46" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1893"><path id="Path_5952" d="M20.84 22.9H11.6c-.33 0-.6-.27-.6-.6V9.6c0-.33.27-.6.6-.6h5.77c.16-.03.32.08.35.24.03.16-.08.32-.24.35H11.61v12.72h9.24v-9.25c-.03-.16.08-.32.24-.35s.32.08.35.24v9.35c0 .33-.27.59-.59.59" class="clsdatasheetIcon-2"/><path id="Path_5953" d="M21.13 13.35h-3.76c-.17 0-.3-.13-.3-.3V9.29c0-.17.15-.29.31-.29.07 0 .13.03.19.08l3.76 3.76a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08m-3.46-.59h2.75L17.66 10v2.75Z" class="clsdatasheetIcon-2"/><path id="Path_5954" d="M17.46 16.06c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.45c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5955" d="M16.3 18.66c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.45c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5956" d="M13.7 20.1c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.44c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5957" d="M18.9 21.26c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.44c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5958" d="M18.39 20.03c-.08 0-.15-.03-.21-.09l-1.58-1.58a.294.294 0 0 1-.07-.42c.1-.14.28-.17.42-.07.03.02.05.04.07.07l1.58 1.58a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08" class="clsdatasheetIcon-2"/><path id="Path_5959" d="M14.33 19.03c-.17 0-.29-.15-.28-.32 0-.1.06-.19.14-.24l1.34-.74a.3.3 0 0 1 .28.52l-1.34.74s-.09.04-.14.04" class="clsdatasheetIcon-2"/><path id="Path_5960" d="M16.58 17.27s-.08 0-.12-.03a.301.301 0 0 1-.15-.39l.58-1.28c.09-.14.28-.17.42-.08.1.07.15.2.12.32l-.58 1.28c-.05.11-.15.17-.27.17" class="clsdatasheetIcon-2"/></g></g></svg> <h5>Data Sheets</h5> </a> <a href="/esentire-mdr-vs-everyone"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsRealVsFakeIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1933"><g id="Group_1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/></g><g id="Group_1924"><path id="Path_6040" d="M16.15 17.96c-.18 0-.32-.15-.32-.32 0-.15.11-.28.25-.31.04 0 1.05-.26 1.13-1.86-.45-.2-.88-.46-1.27-.77-.14-.11-.16-.31-.05-.45s.31-.16.45-.05c.39.31.83.56 1.3.74.13.04.22.16.22.3 0 2.34-1.58 2.69-1.65 2.7h-.06" class="clsRealVsFakeIcon-2"/><path id="Path_6041" d="M16.15 17.96h-.06c-.07-.01-1.65-.36-1.65-2.7 0-.14.09-.26.22-.3.47-.18.91-.43 1.3-.74.14-.11.34-.09.45.05s.09.34-.05.45c-.39.31-.82.56-1.27.77.09 1.63 1.12 1.86 1.13 1.86.17.04.28.21.25.38-.03.15-.16.25-.31.25" class="clsRealVsFakeIcon-2"/><path id="Path_6042" d="M10.38 21.55c-.18 0-.32-.14-.32-.32 0-.08.03-.16.09-.22l3.54-3.54c.13-.12.33-.12.45.01.12.12.12.32 0 .44l-3.54 3.54c-.06.06-.14.09-.23.09" class="clsRealVsFakeIcon-2"/><path id="Path_6043" d="M13.96 20.69c-.18 0-.32-.14-.32-.32v-2.36h-2.36c-.18 0-.33-.12-.34-.3s.12-.33.3-.34h2.72c.18 0 .32.14.32.32v2.68c0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6044" d="M18.18 14.14c-.18 0-.32-.14-.32-.32 0-.08.03-.16.09-.22l3.54-3.54c.13-.12.33-.12.45.01.12.12.12.32 0 .44l-3.54 3.54c-.06.06-.14.09-.23.09" class="clsRealVsFakeIcon-2"/><path id="Path_6045" d="M20.72 14.28h-2.68c-.18 0-.32-.14-.32-.32v-2.68c0-.18.12-.33.3-.34.18 0 .33.12.34.3v2.4h2.36c.18 0 .33.12.34.3 0 .18-.12.33-.3.34h-.04" class="clsRealVsFakeIcon-2"/><path id="Path_6046" d="M16 25.03c-.18 0-.32-.14-.32-.32v-1.74c0-.18.12-.33.3-.34.18 0 .33.12.34.3v1.78c0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6047" d="M16 9.35c-.18 0-.32-.14-.32-.32V7.29c0-.18.12-.33.3-.34.18 0 .33.12.34.3v1.78c0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6048" d="M24.71 16.32h-1.74c-.18 0-.33-.12-.34-.3s.12-.33.3-.34h1.78c.18 0 .33.12.34.3s-.12.33-.3.34h-.04" class="clsRealVsFakeIcon-2"/><path id="Path_6049" d="M9.03 16.32H7.29c-.18 0-.33-.12-.34-.3s.12-.33.3-.34h1.78c.18 0 .33.12.34.3s-.12.33-.3.34h-.04" class="clsRealVsFakeIcon-2"/><path id="Path_6050" d="M9.72 18.97a.32.32 0 0 1-.29-.19c-1.53-3.63.18-7.82 3.81-9.35 1.77-.75 3.77-.75 5.54 0 .17.06.25.24.19.41-.06.17-.24.25-.41.19 0 0-.02 0-.03-.01-3.31-1.4-7.12.15-8.52 3.46a6.53 6.53 0 0 0 0 5.06c.07.16 0 .35-.17.42-.04.02-.08.02-.12.03" class="clsRealVsFakeIcon-2"/><path id="Path_6051" d="M16 23.14c-.95 0-1.9-.19-2.77-.56a.315.315 0 0 1-.19-.41c.06-.17.24-.25.41-.19 0 0 .02 0 .03.01a6.499 6.499 0 0 0 8.66-8.15.31.31 0 0 1 .22-.39c.15-.04.31.03.38.18 1.31 3.72-.64 7.8-4.36 9.11-.76.27-1.56.41-2.37.41" class="clsRealVsFakeIcon-2"/><path id="Path_6052" d="M12.21 15.94c-.18 0-.32-.14-.32-.32a3.73 3.73 0 0 1 3.73-3.73c.18 0 .31.16.3.34 0 .16-.14.29-.3.3-1.71 0-3.09 1.38-3.09 3.09 0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6053" d="M16.38 20.11c-.18 0-.31-.16-.3-.34 0-.16.14-.29.3-.3 1.71 0 3.09-1.38 3.09-3.09 0-.18.12-.33.3-.34.18 0 .33.12.34.3v.04a3.73 3.73 0 0 1-3.73 3.73" class="clsRealVsFakeIcon-2"/></g></g></svg> <h5>Real vs. Fake MDR</h5> </a> <a href="/esentire-mdr-vs-everyone/compare"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" version="1.1" viewBox="0 0 32 32"><defs><style>.cls-Comparison-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1933" data-name="Group 1933"><g id="Group_1932" data-name="Group 1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" data-name="Ellipse 48" style="stroke-width:0;fill:#19234d"/></g><path d="M18.2 18.2c.2 0 .3-.1.3-.3v-7.1h3v7.1c0 .2.1.3.3.3s.3-.1.3-.3v-7.4c0-.2-.1-.3-.3-.3h-3.7c-.2 0-.3.1-.3.3v7.4c0 .2.1.3.3.3Z" class="cls-Comparison-2"/><path d="M20.1 24.1c.1 0 .2 0 .3-.1l4.4-5.9v-.3c0-.1-.2-.2-.3-.2h-2.6c-.2 0-.3.1-.3.3s.1.3.3.3h1.9l-3.8 5-3.8-5h1.9c.2 0 .3-.1.3-.3s-.1-.3-.3-.3h-2.6c-.1 0-.2 0-.3.2v.3l4.4 5.9s.2.1.3.1ZM10.1 21.9h3.7c.2 0 .3-.1.3-.3v-7.4c0-.2-.1-.3-.3-.3s-.3.1-.3.3v7.1h-3v-7.1c0-.2-.1-.3-.3-.3s-.3.1-.3.3v7.4c0 .2.1.3.3.3Z" class="cls-Comparison-2"/><path d="M7.5 14.5h2.6c.2 0 .3-.1.3-.3s-.1-.3-.3-.3H8.2l3.8-5 3.8 5h-1.9c-.2 0-.3.1-.3.3s.1.3.3.3h2.6c.1 0 .2 0 .3-.2V14l-4.4-5.9s-.2-.1-.3-.1c-.1 0-.2 0-.3.1L7.4 14v.3c0 .1.2.2.3.2Z" class="cls-Comparison-2"/></g></svg> <h5>Compare MDR Vendors</h5> </a> <a class="Resources__Links--Mobile" href="/resources/blog"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 32 32"><defs><clipPath id="clippath"><path d="M9.09 7.71H22.9v16.58H9.09z" style="stroke-width:0;fill:none"/></clipPath><style>.clsBlogNavIcon-4{stroke-width:0;fill:#fff}</style></defs><g id="Layer_1-2"><g id="Group_2087"><g id="Group_1933"><g id="Group_1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" style="fill:#172143;stroke-width:0"/></g><g id="Group_2091" style="clip-path:url(#clippath)"><g id="Group_2090"><path id="Path_6299" d="M15.14 18.51c-.19 0-.34-.15-.34-.34 0-.09.04-.17.1-.24l5.63-5.63c.14-.12.35-.11.48.02.12.13.12.32 0 .45l-5.63 5.63a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/><path id="Path_6300" d="M16.6 19.96c-.19 0-.34-.15-.34-.34 0-.09.04-.17.1-.24l5.63-5.63c.14-.12.35-.11.48.02.12.13.12.32 0 .45l-5.63 5.63a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/><path id="Path_6301" d="M22.27 14.29c-.19 0-.34-.15-.34-.34 0-.09.04-.17.1-.24.27-.27.27-.71 0-.98a.713.713 0 0 0-.98 0c-.12.14-.34.15-.48.02a.335.335 0 0 1-.02-.48l.02-.02c.52-.55 1.38-.58 1.93-.06s.58 1.38.06 1.93l-.06.06a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/><path id="Path_6302" d="M14.27 20.83c-.19 0-.34-.15-.34-.34 0-.04 0-.08.02-.12l.87-2.33c.06-.18.25-.28.42-.22s.28.25.22.42c0 .01 0 .02-.01.03l-.61 1.63 1.63-.61c.18-.05.37.05.42.22a.34.34 0 0 1-.19.41l-2.33.87s-.08.02-.12.02" class="clsBlogNavIcon-4"/><path id="Path_6303" d="M21.18 10.46c-.19 0-.34-.15-.34-.33V8.59c0-.11-.09-.19-.2-.19H13.7a.335.335 0 0 1-.32-.35c0-.17.15-.31.32-.32h6.95c.48 0 .87.39.87.87v1.54c0 .19-.15.34-.33.34" class="clsBlogNavIcon-4"/><path id="Path_6304" d="M20.65 24.29H9.96a.87.87 0 0 1-.87-.87V12.29a.33.33 0 0 1 .32-.35c.19-.01.34.13.35.32v11.17c0 .11.09.19.2.19h10.68c.11 0 .2-.09.2-.19v-5.35a.33.33 0 0 1 .32-.35c.19-.01.34.13.35.32v5.39c0 .48-.39.87-.87.87" class="clsBlogNavIcon-4"/><path id="Path_6305" d="M13.58 12.53H9.43c-.19 0-.34-.15-.33-.34 0-.09.04-.17.1-.24l4.15-4.15c.13-.13.34-.13.48 0 .06.06.1.15.1.24v4.15c0 .19-.15.34-.33.34m-3.36-.67h3v-3l-3 3Z" class="clsBlogNavIcon-4"/><path id="Path_6306" d="M21.53 14.95a.35.35 0 0 1-.24-.1l-1.38-1.38a.335.335 0 0 1-.02-.48c.12-.14.34-.15.48-.02l.02.02 1.38 1.38c.13.13.13.35 0 .48a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/></g></g></g></g></g></svg> <h5>Blogs</h5> </a> <a class="Resources__Links--Mobile" href="/resources/security-advisories"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 32 32"><defs><clipPath id="clippath"><path d="M8.48 6.97h15.04v18.06H8.48z" style="stroke-width:0;fill:none"/></clipPath><style>.clsSANavIconTop-4{stroke-width:0;fill:#fff}</style></defs><g id="Layer_1-2"><g id="Group_2086"><g id="Group_1933"><g id="Group_1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" style="fill:#172143;stroke-width:0"/></g><g id="Group_2089" style="clip-path:url(#clippath)"><g id="Group_2088"><path id="Path_6292" d="M16 25.03c-.19 0-.34-.16-.34-.34 0-.14.09-.27.23-.32 6.93-2.44 6.95-10.6 6.95-10.68 0-.19.15-.34.34-.34.19 0 .34.15.34.34 0 .09-.01 8.73-7.41 11.33-.04.01-.07.02-.11.02" class="clsSANavIconTop-4"/><path id="Path_6293" d="M23.18 14.03c-.19 0-.34-.15-.34-.34V9.93h-1.41c-.19 0-.34-.15-.34-.34s.15-.34.34-.34h1.53c.31 0 .57.26.57.57v3.88c0 .19-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6294" d="M16 25.03s-.08 0-.11-.02c-7.39-2.6-7.41-11.24-7.41-11.33 0-.18.14-.34.33-.34h.02c.19 0 .34.16.34.34 0 .08.02 8.24 6.95 10.68a.346.346 0 0 1-.11.67" class="clsSANavIconTop-4"/><path id="Path_6295" d="M8.82 14.03c-.19 0-.34-.15-.34-.34V9.81c0-.31.26-.57.57-.57h1.53c.19 0 .34.15.34.34s-.15.34-.34.34H9.16v3.76c0 .19-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6296" d="M21.4 9.92c-2.02.12-3.99-.64-5.4-2.08a6.978 6.978 0 0 1-5.4 2.08c-.19 0-.34-.15-.34-.34s.15-.34.34-.34c1.39.04 2.76-.33 3.94-1.05.45-.28.84-.63 1.15-1.06.06-.1.17-.16.29-.16h.04c.12 0 .22.06.29.16.32.42.71.78 1.16 1.05 1.18.73 2.55 1.1 3.94 1.05.19 0 .34.15.34.34s-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6297" d="M16 17.97c-.19 0-.34-.15-.34-.34v-5.4c0-.19.15-.34.34-.34.19 0 .34.15.34.34v5.4c0 .19-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6298" d="M16.53 19.78c0 .29-.24.53-.53.53s-.53-.24-.53-.53c0-.29.24-.53.53-.53.29 0 .53.24.53.53" class="clsSANavIconTop-4"/></g></g></g></g></g></svg> <h5>Security Advisories</h5> </a> </div> <div class="Resources__BoxCTA"> <a href="/resources/library"> EXPLORE LIBRARY <span>→</span> </a> </div> </div> </div> <div class="Resources__SecurityBox"> <div class="Resources__Links"> <div class="Resources__SecurityBoxAdvisories"> <h6>SECURITY ADVISORIES</h6> <a href="https://www.esentire.com/security-advisories/palo-alto-zero-day-vulnerability-cve-2024-0012"> <span class="Resources__Eyebrow">Nov 18, 2024</span> <h5>Palo Alto Zero-Day Vulnerability (CVE-2024-0012)</h5> <p> THE THREAT On November 18th, 2024, Palo Alto disclosed a critical actively exploited authentication bypass zero-day vulnerability impacting Palo Alto Networks PAN-OS. The…</p> </a> <a href="https://www.esentire.com/security-advisories/poc-released-for-citrix-vulnerabilities"> <span class="Resources__Eyebrow">Nov 13, 2024</span> <h5>PoC Released for Citrix Vulnerabilities</h5> <p> THE THREAT Update: eSentire has observed multiple exploitation attempts targeting CVE-2024-8069. In real-world attacks, threat actors successfully achieved RCE and attempted to…</p> </a> </div> <div class="Resources__BoxCTA"> <a href="/resources/security-advisories"> View Advisories <span>→</span> </a> </div> </div> </div> </div> </div> </div> <!-- Company --> <div class="Company NavBar__SubMenu" data-menu="company"> <div class="Company__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Company</div> </div> <div class="Company__Content"> <div class="Company__About"> <div class="Company__Links"> <h6>ABOUT ESENTIRE</h6> <p>eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.</p> <a href="/company/about-us"><h5>About Us <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a href="/company/leadership"><h5>Leadership <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a href="/company/careers"><h5>Careers <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a class="Company__Links--Mobile" href="/company/event-calendar"><h5>Event Calendar <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a class="Company__Links--Mobile" href="/company/newsroom"><h5>Newsroom <span class="Resources__LinksArrow"><em>→</em></span></h5></a> </div> </div> <div class="Company__Calendar"> <div class="Company__Links"> <h6>EVENT CALENDAR</h6> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Nov</div> <div class="Company__Day">21</div> </div> <h5>SkyHigh Cook Out</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Dec</div> <div class="Company__Day">04</div> </div> <h5>TechTalk Soho House Dinner, Chicago</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Dec</div> <div class="Company__Day">10</div> </div> <h5>December TRU Intelligence Briefing</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Jan</div> <div class="Company__Day">15</div> </div> <h5>Security Leaders Dinner, Denver</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Jan</div> <div class="Company__Day">16</div> </div> <h5>FutureCon Los&nbsp;Angeles</h5> </div> </div> <div class="Company__BoxCTA"> <a href="/company/event-calendar"> View Calendar <span>→</span> </a> </div> </div> <div class="Company__PressRelease"> <div class="Company__Links"> <h6>LATEST PRESS RELEASE</h6> <a href="https://www.esentire.com/news-releases/esentire-expands-partnership-with-td-synnex-to-bring-esentires-award-winning-24-7-mdr-and-soc-services-to-organizations-across-north-america"> <span class="Resources__Eyebrow">Aug 09, 2024</span> <h5>eSentire Expands Partnership with TD SYNNEX to Bring eSentire’s Award-Winning, 24/7 MDR and SOC Services to Organizations Across North America</h5> <p> Waterloo, Ontario, August 12, 2024 — eSentire, a leading global Managed Detection and Response (MDR) provider, today announced it has expanded its partnership with TD SYNNEX, a leading global distributor and solutions aggregator for the IT ecosystem. eSentire’s all-in-one, 24/7…</p> </a> </div> <div class="Company__BoxCTA"> <a href="/company/newsroom"> View Newsroom <span>→</span> </a> </div> </div> </div> </div> </div> <!-- Partners --> <div class="Partners NavBar__SubMenu" data-menu="partners"> <div class="Partners__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Partners</div> </div> <div class="Partners__Content"> <div class="Partners__PartnerProgram"> <div class="Partners__Links"> <h6>PARTNER PROGRAM</h6> <div class="Partners__E3Logo"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 119 81.99"><defs><style>.clsEcosystemICON-1{fill:#19234d;stroke-width:0}</style></defs><path d="M39.47 6.27C34.44-.18 25.91-.12 25.91-.12h-8.54S8.84-.18 3.81 6.27C.73 10.21.06 13.97.06 16.59v20.98c0 2.62.67 6.39 3.74 10.32 5.04 6.45 13.56 6.39 13.56 6.39H43.2V42.17H19.95s-3.4.02-5.41-2.55c-1.22-1.57-1.49-3.07-1.49-4.11v-2.45H43.2V16.59c0-2.62-.67-6.39-3.74-10.32M13.04 17.91c0-1.04.27-2.55 1.49-4.11 2-2.57 5.41-2.55 5.41-2.55h3.4s3.4-.02 5.41 2.55c1.22 1.57 1.49 3.07 1.49 4.11v3.2h-17.2v-3.2Z" class="clsEcosystemICON-1"/><path d="m75.52 49.25 7.45-10.32c1.97 1.69 3.87 2.95 5.67 3.77 1.8.82 3.75 1.23 5.84 1.23s4.02-.55 5.63-1.65 2.41-2.86 2.41-5.29c0-1.64-.64-3.14-1.91-4.53-1.27-1.38-3.06-2.07-5.37-2.07-1.3 0-2.47.13-3.51.38-1.04.26-1.76.5-2.16.72l-3.22-5.25 13.54-12.53H80.17V1.6h35.12v9.82l-10.32 11.17c3.72.96 6.64 2.82 8.76 5.58 2.12 2.76 3.18 6.23 3.18 10.41 0 2.82-.61 5.33-1.82 7.53s-2.85 4.05-4.91 5.54-4.35 2.64-6.85 3.43a25.41 25.41 0 0 1-7.66 1.19c-4.01 0-7.74-.61-11.21-1.82-3.47-1.21-6.45-2.95-8.93-5.2Z" style="fill:#40c3d9;stroke-width:0"/><path d="M59.98 0h.76v54.89h-.76z" style="fill:#9ea1aa;stroke-width:0"/><path d="m7.59 76.12.62.53c-.39.48-.92.86-1.59 1.15s-1.35.43-2.05.43c-.88 0-1.67-.2-2.36-.59S.97 76.69.59 75.98s-.58-1.53-.58-2.45c0-.87.18-1.66.55-2.37s.87-1.28 1.52-1.7c.66-.42 1.4-.63 2.25-.63s1.55.19 2.2.56c.65.38 1.15.93 1.52 1.66.37.73.55 1.64.55 2.71H.97c.03.67.19 1.29.5 1.84.3.55.72.99 1.25 1.32s1.15.5 1.85.5c.56 0 1.12-.12 1.7-.35.58-.23 1.01-.55 1.31-.93Zm-6.6-3.13h6.65c-.12-1.09-.47-1.92-1.06-2.5-.59-.58-1.35-.87-2.26-.87-.64 0-1.2.15-1.68.46-.48.3-.87.71-1.15 1.22-.29.51-.45 1.07-.49 1.69ZM21.68 76.12l.62.55c-.36.45-.85.83-1.47 1.12-.62.29-1.31.44-2.07.44-.87 0-1.64-.21-2.31-.62s-1.2-.98-1.59-1.69c-.39-.71-.58-1.51-.58-2.39s.2-1.69.59-2.4c.4-.71.93-1.27 1.61-1.68.68-.42 1.44-.62 2.28-.62.79 0 1.46.14 2.01.42.55.28 1.02.66 1.41 1.15l-.66.51c-.3-.39-.67-.7-1.12-.92s-.99-.34-1.64-.34c-.69 0-1.3.18-1.84.53s-.96.82-1.26 1.41c-.3.59-.46 1.24-.46 1.95s.16 1.35.47 1.94.74 1.06 1.27 1.42c.54.36 1.14.53 1.82.53s1.22-.12 1.72-.35c.5-.23.9-.55 1.2-.93ZM31.81 78.22c-.84 0-1.61-.21-2.31-.63a4.693 4.693 0 0 1-2.29-4.07c0-.87.21-1.66.62-2.37.42-.71.97-1.28 1.67-1.7s1.47-.63 2.31-.63 1.63.21 2.32.63c.69.42 1.25.99 1.66 1.7s.62 1.5.62 2.37-.21 1.66-.62 2.37c-.42.71-.97 1.28-1.66 1.7s-1.47.63-2.32.63Zm0-.8c.7 0 1.33-.18 1.89-.53.56-.35 1-.82 1.32-1.42s.48-1.25.48-1.96-.16-1.35-.5-1.93c-.33-.59-.77-1.07-1.33-1.43s-1.18-.55-1.87-.55-1.33.18-1.89.53c-.56.35-1 .82-1.32 1.41-.32.59-.48 1.25-.48 1.97s.16 1.35.5 1.94.78 1.07 1.34 1.43c.56.36 1.18.55 1.86.55ZM41.99 76.86l.56-.62c.38.38.81.66 1.29.87s1.06.3 1.72.3c.48 0 .92-.06 1.33-.18s.74-.31.98-.55c.25-.25.37-.56.37-.93 0-.44-.11-.77-.34-1-.23-.22-.57-.41-1.02-.55-.45-.14-1.01-.28-1.67-.44a8.86 8.86 0 0 1-1.45-.46c-.42-.18-.75-.42-1-.75-.25-.32-.37-.76-.37-1.3s.16-1 .47-1.36c.31-.36.72-.63 1.22-.81s1.03-.26 1.6-.26c.69 0 1.3.13 1.85.39s.98.59 1.32.99l-.6.55c-.31-.34-.67-.61-1.08-.82s-.9-.31-1.47-.31c-.38 0-.75.04-1.12.13-.37.08-.68.25-.92.49-.25.24-.37.59-.37 1.06 0 .38.14.67.41.9s.62.4 1.05.53.87.25 1.32.35c.49.1.98.24 1.46.42s.88.43 1.2.76c.32.33.48.79.48 1.39s-.18 1.09-.53 1.48c-.35.39-.8.67-1.34.85-.55.18-1.11.27-1.69.27-.83 0-1.54-.12-2.14-.37s-1.1-.58-1.52-.99ZM54.2 81.5l.45-.62c.12.12.28.22.48.31.21.09.43.14.68.14.39 0 .69-.14.9-.41s.42-.66.61-1.17l.74-1.89-3.99-8.82h.99l3.44 7.76 2.97-7.76h.95L58.03 80.1c-.1.26-.24.55-.42.85-.18.31-.41.58-.7.81-.29.22-.66.34-1.12.34-.36 0-.67-.06-.93-.18s-.49-.26-.68-.43ZM67.15 76.86l.56-.62c.38.38.81.66 1.29.87s1.06.3 1.72.3c.48 0 .92-.06 1.33-.18.41-.12.74-.31.98-.55.25-.25.37-.56.37-.93 0-.44-.11-.77-.34-1-.23-.22-.57-.41-1.02-.55s-1.01-.28-1.67-.44a8.86 8.86 0 0 1-1.45-.46c-.42-.18-.75-.42-1-.75s-.37-.76-.37-1.3.16-1 .47-1.36c.31-.36.72-.63 1.22-.81s1.03-.26 1.6-.26c.69 0 1.3.13 1.85.39s.98.59 1.32.99l-.6.55c-.31-.34-.67-.61-1.08-.82-.41-.21-.9-.31-1.47-.31-.38 0-.75.04-1.12.13s-.68.25-.92.49c-.25.24-.37.59-.37 1.06 0 .38.14.67.41.9s.62.4 1.05.53.87.25 1.32.35c.49.1.98.24 1.46.42s.88.43 1.2.76c.32.33.48.79.48 1.39s-.18 1.09-.53 1.48c-.35.39-.8.67-1.34.85-.55.18-1.11.27-1.69.27-.83 0-1.54-.12-2.14-.37s-1.1-.58-1.52-.99ZM81.36 75.24v-5.39h-1.79v-.82h1.79v-2.95h.87v2.95h2.95v.82h-2.95v5.17c0 .7.07 1.22.21 1.57s.34.57.57.67c.24.1.51.16.83.16s.6-.06.83-.18c.23-.12.47-.32.7-.6l.55.53c-.26.34-.55.59-.88.78s-.76.27-1.29.27c-.47 0-.88-.08-1.24-.25s-.64-.47-.85-.9c-.2-.43-.3-1.04-.3-1.83ZM98 76.12l.62.53c-.39.48-.92.86-1.59 1.15s-1.35.43-2.05.43c-.88 0-1.67-.2-2.36-.59s-1.24-.95-1.62-1.66-.58-1.53-.58-2.45c0-.87.18-1.66.55-2.37.36-.71.87-1.28 1.52-1.7.66-.42 1.4-.63 2.25-.63s1.55.19 2.2.56 1.16.93 1.52 1.66.55 1.64.55 2.71h-7.62c.03.67.19 1.29.5 1.84.3.55.72.99 1.25 1.32s1.15.5 1.85.5c.56 0 1.12-.12 1.7-.35.58-.23 1.01-.55 1.31-.93Zm-6.59-3.13h6.65c-.12-1.09-.47-1.92-1.06-2.5-.59-.58-1.35-.87-2.26-.87-.64 0-1.2.15-1.68.46-.48.3-.87.71-1.15 1.22-.29.51-.45 1.07-.49 1.69ZM105.17 77.98v-8.16c0-.23-.01-.49-.04-.78h.82c.03.29.04.54.05.77s.01.59.01 1.1c.14-.27.35-.57.63-.9s.64-.61 1.1-.85 1-.36 1.65-.36c.87 0 1.53.18 1.98.55s.77.88.95 1.54c.13-.24.35-.53.66-.85s.71-.61 1.19-.87c.48-.25 1.04-.38 1.67-.38.8 0 1.43.16 1.89.48s.79.77.97 1.36c.19.59.28 1.29.28 2.09v5.25h-.87v-4.96c0-.9-.1-1.59-.28-2.08-.19-.49-.46-.83-.81-1.03s-.79-.29-1.3-.29c-.58 0-1.12.15-1.6.46s-.87.7-1.17 1.19-.44 1.01-.44 1.57v5.15h-.88v-4.96c0-.9-.09-1.59-.27-2.08s-.45-.83-.8-1.03-.79-.29-1.3-.29c-.71 0-1.31.19-1.79.58s-.84.87-1.08 1.45c-.24.58-.36 1.15-.36 1.72v4.61h-.88Z" class="clsEcosystemICON-1"/></svg> <div class="Partners__E3LogoInner"> <p>We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.</p> <div class="Partners__BoxCTA"> <a href="/partners"> LEARN MORE <span>→</span> </a> </div> </div> </div> </div> </div> <div class="Partners__Box"> <div class="Partners__BoxInner"> <div class="Partners__BoxLeft"> <div class="Partners__Links"> <a href="/partners/become-a-partner"> <p>Apply to become an e3 ecosystem partner with eSentire today.</p> </a> </div> </div> <div class="Partners__BoxRight"> <a href="/partners/become-a-partner">APPLY NOW <span>→</span></a> </div> </div> <div class="Partners__BoxInner"> <div class="Partners__BoxLeft"> <div class="Partners__Links"> <a href="https://esentire.channeltivity.com/Login" target="_blank"> <p>Login to the Partner Portal for resources and content for current partners.</p> </a> </div> </div> <div class="Partners__BoxRight"> <a href="https://esentire.channeltivity.com/Login" target="_blank">LOGIN NOW <span>→</span></a> </div> </div> </div> </div> </div> </div> <!-- SEARCH --> <div class="Search NavBar__SubMenu" data-menu="search"> <div class="Search__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Search</div> </div> <div class="Search__Content"> <h3>Search our site</h3> <form action="/search/results" class="filter"> <div class="Search__TopField"> <svg xmlns="http://www.w3.org/2000/svg" width="24.417" height="24.416"><g data-name="Group 92" fill="none" stroke="#000" stroke-linecap="round" stroke-linejoin="round" stroke-width="2"><path data-name="Path 4" d="M19.7 10.351a9.352 9.352 0 1 0-9.349 9.349 9.353 9.353 0 0 0 9.349-9.349Z"/><path data-name="Line 1" d="m17.723 17.722 5.28 5.28"/></g></svg> <input id="searchField" type="search" name="q" placeholder="Enter a keyword" class="Search__SearchField" autofocus> <input type="submit" value="Search" class="Search__SubmitButton"> </div> </form> <h4>Quick Links</h4> <div class="Search__QuickLinks"> <a class="Search__QuickLink" href="/what-we-do/esentire-managed-detection-and-response"> <h5>ALL-IN-ONE MDR SERVICE <span>→</span></h5> <p>Multi-Signal MDR with 300+ technology integrations to support your existing investments.</p> </a> <a class="Search__QuickLink" href="/what-we-do/security-operations-center"> <h5>24/7 SOC SUPPORT <span>→</span></h5> <p>24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.</p> </a> <a class="Search__QuickLink" href="/how-we-do-it/mdr-pricing-packaging"> <h5>ESENTIRE MDR PRICING <span>→</span></h5> <p>Three MDR package tiers are available based on per-user pricing and level of risk tolerance.</p> </a> <a class="Search__QuickLink" href="/resources/tru-intelligence-center"> <h5>TRU INTELLIGENCE CENTER <span>→</span></h5> <p>The latest security advisories, blogs, reports, industry publications and webinars published by TRU.</p> </a> <a class="Search__QuickLink" href="/esentire-mdr-vs-everyone/compare"> <h5>MDR VENDOR COMPARISONS <span>→</span></h5> <p>Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.</p> </a> <a class="Search__QuickLink" href="/resources/mdr-and-cybersecurity-case-studies"> <h5>MDR CASE STUDIES <span>→</span></h5> <p>See why 2000+ organizations globally have chosen eSentire for their MDR Solution.</p> </a> </div> </div> </div> </div> <!-- Get Started Nav --> <div class="GetStartedNav NavBar__SubMenu" data-menu="getStarted"> <div class="GetStartedNav__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Get Started</div> </div> <div class="GetStartedNav__Content"> <div class="GetStartedNav__Links"> <a href="/get-started"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 51 51"><path d="M5 0h46v51H5c-2.76 0-5-2.24-5-5V5c0-2.76 2.24-5 5-5Z" style="fill:#263c91;stroke-width:0"/><path d="M33.11 16.61a7.879 7.879 0 0 0-5.79-2.73h-3.65a7.879 7.879 0 0 0-5.79 2.73 7.08 7.08 0 0 0-1.6 4.41v8.96c.02 1.61.58 3.16 1.6 4.41a7.879 7.879 0 0 0 5.79 2.73H34.7v-5.17h-9.92c-.89-.02-1.73-.42-2.31-1.09a2.81 2.81 0 0 1-.64-1.75v-1.05h12.86v-7.03a7.102 7.102 0 0 0-1.6-4.41m-11.26 4.97c0-.64.23-1.26.64-1.76.58-.67 1.42-1.07 2.31-1.09h1.45c.89.02 1.72.41 2.3 1.09.41.5.63 1.12.64 1.76v1.36h-7.34v-1.36Z" style="fill:none;stroke:#fff;stroke-linecap:round;stroke-linejoin:round"/></svg> <h5>Get Started <span class="GetStartedNav__LinksArrow"><em>→</em></span></h5> </a> <a href="/build-a-quote"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 51 51"><defs><style>.clsNavBAQ-1{fill:#fff;stroke-width:0}</style></defs><g id="Group_2081"><path id="Rectangle_3064" d="M5 0h46v51H5c-2.76 0-5-2.24-5-5V5c0-2.76 2.24-5 5-5Z" style="fill:#696de3;stroke-width:0"/><g id="Group_2077"><path id="Path_1056" d="M19.7 22.53a1.14 1.14 0 1 1 1.14-1.14c0 .63-.51 1.14-1.14 1.14m-.04-1.14s.02.04.03.04l-.04-.04Z" class="clsNavBAQ-1"/><path id="Path_1057" d="M19.7 26.93a1.14 1.14 0 1 1 1.14-1.14c0 .63-.51 1.14-1.14 1.14m-.04-1.14s.02.04.03.04l-.04-.04Z" class="clsNavBAQ-1"/><path id="Path_1058" d="M26.29 39.01H15.88c-.32 0-.59-.26-.59-.59V14.8c0-.32.26-.59.58-.59h4.56a.591.591 0 0 1 0 1.18h-3.98v22.46h9.83a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1059" d="M34.56 29.68c-.32 0-.59-.26-.59-.59v-13.7H30a.591.591 0 0 1 0-1.18h4.56c.32 0 .59.26.59.59v14.29c0 .32-.26.59-.59.59" class="clsNavBAQ-1"/><path id="Path_1060" d="M27.86 17.04h-5.28c-1.26.03-2.31-.97-2.35-2.24v-1.65a.591.591 0 0 1 1.18 0v1.65c.03.62.56 1.09 1.17 1.06h5.27c.62.03 1.15-.44 1.18-1.06v-1.65a.591.591 0 0 1 1.18 0v1.65a2.306 2.306 0 0 1-2.35 2.24" class="clsNavBAQ-1"/><path id="Path_1061" d="M29.59 13.74h-8.77a.591.591 0 0 1 0-1.18h8.77a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1062" d="M31.27 21.99h-7.72a.591.591 0 0 1 0-1.18h7.72a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1063" d="M31.27 26.38h-7.72a.591.591 0 0 1 0-1.18h7.72a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1064" d="M19.7 31.32a1.14 1.14 0 1 1 1.14-1.14c0 .63-.51 1.14-1.14 1.14m-.04-1.13s.02.04.03.04l-.04-.04Z" class="clsNavBAQ-1"/><path id="Path_1065" d="M31.27 30.77h-7.72a.591.591 0 0 1 0-1.18h7.72a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1066" d="M31.41 39.02c-.15 0-.29-.06-.4-.16l-3.44-3.23a.595.595 0 0 1 .02-.83c.22-.2.55-.21.78-.03l2.93 2.75 3.87-6c.18-.27.54-.35.81-.17.27.18.35.54.17.81l-4.25 6.59c-.09.15-.25.24-.42.26h-.07" class="clsNavBAQ-1"/></g></g></svg> <h5>Build A Quote <span class="GetStartedNav__LinksArrow"><em>→</em></span></h5> </a> <a href="/partners/become-a-partner"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 51 51"><defs><style>.clsBecomePartner-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_2082"><path id="Path_6059" d="M5 0h46v51H5c-2.76 0-5-2.24-5-5V5c0-2.76 2.24-5 5-5Z" style="stroke-width:0;fill:#40c3d9"/><g id="Group_2079"><path id="Path_1068" d="M33.34 34.79c-1.12-.1-2.12-.75-2.67-1.73l-3.12-4.12a.633.633 0 0 1 .12-.88c.27-.21.66-.16.87.12l3.16 4.18c.07.12.97 1.57 2.14 1.06.5-.22.81-.73.76-1.28-.03-.42-.17-.82-.41-1.16l-6.78-9.69c-.73.55-1.52 1.03-2.35 1.42-2.03.97-3.61 1.12-4.68.44-.75-.5-1.18-1.36-1.14-2.26 0-.69.56-1.07 1.41-1.65a19.46 19.46 0 0 0 3.03-2.47c.45-.45.83-.84 1.15-1.18 1.39-1.43 1.91-1.97 3.21-1.97h1.51c1.67-.14 3.34.35 4.66 1.39l.26.18c2.35 1.57 3.14 2.14 3.14 2.14.16.12.26.31.26.51v11.77c0 .35-.28.63-.62.63h-2.07l.02.04c.4.55.62 1.21.65 1.89.05 1.05-.55 2.01-1.52 2.43-.31.14-.66.22-1 .22m.99-5.85h2.32V18.15c-.39-.27-1.25-.87-2.84-1.93l-.26-.18a5.42 5.42 0 0 0-3.97-1.17h-1.51c-.75 0-.99.23-2.31 1.59-.33.34-.71.73-1.17 1.19-.98.98-2.06 1.85-3.21 2.62-.32.19-.61.42-.88.68 0 .45.21.88.57 1.14.38.24 1.34.5 3.47-.51.94-.44 1.81-1 2.6-1.66a.624.624 0 0 1 .93.1l6.25 8.94Z" class="clsBecomePartner-2"/><path id="Path_1069" d="M29.79 36.38c-.15 0-.31-.02-.46-.05-.74-.19-1.38-.65-1.81-1.28l-3.57-5.1a.625.625 0 0 1 1.02-.72l3.58 5.12c.35.68 1.19.94 1.86.58.03-.01.05-.03.08-.04.53-.35.52-.86.45-1.4v-.13c-.04-.34.21-.65.55-.68.34-.04.65.21.68.55v.01l-.62.06.64.04c.21.99-.18 2.01-1.01 2.59-.41.28-.9.44-1.4.45" class="clsBecomePartner-2"/><path id="Path_1070" d="M25.76 36.87c-.66.01-1.3-.25-1.76-.73l-3.62-5.17a.625.625 0 0 1 1.02-.72l3.58 5.11c.48.35 1.13.36 1.62.02.35-.19.58-.54.63-.93.08-.34.42-.54.76-.46.34.08.54.42.46.76v.02c-.14.74-.61 1.38-1.29 1.73-.44.22-.92.35-1.41.35" class="clsBecomePartner-2"/><path id="Path_1071" d="M21.81 37.38c-.78-.01-1.51-.41-1.93-1.06l-2.95-4.2c-.39-.65-1.41-1.9-2.17-1.9h-1.02c-.35 0-.63-.28-.62-.63V17.83c0-.35.28-.63.62-.63h3.07c.69-.04 1.37-.2 2-.49 1.8-.74 3.73-1.09 5.67-1.04.35-.01.64.26.65.6s-.26.64-.6.65h-.05c-1.79-.05-3.57.28-5.22.96-.77.35-1.6.55-2.45.58h-2.44v10.51h.4c1.67 0 3.06 2.22 3.21 2.47l2.95 4.19c.34.53 1.05.68 1.58.34a.55.55 0 0 0 .09-.07c.34-.16.6-.43.75-.77a.622.622 0 1 1 1.18.4c-.24.64-.71 1.16-1.32 1.47-.42.25-.9.39-1.39.4" class="clsBecomePartner-2"/></g></g></svg> <h5>Become A Partner <span class="GetStartedNav__LinksArrow"><em>→</em></span></h5> </a> </div> </div> </div> </div> <script> let buttonSubtles = document.querySelectorAll('.NavBar__ButtonSubtleTrigger'); let subMenus = document.querySelectorAll('.NavBar__SubMenu'); let mobileHamburgers = document.querySelectorAll('.NavBar__MobileNavicon'); let mobileHamburgerBacks = document.querySelectorAll('.MobileDropdownNav__BackButton'); function closeNavigation() { subMenus.forEach(subMenu => { subMenu.classList.remove('active'); }); buttonSubtles.forEach(buttonSubtleparent => { buttonSubtleparent.parentNode.classList.remove("active"); }); } buttonSubtles.forEach(buttonSubtle => { buttonSubtle.addEventListener('click', (e) => { e.preventDefault(); const id = buttonSubtle.getAttribute('data-nav'); if(document.querySelector(`.NavBar__SubMenu[data-menu="${id}"]`).classList.contains('active')) { document.querySelector(`.NavBar__SubMenu[data-menu="${id}"]`).classList.remove('active'); buttonSubtle.parentNode.classList.remove("active"); } else { closeNavigation(); document.querySelector(`.NavBar__SubMenu[data-menu="${id}"]`).classList.add('active'); buttonSubtle.parentNode.classList.add("active"); } }); }); mobileHamburgers.forEach(mobileHamburger => { mobileHamburger.addEventListener('click', (e) => { e.preventDefault(); if(document.getElementsByClassName("NavBar__MobileDropdown")[0].classList.contains("NavBar__MobileDropdown--Visible")) { subMenus.forEach(subMenu => { subMenu.classList.remove('active'); }); } mobileHamburger.parentNode.classList.toggle("NavBar__MobileNavicon--Close"); document.getElementsByClassName("NavBar__MobileDropdown")[0].classList.toggle("NavBar__MobileDropdown--Visible"); }); }); mobileHamburgerBacks.forEach(mobileHamburgerBack => { mobileHamburgerBack.addEventListener('click', (e) => { e.preventDefault(); closeNavigation(); }); }); let navigation = document.getElementsByClassName("NavBar")[0]; // Event listener for clicking outside the navigation document.addEventListener('click', (event) => { if (!navigation.contains(event.target)) { if(!event.target.matches('.Search__SearchField')) { if(!event.target.matches('.Search__TopField svg')) { closeNavigation(); } } } }); </script> <section class="UseCaseHero"> <div class="Breadcrumb__Container"> <div class="Breadcrumb"> <a href="/">Home</a> <a href="/how-we-do-it">How We Do It</a> <a href="/how-we-do-it/use-cases">Use Cases</a> <a href="">Ransomware</a> </div> </div> <div class="UseCaseHero__Content"> <div class="UseCaseHero__Container"> <div class="UseCaseHero__ContainerLeft"> <h3 class="eyebrow">RANSOMWARE</h3> <h1>Stop Ransomware Before It Spreads</h1> <p>With the rise of Ransomware-as-a-Service (RaaS) and sophisticated social engineering tactics, rapid threat detection and containment are critical. We harden your layered defenses and support in developing a strategy for identifying, responding to, and remediating ransomware attacks.</p> <a class="UseCaseHero__LeftBtn" href="/get-started">GET STARTED</a> </div> <div class="UseCaseHero__ContainerRight"> <div class="UseCaseHero__ContainerRightRansomwareeBoxTop"> <h3>It's a Matter of Minutes...</h3> </div> <div class="UseCaseHero__ContainerRightRansomwareeBoxBottom"> <div> <svg xmlns="http://www.w3.org/2000/svg" width="51.217" height="54.651"><defs><clipPath id="a"><path fill="rgba(0,0,0,0)" stroke="#40c3d9" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" d="M0 0h51.217v54.651H0z" data-name="Rectangle 1154"/></clipPath></defs><g data-name="Group 1725"><g stroke="#40c3d9" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" clip-path="url(#a)" data-name="Group 1724"><path fill="rgba(0,0,0,0)" d="m1 29.612 3.434-3.431 3.434 3.431" data-name="Path 5046"/><path fill="rgba(0,0,0,0)" d="m50.217 19.316-3.434 3.431-3.434-3.431" data-name="Path 5047"/><path fill="rgba(0,0,0,0)" d="M25.037 53.651c13.92-4.9 18.93-16.989 20.734-25.181" data-name="Path 5048"/><path fill="rgba(0,0,0,0)" d="M46.784 20.306V9.663a1.8 1.8 0 0 0-1.8-1.8h-3.522" data-name="Path 5049"/><path fill="rgba(0,0,0,0)" d="M25.037 53.651C11.119 48.747 6.108 36.662 4.3 28.47" data-name="Path 5050"/><path fill="rgba(0,0,0,0)" d="M3.289 20.306V9.663a1.8 1.8 0 0 1 1.8-1.8h3.525" data-name="Path 5051"/><path fill="rgba(0,0,0,0)" d="M8.67 7.868C20.559 7.868 24.979 1 24.979 1h.114S29.517 7.868 41.4 7.868" data-name="Path 5052"/><path fill="rgba(0,0,0,0)" d="M30.217 23.651a6 6 0 1 0-6 6 6 6 0 0 0 6-6Z" data-name="Path 5053"/><path fill="none" d="m28.455 27.889 5.763 5.762" data-name="Line 63"/></g></g></svg> <p>Proactive threat sweeps and threat hunts</p> </div> <div> <svg xmlns="http://www.w3.org/2000/svg" width="57" height="57" data-name="Group 1716"><defs><clipPath id="a"><path fill="none" stroke="#40c3d9" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" d="M0 0h57v57H0z" data-name="Rectangle 1150"/></clipPath></defs><g fill="none" stroke="#40c3d9" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" clip-path="url(#a)" data-name="Group 1715"><path d="M28.907 23.519a17.257 17.257 0 0 0 4.443 2.538c0 6.714-4.443 7.614-4.443 7.614" data-name="Path 5028"/><path d="M28.905 23.519a17.245 17.245 0 0 1-4.44 2.538c0 6.714 4.44 7.614 4.44 7.614" data-name="Path 5029"/><path d="m10.505 45.092 11.289-11.289" data-name="Line 44"/><path d="M13.391 33.82h8.533v8.533" data-name="Path 5030"/><path d="M46.671 10.194 35.382 21.483" data-name="Line 45"/><path d="M43.475 21.924h-8.534v-8.533" data-name="Path 5031"/><path d="M28.433 50.638v5.551" data-name="Line 46"/><path d="M28.433.677v5.552" data-name="Line 47"/><path d="M56.189 28.433h-5.551" data-name="Line 48"/><path d="M6.228 28.433H.677" data-name="Line 49"/><path d="M8.415 36.88A21.734 21.734 0 0 1 36.881 8.415" data-name="Path 5032"/><path d="M48.919 21.188a21.734 21.734 0 0 1-28.933 27.263" data-name="Path 5033"/><path d="M16.365 27.226a10.86 10.86 0 0 1 10.861-10.861" data-name="Path 5034"/><path d="M40.501 29.64A10.858 10.858 0 0 1 29.64 40.501" data-name="Path 5035"/></g></svg> <p>eSentire MDR 24/7 Coverage</p> </div> <div> <svg xmlns="http://www.w3.org/2000/svg" width="54.01" height="43.691"><defs><clipPath id="a"><path fill="none" stroke="#40c3d9" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" d="M0 0h54.01v43.691H0z" data-name="Rectangle 1151"/></clipPath></defs><g data-name="Group 1718"><g fill="none" stroke="#40c3d9" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" clip-path="url(#a)" data-name="Group 1717"><path d="M48.072 30.207a7.126 7.126 0 1 0-7.127 7.126 7.127 7.127 0 0 0 7.127-7.126Z" data-name="Path 5036"/><path d="m46.031 35.292 7.069 7.069" data-name="Line 50"/><path d="M41.493 14.61a20.931 20.931 0 1 0-12.106 26.769" data-name="Path 5037"/><path d="m42.661 5.615-.9 9.056-.323-.032-8.735-.866" data-name="Path 5038"/><path d="M22.106 20.934V8.191" data-name="Line 51"/><path d="M20.286 22.754h-8.192" data-name="Line 52"/><circle cx="1.82" cy="1.82" r="1.82" data-name="Ellipse 76" transform="translate(20.285 20.934)"/></g></g></svg> <p>15 Minute Mean Time to Contain</p> </div> <div> <svg xmlns="http://www.w3.org/2000/svg" width="51.265" height="50.007" data-name="Group 1720"><defs><clipPath id="a"><path fill="none" stroke="#40c3d9" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" d="M0 0h51.265v50.007H0z" data-name="Rectangle 1152"/></clipPath></defs><g fill="none" stroke="#40c3d9" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" clip-path="url(#a)" data-name="Group 1719"><path d="M30.5 49.378c20.332-7.164 20.135-30.874 20.135-30.874" data-name="Path 5039"/><path d="M50.635 18.504V7.616a.631.631 0 0 0-.629-.629h-4.3" data-name="Path 5040"/><path d="M30.5 49.378a28.149 28.149 0 0 1-7.877-4.241" data-name="Path 5041"/><path d="M10.365 18.504V7.616a.631.631 0 0 1 .629-.629h4.3" data-name="Path 5042"/><path d="M15.347 6.988c11.007 0 15.1-6.359 15.1-6.359h.106s4.1 6.359 15.1 6.359" data-name="Path 5043"/><path d="M30.183 26.063v-9.538" data-name="Line 53"/><path d="M30.183 31.362h0" data-name="Line 54"/><path d="M16.996 25.003H5.614" data-name="Line 55"/><path d="M18.996 38.661h-6.829" data-name="Line 56"/><path d="M14.287 31.832H.629" data-name="Line 57"/></g></svg> <p>eSentire Incident Response 4-Hour Threat Suppression SLA</p> </div> </div> </div> </div> </div> </section> <section class="UseCaseTop"> <div class="UseCaseTop__Content"> <div class="UseCaseTop__Container"> <div class="UseCaseTop__ContainerCopy"> <div class="UseCaseTop__ByNumbers"> <h3 class="eyebrow">RANSOMWARE BY THE NUMBERS</h3> <div class="UseCaseTop__ByNumbersItems"> <div class="UseCaseTop__ByNumbersItem"> <h5>$265<span>B</span></h5> <p>in ransomware damages expected <br>by 2031<sup>1</sup></p> </div> <div class="UseCaseTop__ByNumbersItem"> <h5>30<span>%</span></h5> <p>YoY growth expected in <br>ransomware attacks<sup>1</sup></p> </div> <div class="UseCaseTop__ByNumbersItem"> <h5>$5.13<span>M</span></h5> <p>average cost of a ransomware <br>attack in 2023<sup>2</sup></p> </div> <div class="UseCaseTop__ByNumbersItem"> <h5>25<span>%</span></h5> <p>of malicious attacks that rendered systems inoperable involved ransomware<sup>2</sup></p> </div> </div> <div class="UseCaseTop__ByNumbersBottomCopy"> 1 Cybersecurity Ventures, Official Cybercrime Report 2022<br>2 IBM, Cost of Data Breach Report 2023 </div> </div> <h2>Ransomware attacks are leveraged in new ways to target your organization.</h2> <p>What started as opportunistic attacks that threat actors used to extort transactional payments has evolved to sophisticated state-sponsored ransomware attacks targeting high-value industries, including utilities, state & local government and education, manufacturing, and healthcare providers. In addition, the growing geopolitical tensions are bringing a new wave of politically-motivated ransomware attacks to sow instability and mistrust.</p> <p><strong>What does this mean for your business?</strong></p> <p>Just because you recover your IT systems and data from backups doesn’t mean the threat of ransomware is over. The effects of a ransomware attack may linger for years, eroding your reputation, costing millions in clean-up efforts, and often limiting your ability to land business in highly regulated industries.</p> <p>It’s unrealistic to believe you can prevent ransomware attacks entirely. Therefore, you need a powerful combination of human expertise equipped with advanced technologies and automated response capabilities to stop ransomware attacks.</p> <p>At eSentire our mission is to hunt, investigate, and stop ransomware threats before they disrupt your business. You shouldn’t settle for partial security, so we ingest multiple signals, correlating data across your network, endpoint, log, identity and cloud sources providing complete visibility, deep investigation, and unparalleled response.</p> <p><strong>The result?</strong></p> <p>We stop ransomware attacks before they become business-disrupting events.</p> </div> </div> </div> </section> <section class="WeUnderstandToday"> <div class="WeUnderstandToday__Content"> <h2>We Understand Ransomware Today, <br>And In The Future</h2> <p>We have been preventing, disrupting, and remediating ransomware threats for decades. We understand where this threat is headed and the support you need to defend your organization from the fastest-growing threat in our space.</p> <div class="WeUnderstandToday__Table"> <div class="WeUnderstandToday__TableColumns"> <div class="WeUnderstandToday__TableColumnsTop"> <h3>PAST</h3> <h4>Localized Ransomware Attacks</h4> </div> <div class="WeUnderstandToday__TableColumnsBottom"> <ul> <li>Standalone tool deployment</li> <li>File encryption and theft</li> <li>Singular back up possible</li> </ul> </div> </div> <div class="WeUnderstandToday__TableColumns"> <div class="WeUnderstandToday__TableColumnsTop"> <h3>PRESENT</h3> <h4>Internal Denial of Service</h4> </div> <div class="WeUnderstandToday__TableColumnsBottom"> <ul> <li>Access by any means necessary</li> <li>Ransomware used as a catalyst</li> <li>Unrestorable, damaged backups</li> <li>Widespread damage</li> <li>Privileged credential access to servers and infrastructure</li> <li>Multiple revenue sources from ransom, extortion, and sale of data</li> <li>Introduction of Ransomware-as-a-Service</li> </ul> </div> </div> <div class="WeUnderstandToday__TableColumns"> <div class="WeUnderstandToday__TableColumnsTop"> <h3>FUTURE</h3> <h4>Accelerated Ransomware-as-a-Service</h4> </div> <div class="WeUnderstandToday__TableColumnsBottom"> <ul> <li>Consistent automation of persistent and widespread access</li> <li>Organizational damage</li> <li>Data encryption across outsourced software whereby credentialed access will expand to SaaS systems including accounting, payroll, CRM, and more</li> </ul> </div> </div> </div> </div> </section> <section class="TwoCards"> <div class="TwoCards__Content"> <div class="TwoCards__ContentCards"> <div class="TwoCards__ContentCard"> <div class="TwoCards__ContentCardTop"> <h3 class="eyebrow">REPORT</h3> <h2>Ransomware Readiness: How SMBs Can Prepare for the Rising Threat of Ransomware-as-a-Service, Initial Access Brokers, and Credential Theft </h2> <p>Download our ransomware report to inform your cybersecurity strategies, reduce cyber risk, and see how to prepare for a ransomware attack. </p> </div> <a href="/resources/library/ransomware-readiness-how-smbs-can-prepare-for-the-rising-threat-of-ransomware-as-a-service-initial-access-brokers-and-credential-theft">Download the Report</a> </div> <div class="TwoCards__ContentCard"> <div class="TwoCards__ContentCardTop"> <h3 class="eyebrow">WEBINAR</h3> <h2>SMB Ransomware Readiness: Protecting Your Business From Advanced Cyber Threats</h2> <p>Watch this webinar to get vital insights from latest research observed by our Threat Response Unit (TRU), highlighting alarming trends and the growing sophistication of ransomware attacks that increasingly exploit small business vulnerabilities.</p> </div> <a href="/resources/library/smb-ransomware-readiness-protecting-your-business-from-advanced-cyber-threats">WATCH NOW</a> </div> </div> </div> <div class="FAQPopup__CTAContent"> <div class="FAQPopup__CTA"> <h3>Ransomware FAQ </h3> <a class="FAQPopup__CTATrigger" data-modal-id="FAQPopup">View Now</a> </div> </div> </section> <section class="FAQPopup" data-modal-id="FAQPopup"> <div class="FAQPopup__Content"> <div class="FAQPopup__Close" data-modal-id="FAQPopup"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 10 10"><defs><style>.ClostBlack1{fill:#000000}</style></defs><g id="Layer_2-2"><path class="ClostBlack1" d="M5 10c-2.76 0-5-2.24-5-5s2.24-5 5-5 5 2.24 5 5-2.24 5-5 5ZM5 .59C2.57.59.59 2.57.59 5S2.57 9.41 5 9.41 9.41 7.43 9.41 5 7.43.59 5 .59Z"></path><path class="ClostBlack1" d="M6.64 6.93c-.08 0-.15-.03-.21-.09L3.16 3.57c-.11-.11-.11-.3 0-.42s.3-.11.42 0l3.27 3.27c.11.11.11.3 0 .42-.06.06-.13.09-.21.09Z"></path><path class="ClostBlack1" d="M3.36 6.93c-.08 0-.15-.03-.21-.09a.308.308 0 0 1 0-.42l3.27-3.27c.11-.11.3-.11.42 0s.11.3 0 .42L3.57 6.84c-.06.06-.13.09-.21.09Z"></path></g></svg> </div> <div class="FAQPopup__Container"> <h2>Ransomware FAQ</h2> <div class="FAQPopup__List"> <div class="FAQPopup__ListItem" data-drawer-id="1"> <div class="FAQPopup__ListItemTop"> <h4>What is a ransomware attack? </h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="1"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>Ransomware is a type of malicious software, or malware, designed to encrypt files on a device, rendering them unusable. Attackers demand ransom, usually in cryptocurrency, in exchange for a decryption key. Ransomware attacks are largely introduced through phishing emails, malicious websites, or infected software applications.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="2"> <div class="FAQPopup__ListItemTop"> <h4>What makes a ransomware attack different from other types of cyberattacks?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="2"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>Ransomware attacks are unique because of their potentially dual-threat nature. Ransomware not only encrypts data to disrupt business operations but may also involve data exfiltration. In these double extortion attacks, attackers threaten to release or sell sensitive data if their demands are not met, resulting in significant pressure on victims to comply with ransom demands.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="3"> <div class="FAQPopup__ListItemTop"> <h4>How have ransomware attacks evolved? </h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="3"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>Ransomware attacks have evolved drastically, with attackers using more sophisticated tactics such as advanced encryption algorithms that are nearly impossible to break without the decryption key. While traditional ransomware attacks used to be opportunistic, modern ransomware campaigns are more targeted with attackers conducting research to identify high value targets that are more likely to pay large ransoms.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="4"> <div class="FAQPopup__ListItemTop"> <h4>What is Ransomware-as-a-Service (RaaS)? </h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="4"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>RaaS is a business model that allows amateur cybercriminals to buy ransomware and intrusion playbooks from other skilled cybercriminals. This has led to an increase in both the frequency and sophistication of attacks and lowered the threshold for ransomware attacks.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="5"> <div class="FAQPopup__ListItemTop"> <h4>What are the primary initial access vectors for ransomware attacks? </h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="5"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>The main vectors of ransomware attacks are phishing emails, Business Email Compromises (BEC), browser-based attacks like SEO poisoning and malvertising, remote desktop protocol (RDP) abuse, and credential abuse.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="6"> <div class="FAQPopup__ListItemTop"> <h4>How does eSentire help protect against ransomware attacks?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="6"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>Knowing how to prepare for and defend against a ransomware attack is essential. Critical aspects of your protection against ransomware should include hardening systems, rigorous prevention measures, ransomware detection and response, recovery and restoration measures, and plans to inform relevant authorities and affected parties.</p> <p>eSentire helps organizations protect against ransomware attack vectors through Exposure Management Services, Managed Detection and Response and Digital Forensics and Incident Response. </p> <p><a href="/what-we-do/exposure-vulnerability-and-risk-management">eSentire Exposure Management Services</a> address initial access vectors and formulate a robust security strategy that includes training and regular testing. We offer rigorous assessments through Penetration Testing, Vulnerability Management, and Phishing and Security Awareness Training programs, to equip organizations with a strong defense mechanism against potential threats and help build cybersecurity resilience. </p> <p><a href="/what-we-do/esentire-managed-detection-and-response">eSentire Managed Detection and Response (MDR)</a> protects against ransomware attacks through our 24/7 threat detection, isolation, disruption, and response, carried out by a team of skilled SOC Cyber Analysts and Elite Threat Hunters. This constant vigilance allows for rapid response to ransomware attacks, effectively containing their impact. We equip your organization with the necessary expertise to understand and identify attacker presence, evaluate footholds they may have established, and combat persistent access attempts, creating a thorough and robust defense against ransomware attacks.</p> <p>Finally, <a href="/what-we-do/digital-forensics-and-incident-response">eSentire Digital Forensics and Incident Response (DFIR)</a> plays a key role in helping organizations recover from ransomware attacks. With our Emergency Incident Response support and a guaranteed 4-hour threat suppression under the Incident Response Retainer SLA, DFIR offers immediate and effective responses to ransomware attacks. DFIR also provides thorough digital forensic investigations to determine the extent of the breach, producing results that can stand up in a court of law, and offers guidance through evidence handling, crisis communications, compliance notifications, and more, ensuring a comprehensive recovery process. </p> </div> </div> </div> </div> </div> </section> <script> let FAQPopUpCtas = document.querySelectorAll('.FAQPopup__CTATrigger'); let FAQPopUpCloseBtns = document.querySelectorAll('.FAQPopup__Close'); let FAQPopUpCloseBtnsInline = document.querySelectorAll('.FAQPopup__CloseInline'); FAQPopUpCtas.forEach(FAQPopUpCta => { FAQPopUpCta.addEventListener('click', (e) => { e.preventDefault(); const id = FAQPopUpCta.getAttribute('data-modal-id'); document.querySelector(`.FAQPopup[data-modal-id="${id}"]`).classList.add('active'); document.getElementsByTagName("body")[0].style.overflow = "hidden"; }); }); FAQPopUpCloseBtns.forEach(FAQPopUpCloseBtn => { FAQPopUpCloseBtn.addEventListener('click', (e) => { e.preventDefault(); const id = FAQPopUpCloseBtn.getAttribute('data-modal-id'); document.querySelector(`.FAQPopup[data-modal-id="${id}"]`).classList.remove('active'); document.getElementsByTagName("body")[0].style.overflow = "auto"; }); }); FAQPopUpCloseBtnsInline.forEach(FAQPopUpCloseBtn => { FAQPopUpCloseBtn.addEventListener('click', (e) => { const id = FAQPopUpCloseBtn.getAttribute('data-modal-id'); document.querySelector(`.FAQPopup[data-modal-id="${id}"]`).classList.remove('active'); document.getElementsByTagName("body")[0].style.overflow = "auto"; }); }); </script> <script> let FAQPopupDrawerTriggers = document.querySelectorAll('.FAQPopup__ListItemTopIcon'); let FAQPopupDrawers = document.querySelectorAll('.FAQPopup__ListItem'); FAQPopupDrawerTriggers.forEach(FAQPopupDrawerTrigger => { FAQPopupDrawerTrigger.addEventListener('click', (e) => { e.preventDefault(); const drawerId = FAQPopupDrawerTrigger.getAttribute('data-drawer-id'); document.querySelector(`.FAQPopup__ListItem[data-drawer-id="${drawerId}"]`).classList.toggle('FAQPopup__ListItem--Open'); }); }); </script> <section class="IndustryServices IndustryServices__UseCase"> <div class="IndustryServices__Content"> <div class="IndustryServices__Container"> <h2>Defending Your Organization From Ransomware Attacks</h2> <p>We protect organizations from social engineering tactics, fileless ransomware, lateral movement, and Ransomware-as-a-Service. Here’s how our services map to the various <br>ransomware attack vectors.</p> <div class="IndustryServices__Cards"> <div class="IndustryServices__Card"> <div class="IndustryServices__CardTop IndustryServices__CardTopBanner"> <div class="IndustryServices__CardBanner"> <h3>ANTICIPATE</h3> </div> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" viewBox="0 0 55 55"><defs><style>.clsMRS-1{fill:none;stroke:#5063f9;stroke-linecap:round;stroke-linejoin:round}</style></defs><circle id="Ellipse_6" cx="27.5" cy="27.5" r="27.5" data-name="Ellipse 6" style="fill:#d4d8e9"></circle><g id="Group_601" data-name="Group 601"><path id="Line_32" d="M33.97 35.89v-4.12" class="clsMRS-1" data-name="Line 32"></path><path id="Path_996" d="M41.85 41.02H26.09l7.88-14.39 7.88 14.39Z" class="clsMRS-1" data-name="Path 996"></path><path id="Path_997" d="M34.6 38.33c0 .35-.28.64-.64.64s-.64-.28-.64-.63.28-.64.64-.64c.35 0 .63.28.64.63Z" data-name="Path 997" style="fill:#5063f9"></path><path id="Path_998" d="M36.19 23.31v-5.66c0-.19-.16-.35-.35-.35h-2.22" class="clsMRS-1" data-name="Path 998"></path><path id="Path_999" d="M22.9 38.14c-7.83-4.71-7.75-14.83-7.75-14.83" class="clsMRS-1" data-name="Path 999"></path><path id="Path_1000" d="M15.15 23.31v-5.66c0-.19.16-.35.35-.35h2.22" class="clsMRS-1" data-name="Path 1000"></path><path id="Path_1001" d="M17.75 17.3c5.75 0 7.89-3.32 7.89-3.32h.05s2.14 3.32 7.89 3.32" class="clsMRS-1" data-name="Path 1001"></path></g></svg> <h3>Exposure Management Services</h3> <ul> <li>Button down initial access vectors</li> <li>Develop robust security strategy, training initiatives, and testing cadence</li> <li>Assessments and testing through Penetration Testing, Vulnerability Scanning, Phishing and Security Awareness Training programs</li> </ul> </div> <a href="/what-we-do/exposure-vulnerability-and-risk-management">LEARN MORE →</a> </div> <div class="IndustryServices__Card"> <div class="IndustryServices__CardTop IndustryServices__CardTopBanner"> <div class="IndustryServices__CardBanner"> <h3>WITHSTAND</h3> </div> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" viewBox="0 0 55 55"><defs><style>.MDRcls-1{fill:none;stroke:#5063f9;stroke-linecap:round;stroke-linejoin:round}</style></defs><circle id="Ellipse_6" cx="27.5" cy="27.5" r="27.5" data-name="Ellipse 6" style="fill:#d4d8e9"></circle><g id="Group_600" data-name="Group 600"><path id="Path_988" d="M27.76 24.81c.74.58 1.56 1.05 2.43 1.39 0 3.68-2.43 4.17-2.43 4.17" class="MDRcls-1" data-name="Path 988"></path><path id="Path_989" d="M27.76 24.81c-.74.58-1.56 1.05-2.43 1.39 0 3.68 2.43 4.17 2.43 4.17" class="MDRcls-1" data-name="Path 989"></path><path id="Line_26" d="m17.68 36.63 6.18-6.19" class="MDRcls-1" data-name="Line 26"></path><path id="Path_990" d="M19.26 30.45h4.68v4.68" class="MDRcls-1" data-name="Path 990"></path><path id="Line_27" d="m37.49 17.51-6.18 6.18" class="MDRcls-1" data-name="Line 27"></path><path id="Path_991" d="M35.74 23.93h-4.68v-4.68" class="MDRcls-1" data-name="Path 991"></path><path id="Line_28" d="M27.5 39.67v3.04" class="MDRcls-1" data-name="Line 28"></path><path id="Line_29" d="M27.5 12.29v3.04" class="MDRcls-1" data-name="Line 29"></path><path id="Line_30" d="M42.71 27.5h-3.04" class="MDRcls-1" data-name="Line 30"></path><path id="Line_31" d="M15.33 27.5h-3.04" class="MDRcls-1" data-name="Line 31"></path><path id="Path_992" d="M16.53 32.13c-2.56-6.06.29-13.04 6.35-15.6 2.96-1.25 6.29-1.25 9.25 0" class="MDRcls-1" data-name="Path 992"></path><path id="Path_993" d="M38.72 23.53c2.19 6.2-1.07 13-7.27 15.19-2.79.98-5.85.89-8.58-.26" class="MDRcls-1" data-name="Path 993"></path><path id="Path_994" d="M20.89 26.84c0-3.29 2.66-5.95 5.95-5.95h0" class="MDRcls-1" data-name="Path 994"></path><path id="Path_995" d="M34.11 28.16c0 3.29-2.66 5.95-5.95 5.95h0" class="MDRcls-1" data-name="Path 995"></path></g></svg> <h3>Managed Detection and Response (MDR)</h3> <ul> <li>Gain continuous protection with 24/7 threat detection, isolation, disruption, and containment from our SOC Cyber Analysts and Elite Threat Hunters of ransomware attacks</li> <li>Expertise to understand attacker presence, evaluate footholds, and battle persistent access attempts</li> <li>Original threat research, compromise driven content development, and high velocity advisory insights</li> </ul> </div> <a href="/what-we-do/esentire-managed-detection-and-response">LEARN MORE →</a> </div> <div class="IndustryServices__Card"> <div class="IndustryServices__CardTop IndustryServices__CardTopBanner"> <div class="IndustryServices__CardBanner"> <h3>RECOVER</h3> </div> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" viewBox="0 0 55 55"><defs><style>.clsDFIR-1{fill:none;stroke:#5063f9;stroke-linecap:round;stroke-linejoin:round}</style></defs><circle id="Ellipse_6" cx="27.5" cy="27.5" r="27.5" data-name="Ellipse 6" style="fill:#d4d8e9"></circle><g id="Group_602" data-name="Group 602"><path id="Path_973" d="M32.58 20.53c.4.82.64 1.71.7 2.62" class="clsDFIR-1" data-name="Path 973"></path><path id="Path_974" d="M21.03 16.33c1.21-.6 2.55-.91 3.91-.91a8.26 8.26 0 0 1 6.71 3.44" class="clsDFIR-1" data-name="Path 974"></path><path id="Path_975" d="M16.76 32.42c1.44-4.47.83-6.57.83-8.53 0-3.47.34-4.92 1.82-6.38" class="clsDFIR-1" data-name="Path 975"></path><path id="Path_976" d="M25.13 18.26c2.57.11 4.75 1.94 5.31 4.45" class="clsDFIR-1" data-name="Path 976"></path><path id="Path_977" d="M20.18 25.45a9.05 9.05 0 0 1-.14-1.56c-.12-3.14.9-4.66 3.2-5.43" class="clsDFIR-1" data-name="Path 977"></path><path id="Path_978" d="M19 34.28c.51-1.23.88-2.52 1.1-3.84.14-1.02.22-2.04.22-3.07" class="clsDFIR-1" data-name="Path 978"></path><path id="Path_979" d="M27.09 22.12c.38.55.68 1.15.87 1.79" class="clsDFIR-1" data-name="Path 979"></path><path id="Path_980" d="M21.51 34.88c.87-1.89 1.37-3.92 1.47-5.99 0-3.4-.41-2.73-.41-4.97 0-1.72.84-2.87 2.37-2.87.19-.01.38.02.56.09" class="clsDFIR-1" data-name="Path 980"></path><path id="Path_981" d="M25.69 26.19c.04-.81-.17-1.61-.6-2.3" class="clsDFIR-1" data-name="Path 981"></path><path id="Path_982" d="M24.29 35.34s.64-1.56 1.02-2.7" class="clsDFIR-1" data-name="Path 982"></path><path id="Path_983" d="M32.06 15.41c2.67 1.99 3.72 5.36 3.72 9" class="clsDFIR-1" data-name="Path 983"></path><path id="Path_984" d="M15.17 20.86c.08-.91.31-1.81.67-2.65 1.71-3.7 4.91-5.31 9.09-5.31 1.97-.04 3.92.46 5.63 1.43" class="clsDFIR-1" data-name="Path 984"></path><path id="Path_985" d="M14.82 29.72c.3-1.43.41-2.88.32-4.34-.05-.84-.09-1.73-.08-2.62" class="clsDFIR-1" data-name="Path 985"></path><path id="Line_24" d="m36.03 34.84 1.07 1.08" class="clsDFIR-1" data-name="Line 24"></path><path id="Path_986" d="m41.15 42.3-3.89-3.89c-.64-.64-.64-1.69 0-2.33s1.69-.64 2.33 0l3.89 3.89c.64.64.64 1.69 0 2.33-.64.64-1.69.64-2.33 0Z" class="clsDFIR-1" data-name="Path 986"></path><path id="Path_987" d="M38.17 29.7c0-3.72-3.02-6.74-6.74-6.74s-6.74 3.02-6.74 6.74 3.02 6.74 6.74 6.74h0c3.72 0 6.74-3.02 6.74-6.74Z" class="clsDFIR-1" data-name="Path 987"></path><path id="Line_25" d="M31.44 30.34v-4.53" class="clsDFIR-1" data-name="Line 25"></path><circle id="Ellipse_56" cx="31.44" cy="32.89" r=".37" class="clsDFIR-1" data-name="Ellipse 56"></circle></g></svg> <h3>Digital Forensics and Incident Response (DFIR)</h3> <ul> <li>Emergency Incident Response support and Incident Response Retainer SLA with 4-hour threat suppression</li> <li>Digital Forensics investigations and determination of breach extent with results that can bear scrutiny in court of law</li> <li>Guidance through evidence handling, crisis communications, compliance notifications, and more</li> </ul> </div> <a href="/what-we-do/digital-forensics-and-incident-response">LEARN MORE →</a> </div> </div> </div> <div class="IndustryServices__Cta"> <div class="IndustryServices__CtaLeft"> <h3>It’s time for comprehensive ransomware attack protection that scales. Ready to get started?</h3> </div> <div class="IndustryServices__CtaRight"> <a href="/build-a-quote">Build A Quote</a> </div> </div> </div> </section> <section class="InActionCarousel Ransomware"> <div class="InActionCarousel__Content"> <h2>Team eSentire In Action</h2> <h3>8 Hours in Battle During the SunWalker Ransomware Incident</h3> <p>Learn how our 24/7 Security Operations Center (SOC) and Threat Response Unit (TRU) defended an online educational institution with eSentire Managed Detection and Response.</p> <div class="InActionCarousel__Timelines"> <div class="InActionCarousel__TimelinesImages"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/Use-Cases/Ransomware/Ransomware-Battle_Desktop_Full%402x-100.jpg" alt="Desktop Timeline Image for Ransomware Battle"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/Use-Cases/Ransomware/Ransomware-Battle_Mobile_Full%402x-100.jpg" alt="Mobile Timeline Image for Ransomware Battle"> </div> </div> <h4>This battle demonstrates:</h4> <ul> <li>An effective defensive posture requires process, technology, and most importantly human expertise for combat-level containment and response</li> <li>You can’t battle these attackers alone: our response was balanced with automated platform disruptions and TRU/SOC team investigation and manual containment, far beyond the customer’s resources/in house-capabilities</li> <li>A multi-layered defense strategy is required to combat sophisticated ransomware attacks: we leveraged endpoint monitoring/investigation, infrastructure and indicator research, next-generation AV response, network monitoring/investigation, account monitoring, exfiltration investigation and manual defensive actions over an 8 hour period</li> </ul> </div> <div class="InActionCarousel__Cta"> <div class="InActionCarousel__CtaContainer"> <div class="InActionCarousel__CtaLeft"> <h3>Defending Against Modern Ransomware: Lessons from the SunWalker Incident</h3> </div> <div class="InActionCarousel__CtaRight"> <a href="/resources/library/defending-against-modern-ransomware-lessons-from-the-sunwalker-incident">DOWNLOAD THE REPORT </a> </div> </div> </div> </section> <section class="SingleVideoCta"> <div class="SingleVideoCta__Content"> <div class="SingleVideoCtaLeft Video-Btn" data-modal-video="video-an0gnxa5q7" data-modal-video-id="an0gnxa5q7"> <div class="SingleVideoCta__PreviewVideo PreviewVideo"> <div class="wistia_responsive_padding" style="padding:56.25% 0 0 0;position:relative;"> <div class="wistia_responsive_wrapper" style="height:100%;left:0;position:absolute;top:0;width:100%;"> <div class="wistia_embed wistia_async_lcofp8d123 seo=false videoFoam=true" style="height:100%;width:100%"> </div> </div> </div> <svg data-name="play-icon-svg" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 41.38 41.18"><defs><style>.play-icon-svg-1{fill:none}</style></defs><g id="Group_1246" data-name="Group 1246"><g id="Group_1245" data-name="Group 1245"><path id="Path_4266-2" data-name="Path 4266-2" d="M20.69.58c11.04 0 19.99 8.95 19.99 19.99s-8.95 19.99-19.99 19.99S.7 31.61.7 20.57 9.65.58 20.69.58" style="fill:#696de3"></path><path id="Path_4267" data-name="Path 4267" d="M40.68 20.41H.7C.59 31.45 9.45 40.49 20.49 40.6c11.04.11 20.08-8.75 20.19-19.79v-.4" style="fill:#787be6"></path><path id="Path_4268" data-name="Path 4268" d="M15.16 31.82c-.19 0-.37-.04-.54-.13-.39-.2-.64-.6-.64-1.04V10.48c0-.44.25-.84.64-1.04.4-.2.87-.16 1.23.09l14.16 10.09a1.156 1.156 0 0 1 0 1.89L15.85 31.6c-.2.14-.44.22-.69.22" style="fill:#f9f9f9"></path><path id="Path_4269" data-name="Path 4269" d="M13.98 20.5v10.23a1.182 1.182 0 0 0 1.87.96l14.16-10.23c.31-.22.49-.58.49-.96H13.98Z" style="fill:#e2dff4"></path></g></g></svg> </div> </div> <div class="SingleVideoCtarRight"> <h2>Malicious BestCrypt Detection Uncovers Full Blown Ransomware Attack at 3am</h2> <p>Watch this video to see how a Fortinet vulnerability led to a ransomware attack impacting 250 endpoints in a customer’s environment. Original detection engineering developed by TRU identified the malicious use of BestCrypt and our 24/7 SOC Cyber Analysts immediately contained the attack and reversed the encryption.</p> <a class="Video-Btn" data-modal-video="video-an0gnxa5q7" data-modal-video-id="an0gnxa5q7" href="/resources/library/esentire-24-7-soc-cyber-analysts-in-actionmalicious-bestcrypt-detection-uncovers-full-blown-ransomware-attack-at-3am">Watch Now →</a> </div> </div> </section> <div class="MultiVideo__VideoModal" data-modal-id="video-an0gnxa5q7"> <!-- Modal content --> <div class="MultiVideo__VideoModal-content"> <span class="MultiVideo__VideoModal-close" data-modal-video="video-an0gnxa5q7" data-modal-video-id="an0gnxa5q7">×</span> <div class="VideoCards__VideoModal-frameContainer"> <script src="//fast.wistia.com/embed/medias/an0gnxa5q7.jsonp" async></script> <div class="wistia_embed wistia_async_an0gnxa5q7"> </div> </div> </div> </div><script src="//fast.wistia.net/assets/external/E-v1.js" defer></script> <script> let videos = document.querySelectorAll('.Video-Btn'); let closeBtns = document.querySelectorAll('.MultiVideo__VideoModal-close'); videos.forEach(video => { video.addEventListener('click', (e) => { e.preventDefault(); const id = video.getAttribute('data-modal-video'); const videoId = video.getAttribute('data-modal-video-id'); document.querySelector(`.MultiVideo__VideoModal[data-modal-id="${id}"]`).classList.add('active'); document.getElementsByTagName("body")[0].style.overflow = "hidden"; var videoHandle = Wistia.api(videoId); videoHandle.play(); }); }); closeBtns.forEach(close => { close.addEventListener('click', (e) => { e.preventDefault(); const id = close.getAttribute('data-modal-video'); const videoId = close.getAttribute('data-modal-video-id'); document.querySelector(`.MultiVideo__VideoModal[data-modal-id="${id}"]`).classList.remove('active'); document.getElementsByTagName("body")[0].style.overflow = "auto"; var videoHandle = Wistia.api(videoId); videoHandle.pause(); }); }); </script> <section class="WhatIsRanswomare"> <div class="WhatIsRanswomare__Content"> <h2>What is Ransomware?</h2> <p>Ransomware is a form of malware designed to encrypt files on a device, rendering the files and their system unusable. Malicious actors demand ransom in exchange for decryption. If the ransom isn’t paid, the ransomware actors will threaten to sell or leak the exfiltrated data.</p> <p>Ransomware incidents continue to become more destructive and impactful. Attackers engage in lateral movement to target critical data and propagate ransomware across entire networks. These actors routinely use tactics that make data recovery more difficult for organizations. As a result, the economic and reputational impacts of ransomware attacks can be challenging to remediate fully for organizations of any size.</p> <p>Threat actors may attempt to take advantage of you at your most vulnerable state through secondary and tertiary extortion attempts: </p> <div class="WhatIsRanswomare__Cards"> <div class="WhatIsRanswomare__Card"> <h4>1.</h4> <h3>Ransom payments</h3> <p>The attacker demands an initial payment via Bitcoin in exchange for restoring access to your files.</p> </div> <svg xmlns="http://www.w3.org/2000/svg" width="48" height="48"><defs><clipPath id="a"><path fill="#f0f0fc" d="M0 0h24.792v20.879H0z" data-name="Rectangle 1104"/></clipPath></defs><g data-name="Group 1660" transform="translate(-757 -6195)"><circle cx="24" cy="24" r="24" fill="#696de3" data-name="Ellipse 3" transform="translate(757 6195)"/><g data-name="Group 1659"><g clip-path="url(#a)" data-name="Group 1658" transform="translate(769.053 6208.629)"><path fill="#f0f0fc" d="M14.351 20.878a1.936 1.936 0 0 1-1.369-3.306l5.2-5.2H1.936a1.936 1.936 0 0 1 0-3.872h16.246l-5.2-5.2a1.936 1.936 0 0 1 2.74-2.732l8.5 8.5h.005a1.926 1.926 0 0 1 .479.843 2.122 2.122 0 0 1 .05.258 1.931 1.931 0 0 1-.112.932v.008l-.035.084a1.921 1.921 0 0 1-.412.592l-8.493 8.494a1.93 1.93 0 0 1-1.369.567" data-name="Path 4953"/></g></g></g></svg> <div class="WhatIsRanswomare__Card"> <h4>2.</h4> <h3>Extortion around the attack</h3> <p>The attacker threatens to publicize the incident in an attempt to extort funds from those concerned of reputational damage.</p> </div> <svg xmlns="http://www.w3.org/2000/svg" width="48" height="48"><defs><clipPath id="a"><path fill="#f0f0fc" d="M0 0h24.792v20.879H0z" data-name="Rectangle 1104"/></clipPath></defs><g data-name="Group 1660" transform="translate(-757 -6195)"><circle cx="24" cy="24" r="24" fill="#696de3" data-name="Ellipse 3" transform="translate(757 6195)"/><g data-name="Group 1659"><g clip-path="url(#a)" data-name="Group 1658" transform="translate(769.053 6208.629)"><path fill="#f0f0fc" d="M14.351 20.878a1.936 1.936 0 0 1-1.369-3.306l5.2-5.2H1.936a1.936 1.936 0 0 1 0-3.872h16.246l-5.2-5.2a1.936 1.936 0 0 1 2.74-2.732l8.5 8.5h.005a1.926 1.926 0 0 1 .479.843 2.122 2.122 0 0 1 .05.258 1.931 1.931 0 0 1-.112.932v.008l-.035.084a1.921 1.921 0 0 1-.412.592l-8.493 8.494a1.93 1.93 0 0 1-1.369.567" data-name="Path 4953"/></g></g></g></svg> <div class="WhatIsRanswomare__Card"> <h4>3.</h4> <h3>Profit from the stolen data</h3> <p>Your sensitive data may be replicated and released for sale on the Dark Web.</p> </div> </div> <div class="WhatIsRanswomare__Cta"> <div class="WhatIsRanswomare__CtaLeft"> <h3>Remember, paying a ransom may nullify your cybersecurity insurance policy. Our experts can provide incident response and digital forensics support before you pay.</h3> </div> <div class="WhatIsRanswomare__CtaRight"> <a href="/get-started">Contact Us</a> </div> </div> </div> </section> <section class="ReduceImpact"> <div class="ReduceImpact__Content"> <h2>How To Reduce The Impact Of A Ransomware Attack</h2> <div class="ReduceImpact__Items"> <div class="ReduceImpact__Item"> <?xml version="1.0" encoding="UTF-8"?><svg id="New_Layer" data-name="New Layer" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 50 50"><defs><style>.cls-1 {fill: none;stroke: #696de3;stroke-linecap: round;stroke-linejoin: round;stroke-width: 2px;}</style></defs><g><ellipse class="cls-1" cx="25" cy="11.43" rx="19" ry="7.24"/><path class="cls-1" d="m6,38.57c0,4,8.5,7.24,19,7.24"/><path class="cls-1" d="m6,29.52c0,4,8.5,7.24,19,7.24"/><path class="cls-1" d="m6,20.48c0,4,8.5,7.24,19,7.24s19-3.24,19-7.24"/><line class="cls-1" x1="6" y1="38.38" x2="6" y2="11.62"/><line class="cls-1" x1="44" y1="28.62" x2="44" y2="11.62"/></g><g><path class="cls-1" d="m31.33,40.38c0,3,2.43,5.43,5.43,5.43s5.43-2.43,5.43-5.43-2.44-5.43-5.43-5.43l-2.71.06"/><polyline class="cls-1" points="36.31 37.67 33.6 34.95 36.31 32.24"/></g></svg> <p>Maintain offline, encrypted backups of data and to regularly test your backups</p> </div> <div class="ReduceImpact__Item"> <?xml version="1.0" encoding="UTF-8"?><svg id="New_Layer" data-name="New Layer" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 50 50"><defs><style>.cls-1 {fill: none;stroke: #696de3;stroke-linecap: round;stroke-linejoin: round;stroke-width: 2px;}</style></defs><rect class="cls-1" x="4.55" y="13.44" width="40.9" height="30.23" rx="2" ry="2"/><line class="cls-1" x1="6.33" y1="9.89" x2="42.78" y2="9.89"/><line class="cls-1" x1="8.11" y1="6.33" x2="41" y2="6.33"/><polyline class="cls-1" points="4.55 35.82 17 25 27.67 35.67 34.78 30.33 45.45 41.27"/><path class="cls-1" d="m36.56,22.33c0,.98-.8,1.78-1.77,1.78s-1.78-.8-1.78-1.78.8-1.78,1.78-1.78,1.77.8,1.77,1.78Z"/></svg> <p>Maintain regularly updated “gold images” of critical systems</p> </div> <div class="ReduceImpact__Item"> <?xml version="1.0" encoding="UTF-8"?><svg id="New_Layer" data-name="New Layer" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 50 50"><defs><style>.cls-1 {fill: none;stroke: #696de3;stroke-linecap: round;stroke-linejoin: round;stroke-width: 2px;}</style></defs><g><path class="cls-1" d="m29.25,44.54H8.86c-1.87,0-3.4-1.53-3.4-3.4V8.86c0-1.87,1.53-3.4,3.4-3.4h27.19c1.87,0,3.4,1.53,3.4,3.4v17.09"/><line class="cls-1" x1="5.46" y1="18.2" x2="39.44" y2="18.2"/><line class="cls-1" x1="10.56" y1="10.56" x2="13.96" y2="10.56"/><line class="cls-1" x1="10.56" y1="23.3" x2="13.96" y2="23.3"/><line class="cls-1" x1="10.56" y1="36.89" x2="13.96" y2="36.89"/><line class="cls-1" x1="5.46" y1="31.8" x2="30.95" y2="31.8"/></g><g><path class="cls-1" d="m34.35,39.44c0,2.81,2.28,5.1,5.1,5.1s5.1-2.28,5.1-5.1-2.29-5.1-5.1-5.1l-2.55.06"/><polyline class="cls-1" points="39.02 36.89 36.47 34.35 39.02 31.8"/></g></svg> <p>Retain backup hardware to rebuild systems in the event rebuilding the primary system is not preferred</p> </div> <div class="ReduceImpact__Item"> <?xml version="1.0" encoding="UTF-8"?><svg id="New_Layer" data-name="New Layer" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 50 50"><defs><style>.cls-1 {fill: none;stroke: #696de3;stroke-linecap: round;stroke-linejoin: round;stroke-width: 2px;}</style></defs><polyline class="cls-1" points="6.78 13.15 4.04 10.42 6.78 7.69"/><polyline class="cls-1" points="6.78 27.73 4.04 25 6.78 22.27"/><polyline class="cls-1" points="43.22 14.98 45.96 17.71 43.22 20.44"/><polyline class="cls-1" points="43.22 36.85 45.96 39.58 43.22 42.31"/><line class="cls-1" x1="39.58" y1="17.71" x2="31.38" y2="17.71"/><line class="cls-1" x1="26.82" y1="17.71" x2="10.42" y2="17.71"/><line class="cls-1" x1="39.58" y1="25" x2="22.27" y2="25"/><line class="cls-1" x1="17.71" y1="25" x2="10.42" y2="25"/><line class="cls-1" x1="39.58" y1="32.29" x2="26.82" y2="32.29"/><line class="cls-1" x1="22.27" y1="32.29" x2="10.42" y2="32.29"/><line class="cls-1" x1="39.58" y1="39.58" x2="10.42" y2="39.58"/><line class="cls-1" x1="39.58" y1="10.42" x2="10.42" y2="10.42"/></svg> <p>Ensure you maintain access to applicable source code or executables</p> </div> <div class="ReduceImpact__Item"> <?xml version="1.0" encoding="UTF-8"?><svg id="New_Layer" data-name="New Layer" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 50 50"><defs><style>.cls-1 {fill: none;stroke: #696de3;stroke-linecap: round;stroke-linejoin: round;stroke-width: 2px;}</style></defs><g><g><line class="cls-1" x1="7.9" y1="37.57" x2="13.29" y2="37.57"/><line class="cls-1" x1="7.9" y1="28.59" x2="13.29" y2="28.59"/><line class="cls-1" x1="7.9" y1="20.51" x2="13.29" y2="20.51"/><line class="cls-1" x1="7.99" y1="11.54" x2="13.38" y2="11.54"/></g><path class="cls-1" d="m10.68,4.36h28.6c1.55,0,2.81,1.24,2.81,2.75v35.78c0,1.51-1.27,2.75-2.81,2.75H10.68"/><line class="cls-1" x1="10.68" y1="45.64" x2="10.68" y2="4.36"/></g><g><path class="cls-1" d="m26.79,17.79s3.14,2.53,6.28,3.59c0,9.5-6.28,10.77-6.28,10.77"/><path class="cls-1" d="m26.79,17.79s-3.14,2.53-6.28,3.59c0,9.5,6.28,10.77,6.28,10.77"/></g></svg> <p>Create, maintain, and exercise a cyber incident response plan that includes crisis communications and notification procedures for a ransomware attack </p> </div> </div> <p><a href="/get-started">Connect</a> with our Exposure Management experts to discuss security strategy, assessments and testing programs to measure your preparedness for a ransomware attack.</p> </div> </section> <section class="NeedIR"> <div class="NeedIR__Content"> <div class="NeedIR__Container"> <h2>Why Every Organization Needs An Incident Response (IR) Plan</h2> <p>Effective incident response quickly brings control, stability, and organization, should a ransomware attack be spreading across your environment. When the worst scenario happens, the speed of threat containment and recovery is critical to limiting business disruption.</p> <p>To stop a ransomware attack, consider the following:</p> <div class="NeedIR__Cards"> <div class="NeedIR__Card"> <h4>System recovery</h4> <p>Can we regain control of our systems?</p> </div> <div class="NeedIR__Card"> <h4>Data recovery</h4> <p>What needs to be rebuilt/reimaged? Can we recover our encrypted data?</p> </div> <div class="NeedIR__Card"> <h4>Communications management</h4> <p>Has our name been posted online? Do we need to manage any fallout?</p> </div> <div class="NeedIR__Card"> <h4>Financial considerations</h4> <p>What is the cost of the ransom? Should we pay and if so, how? Does our insurance cover the payout? Is there a second extortion element?</p> </div> <div class="NeedIR__Card"> <h4>Investigation and hardening</h4> <p>How did the attack unfold? Where are our weak points?</p> </div> <div class="NeedIR__Card"> <h4>Looking forward</h4> <p>How do we strengthen our cybersecurity posture?</p> </div> </div> </div> <div class="NeedIR__Cta"> <div class="NeedIR__CtaLeft"> <h3>The eSentire Cyber Security Investigations Team is here to help</h3> <p>Our On-Demand 24/7 Incident Response service, featuring an industry-leading 4-hour threat suppression SLA, delivers cutting-edge digital forensics technology, threat intelligence, and powerful 24/7 Incident Response expertise so you’re prepared for even the most advanced ransomware attack.</p> </div> <div class="NeedIR__CtaRight"> <a href="/get-started">CONTACT US</a> </div> </div> </div> </section> <section class="HeadingChecks HeadingChecks__Simple"> <div class="HeadingChecks__Content"> <div class="HeadingChecks__ContentTop"> <h2>Stop Ransomware Attacks with eSentire MDR</h2> <p>As the Authority in Managed Detection and Response, we protect the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. With eSentire in your corner, you can anticipate, withstand and recover from even the most sophisticated ransomware attacks before they disrupt your business. Here’s why enterprises choose eSentire:</p> </div> <ul> <li>24/7 Threat Detection and Security Operations to stop ransomware attacks before they deploy across your organization</li> <li>Battle-tested Elite Threat Hunters and security experts who manually hunt, contain, and respond to ransomware attacks on your behalf</li> <li>Our eSentire XDR Cloud Platform provides Security Network Effects so your defenses are hardened with every ransomware detection across our global customer base</li> <li>Industry-leading threat research and detection model development from our Threat Response Unit (TRU) to create encryption keys and new detection methodologies for lateral movement and cyber gang activities</li> <li>Industry-leading SLAs – 15 minute mean time to contain with eSentire MDR, and 4-hour remote threat suppression with our IR Retainer</li> </ul> </div> </section> <section class="G2LeaderSlider G2LeaderSlider__Default"> <div class="G2LeaderSlider__Content"> <h2>Security Leaders Count on eSentire to Prevent Business Disruption</h2> <div class="G2LeaderSlider__Badges"> <a class="G2LeaderSlider__BadgesLeft" href="https://www.g2.com/products/esentire/reviews" target="_blank"> <div class="G2LeaderSlider__BadgesLeftG2"> <img src="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV4/What-We-Do/SOC/g2_rating_2x.png" alt="A 4.7/5 G2 rating which indicates that customers rate eSentire as one of the best SOC-as-a-Service companies."> </div> <div class="G2LeaderSlider__BadgesLeftBadges"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/G2-Badges/2024-Fall/eSentire_G2_FALL24_Badges_CS_desktop_2x.png" alt="G2 Leader Desktop Badges in the MDR category showing that eSentire is recognized as one of the best SOC-as-a-Service providers."> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/G2-Badges/2024-Fall/eSentire_G2_FALL24_Badges_mobile_2x.png" alt="G2 Leader Mobile Badges in the MDR category showing that eSentire is recognized as one of the best SOC-as-a-Service providers."> </div> </a> <div class="G2LeaderSlider__BadgesRight"> <a href="/resources/mdr-and-cybersecurity-case-studies">READ MORE REVIEWS AND CASE STUDIES</a> </div> </div> <div class="G2LeaderSlider__Slides swiper"> <div class="swiper-wrapper"> <div class="G2LeaderSlider__Slide swiper-slide"> <div class="G2LeaderSlider__SlideQuoteRating"> <div class="G2LeaderSlider__SlideQuote"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 52 44"><path d="M0 0h52v44H0z" style="stroke-width:0;fill:#ef4d36"/><path d="M16.19 33.23c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.93.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.47 21.47 0 0 1 3.18-3.07h6.88a32.561 32.561 0 0 0-4.18 4.52 16.54 16.54 0 0 0-2.63 5.11c1.37.18 2.62.88 3.48 1.96.74 1 1.13 2.2 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52m17.41-.01c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.92.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.97 21.97 0 0 1 3.18-3.07h6.88a33.137 33.137 0 0 0-4.18 4.52 16.983 16.983 0 0 0-2.63 5.11c1.37.17 2.62.88 3.48 1.96.73 1 1.12 2.21 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52" style="fill:#fff;stroke-width:0"/></svg> </div> <div class="G2LeaderSlider__SlideRating"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 212 48"><defs><style>.clsRating-3{stroke-width:0;fill:#ef4d35}</style></defs><g id="Layer_1-2"><path id="Path_13" d="m29.19 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_14" d="m69.18 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_16" d="m105.82 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_17" d="m144.51 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_18" d="m182.85 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><g id="Rectangle_1016"><rect width="212" height="48" rx="5" ry="5" style="stroke-width:0;fill:none"/><rect width="210" height="46" x="1" y="1" rx="4" ry="4" style="stroke:#ef4d36;stroke-width:2px;fill:none"/></g></g></svg> </div> </div> <div class="G2LeaderSlider__SlideCopy"> <p>Excellent MDR Provider, amazing value for the service that you get!</p> <h3>Michael S.</h3> <h4>Enterprise Company</h4> <a href="https://www.g2.com/products/esentire/reviews/esentire-review-8340849" target="_blank">READ THE FULL REVIEW <span>→</span></a> </div> <div class="G2LeaderSlider__SlideNav"> <div class="G2LeaderSlider__SlidePrevious" tabindex="0" role="button" aria-label="Previous slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsPreviousSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2974" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsPreviousSlide-1"></path><path id="Path_2975" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsPreviousSlide-1"></path></g></svg> </div> <div class="G2LeaderSlider__SlideNext" tabindex="0" role="button" aria-label="Next slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsNextSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2972" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsNextSlide-1"></path><path id="Path_2973" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsNextSlide-1"></path></g></svg> </div> </div> </div> <div class="G2LeaderSlider__Slide swiper-slide"> <div class="G2LeaderSlider__SlideQuoteRating"> <div class="G2LeaderSlider__SlideQuote"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 52 44"><path d="M0 0h52v44H0z" style="stroke-width:0;fill:#ef4d36"/><path d="M16.19 33.23c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.93.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.47 21.47 0 0 1 3.18-3.07h6.88a32.561 32.561 0 0 0-4.18 4.52 16.54 16.54 0 0 0-2.63 5.11c1.37.18 2.62.88 3.48 1.96.74 1 1.13 2.2 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52m17.41-.01c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.92.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.97 21.97 0 0 1 3.18-3.07h6.88a33.137 33.137 0 0 0-4.18 4.52 16.983 16.983 0 0 0-2.63 5.11c1.37.17 2.62.88 3.48 1.96.73 1 1.12 2.21 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52" style="fill:#fff;stroke-width:0"/></svg> </div> <div class="G2LeaderSlider__SlideRating"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 212 48"><defs><style>.clsRating-3{stroke-width:0;fill:#ef4d35}</style></defs><g id="Layer_1-2"><path id="Path_13" d="m29.19 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_14" d="m69.18 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_16" d="m105.82 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_17" d="m144.51 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_18" d="m182.85 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><g id="Rectangle_1016"><rect width="212" height="48" rx="5" ry="5" style="stroke-width:0;fill:none"/><rect width="210" height="46" x="1" y="1" rx="4" ry="4" style="stroke:#ef4d36;stroke-width:2px;fill:none"/></g></g></svg> </div> </div> <div class="G2LeaderSlider__SlideCopy"> <p>Best money I have ever spent on Infosec</p> <h3>Chris T.</h3> <h4>Enterprise Company</h4> <a href="https://www.g2.com/products/esentire/reviews/esentire-review-8352579" target="_blank">READ THE FULL REVIEW <span>→</span></a> </div> <div class="G2LeaderSlider__SlideNav"> <div class="G2LeaderSlider__SlidePrevious" tabindex="0" role="button" aria-label="Previous slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsPreviousSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2974" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsPreviousSlide-1"></path><path id="Path_2975" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsPreviousSlide-1"></path></g></svg> </div> <div class="G2LeaderSlider__SlideNext" tabindex="0" role="button" aria-label="Next slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsNextSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2972" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsNextSlide-1"></path><path id="Path_2973" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsNextSlide-1"></path></g></svg> </div> </div> </div> <div class="G2LeaderSlider__Slide swiper-slide"> <div class="G2LeaderSlider__SlideQuoteRating"> <div class="G2LeaderSlider__SlideQuote"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 52 44"><path d="M0 0h52v44H0z" style="stroke-width:0;fill:#ef4d36"/><path d="M16.19 33.23c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.93.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.47 21.47 0 0 1 3.18-3.07h6.88a32.561 32.561 0 0 0-4.18 4.52 16.54 16.54 0 0 0-2.63 5.11c1.37.18 2.62.88 3.48 1.96.74 1 1.13 2.2 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52m17.41-.01c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.92.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.97 21.97 0 0 1 3.18-3.07h6.88a33.137 33.137 0 0 0-4.18 4.52 16.983 16.983 0 0 0-2.63 5.11c1.37.17 2.62.88 3.48 1.96.73 1 1.12 2.21 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52" style="fill:#fff;stroke-width:0"/></svg> </div> <div class="G2LeaderSlider__SlideRating"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 212 48"><defs><style>.clsRating-3{stroke-width:0;fill:#ef4d35}</style></defs><g id="Layer_1-2"><path id="Path_13" d="m29.19 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_14" d="m69.18 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_16" d="m105.82 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_17" d="m144.51 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_18" d="m182.85 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><g id="Rectangle_1016"><rect width="212" height="48" rx="5" ry="5" style="stroke-width:0;fill:none"/><rect width="210" height="46" x="1" y="1" rx="4" ry="4" style="stroke:#ef4d36;stroke-width:2px;fill:none"/></g></g></svg> </div> </div> <div class="G2LeaderSlider__SlideCopy"> <p>eSentire excels with advanced threat detection, real-time monitoring, MDR services, customized security, 24/7 SOC, and proactive threat hunting."</p> <h3>David P.</h3> <h4>Mid-Market Company</h4> <a href="https://www.g2.com/products/esentire/reviews/esentire-review-8373472" target="_blank">READ THE FULL REVIEW <span>→</span></a> </div> <div class="G2LeaderSlider__SlideNav"> <div class="G2LeaderSlider__SlidePrevious" tabindex="0" role="button" aria-label="Previous slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsPreviousSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2974" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsPreviousSlide-1"></path><path id="Path_2975" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsPreviousSlide-1"></path></g></svg> </div> <div class="G2LeaderSlider__SlideNext" tabindex="0" role="button" aria-label="Next slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsNextSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2972" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsNextSlide-1"></path><path id="Path_2973" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsNextSlide-1"></path></g></svg> </div> </div> </div> <div class="G2LeaderSlider__Slide swiper-slide"> <div class="G2LeaderSlider__SlideQuoteRating"> <div class="G2LeaderSlider__SlideQuote"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 52 44"><path d="M0 0h52v44H0z" style="stroke-width:0;fill:#ef4d36"/><path d="M16.19 33.23c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.93.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.47 21.47 0 0 1 3.18-3.07h6.88a32.561 32.561 0 0 0-4.18 4.52 16.54 16.54 0 0 0-2.63 5.11c1.37.18 2.62.88 3.48 1.96.74 1 1.13 2.2 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52m17.41-.01c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.92.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.97 21.97 0 0 1 3.18-3.07h6.88a33.137 33.137 0 0 0-4.18 4.52 16.983 16.983 0 0 0-2.63 5.11c1.37.17 2.62.88 3.48 1.96.73 1 1.12 2.21 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52" style="fill:#fff;stroke-width:0"/></svg> </div> <div class="G2LeaderSlider__SlideRating"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 212 48"><defs><style>.clsRating-3{stroke-width:0;fill:#ef4d35}</style></defs><g id="Layer_1-2"><path id="Path_13" d="m29.19 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_14" d="m69.18 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_16" d="m105.82 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_17" d="m144.51 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_18" d="m182.85 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><g id="Rectangle_1016"><rect width="212" height="48" rx="5" ry="5" style="stroke-width:0;fill:none"/><rect width="210" height="46" x="1" y="1" rx="4" ry="4" style="stroke:#ef4d36;stroke-width:2px;fill:none"/></g></g></svg> </div> </div> <div class="G2LeaderSlider__SlideCopy"> <p>You can depend on the eSentire team at any time and situation. They're a strong SOC team, capable of quickly assessing the severity of an incident and taking appropriate action.</p> <h3>Verified Customer</h3> <h4>Financial Services</h4> <a href="https://www.g2.com/products/esentire/reviews/esentire-review-8524350" target="_blank">READ THE FULL REVIEW <span>→</span></a> </div> <div class="G2LeaderSlider__SlideNav"> <div class="G2LeaderSlider__SlidePrevious" tabindex="0" role="button" aria-label="Previous slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsPreviousSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2974" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsPreviousSlide-1"></path><path id="Path_2975" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsPreviousSlide-1"></path></g></svg> </div> <div class="G2LeaderSlider__SlideNext" tabindex="0" role="button" aria-label="Next slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsNextSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2972" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsNextSlide-1"></path><path id="Path_2973" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsNextSlide-1"></path></g></svg> </div> </div> </div> <div class="G2LeaderSlider__Slide swiper-slide"> <div class="G2LeaderSlider__SlideQuoteRating"> <div class="G2LeaderSlider__SlideQuote"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 52 44"><path d="M0 0h52v44H0z" style="stroke-width:0;fill:#ef4d36"/><path d="M16.19 33.23c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.93.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.47 21.47 0 0 1 3.18-3.07h6.88a32.561 32.561 0 0 0-4.18 4.52 16.54 16.54 0 0 0-2.63 5.11c1.37.18 2.62.88 3.48 1.96.74 1 1.13 2.2 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52m17.41-.01c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.92.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.97 21.97 0 0 1 3.18-3.07h6.88a33.137 33.137 0 0 0-4.18 4.52 16.983 16.983 0 0 0-2.63 5.11c1.37.17 2.62.88 3.48 1.96.73 1 1.12 2.21 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52" style="fill:#fff;stroke-width:0"/></svg> </div> <div class="G2LeaderSlider__SlideRating"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 212 48"><defs><style>.clsRating-3{stroke-width:0;fill:#ef4d35}</style></defs><g id="Layer_1-2"><path id="Path_13" d="m29.19 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_14" d="m69.18 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_16" d="m105.82 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_17" d="m144.51 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_18" d="m182.85 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><g id="Rectangle_1016"><rect width="212" height="48" rx="5" ry="5" style="stroke-width:0;fill:none"/><rect width="210" height="46" x="1" y="1" rx="4" ry="4" style="stroke:#ef4d36;stroke-width:2px;fill:none"/></g></g></svg> </div> </div> <div class="G2LeaderSlider__SlideCopy"> <p>eSentire takes care of all the work! I request what I need and Boom, its done! I check the dashboard regularly just to keep an eye out on things, but i feel safe knowing they have my back.</p> <h3>Verified Customer</h3> <h4>Electrical/Electronic Manufacturing</h4> <a href="https://www.g2.com/products/esentire/reviews/esentire-review-6969630" target="_blank">READ THE FULL REVIEW <span>→</span></a> </div> <div class="G2LeaderSlider__SlideNav"> <div class="G2LeaderSlider__SlidePrevious" tabindex="0" role="button" aria-label="Previous slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsPreviousSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2974" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsPreviousSlide-1"></path><path id="Path_2975" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsPreviousSlide-1"></path></g></svg> </div> <div class="G2LeaderSlider__SlideNext" tabindex="0" role="button" aria-label="Next slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsNextSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2972" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsNextSlide-1"></path><path id="Path_2973" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsNextSlide-1"></path></g></svg> </div> </div> </div> <div class="G2LeaderSlider__Slide swiper-slide"> <div class="G2LeaderSlider__SlideQuoteRating"> <div class="G2LeaderSlider__SlideQuote"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 52 44"><path d="M0 0h52v44H0z" style="stroke-width:0;fill:#ef4d36"/><path d="M16.19 33.23c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.93.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.47 21.47 0 0 1 3.18-3.07h6.88a32.561 32.561 0 0 0-4.18 4.52 16.54 16.54 0 0 0-2.63 5.11c1.37.18 2.62.88 3.48 1.96.74 1 1.13 2.2 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52m17.41-.01c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.92.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.97 21.97 0 0 1 3.18-3.07h6.88a33.137 33.137 0 0 0-4.18 4.52 16.983 16.983 0 0 0-2.63 5.11c1.37.17 2.62.88 3.48 1.96.73 1 1.12 2.21 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52" style="fill:#fff;stroke-width:0"/></svg> </div> <div class="G2LeaderSlider__SlideRating"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 212 48"><defs><style>.clsRating-3{stroke-width:0;fill:#ef4d35}</style></defs><g id="Layer_1-2"><path id="Path_13" d="m29.19 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_14" d="m69.18 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_16" d="m105.82 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_17" d="m144.51 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_18" d="m182.85 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><g id="Rectangle_1016"><rect width="212" height="48" rx="5" ry="5" style="stroke-width:0;fill:none"/><rect width="210" height="46" x="1" y="1" rx="4" ry="4" style="stroke:#ef4d36;stroke-width:2px;fill:none"/></g></g></svg> </div> </div> <div class="G2LeaderSlider__SlideCopy"> <p>It is a complete system, the support is excellent. I like that they can isolate a resource at 2:00 AM without waking me up.</p> <h3>Verified Customer</h3> <h4>Utilities</h4> <a href="https://www.g2.com/products/esentire/reviews/esentire-review-6851447" target="_blank">READ THE FULL REVIEW <span>→</span></a> </div> <div class="G2LeaderSlider__SlideNav"> <div class="G2LeaderSlider__SlidePrevious" tabindex="0" role="button" aria-label="Previous slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsPreviousSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2974" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsPreviousSlide-1"></path><path id="Path_2975" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsPreviousSlide-1"></path></g></svg> </div> <div class="G2LeaderSlider__SlideNext" tabindex="0" role="button" aria-label="Next slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsNextSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2972" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsNextSlide-1"></path><path id="Path_2973" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsNextSlide-1"></path></g></svg> </div> </div> </div> </div> </div> </div> </section> <!-- Swiper JS --> <script src="https://cdn.jsdelivr.net/npm/swiper@9/swiper-bundle.min.js"></script> <!-- Initialize Swiper --> <script> var swiper = new Swiper(".G2LeaderSlider__Slides", { slidesPerView: 1, spaceBetween: 0, navigation: { nextEl: ".G2LeaderSlider__SlideNext", prevEl: ".G2LeaderSlider__SlidePrevious", }, autoplay: { delay: 11000 } }); </script> <section class="Recommended"> <div class="Recommended__Top"> <h2>Dive Deeper Into How to Protect Against Ransomware</h2> </div> <div class="Recommended__Bottom"> <a href="/resources/library/from-initial-access-to-ransomware-deployment-a-deep-dive-into-the-modern-threat-actors-playbook" class="Recommended__Block" data-aos="fade-up" data-aos-duration="1000" data-aos-delay="150"> <div class="Recommended__BlockTop"> <div class="Recommended__BlockTitle">REPORT</div> <div class="Recommended__BlockSummary">From Initial Access to Ransomware Deployment: A Deep Dive into the Modern Threat Actors’ Playbook</div> </div> <div class="Recommended__BlockFooter">VIEW REPORT →</div> </a> <a href="/blog/how-your-organization-can-prevent-a-ransomware-attack" class="Recommended__Block" data-aos="fade-up" data-aos-duration="1000" data-aos-delay="150"> <div class="Recommended__BlockTop"> <div class="Recommended__BlockTitle">BLOG</div> <div class="Recommended__BlockSummary">How Your Organization Can Prevent a Ransomware Attack</div> </div> <div class="Recommended__BlockFooter">READ THE BLOG →</div> </a> <a href="/resources/library/ransomware-readiness-how-smbs-can-prepare-for-the-rising-threat-of-ransomware-as-a-service-initial-access-brokers-and-credential-theft" class="Recommended__Block" data-aos="fade-up" data-aos-duration="1000" data-aos-delay="150"> <div class="Recommended__BlockTop"> <div class="Recommended__BlockTitle">REPORT</div> <div class="Recommended__BlockSummary">Ransomware Readiness: How SMBs Can Prepare for the Rising Threat of Ransomware-as-a-Service, Initial Access Brokers, and Credential Theft</div> </div> <div class="Recommended__BlockFooter">DOWNLOAD NOW →</div> </a> </div> <div class="Recommended__Cta"> <div class="Recommended__CtaLeft"> <h3>View our ransomware resources to learn more about how eSentire protects businesses.</h3> </div> <div class="Recommended__CtaRight"> <a href="/resources/library?topics%5B%5D=Ransomware">VIEW ALL RESOURCES</a> </div> </div> </section> <section class="GetStartedLong"> <div class="GetStartedLong__Content"> <div class="GetStartedLong__Grid"> <div class="GetStartedLong__GridLeft"> <h2>Ready to<br>Get Started?</h2> <p>We’re here to help! Submit your information and an eSentire representative will be in touch to discuss how eSentire can protect your business from ransomware attacks.</p> </div> <div class="GetStartedLong__GridRight"> <iframe id="GetStarted__IframeEmbed" class="GetStartedLong__GridForm" scrolling="no" src="https://mdr.esentire.com/l/651833/2022-01-11/lsxf7"></iframe> </div> </div> </div> </section> <script> var getStartedFrame = document.getElementById("GetStarted__IframeEmbed"); var URLWithParametersAdded = new URL(getStartedFrame.src+window.location.search); if (!window.location.search.includes('gclid') && readCookie('gclid') != null) { URLWithParametersAdded.searchParams.append('gclid', readCookie('gclid')); } if (!window.location.search.includes('kpid') && readCookie('kpid') != null) { URLWithParametersAdded.searchParams.append('kpid', readCookie('kpid')); } if (!window.location.search.includes('sfcampaignid') && readCookie('sfcampaignid') != null) { URLWithParametersAdded.searchParams.append('sfcampaignid', readCookie('sfcampaignid')); } if (!window.location.search.includes('msclid') && readCookie('msclid') != null) { URLWithParametersAdded.searchParams.append('msclid', readCookie('msclid')); } if (!window.location.search.includes('li_fat_id') && readCookie('li_fat_id') != null) { URLWithParametersAdded.searchParams.append('li_fat_id', readCookie('li_fat_id')); } if (!window.location.search.includes('utm_source') && readCookie('utm_source') != null) { URLWithParametersAdded.searchParams.append('utm_source', readCookie('utm_source')); } if (!window.location.search.includes('utm_medium') && readCookie('utm_medium') != null) { URLWithParametersAdded.searchParams.append('utm_medium', readCookie('utm_medium')); } if (!window.location.search.includes('utm_campaign') && readCookie('utm_campaign') != null) { URLWithParametersAdded.searchParams.append('utm_campaign', readCookie('utm_campaign')); } if (!window.location.search.includes('utm_content') && readCookie('utm_content') != null) { URLWithParametersAdded.searchParams.append('utm_content', readCookie('utm_content')); } getStartedFrame.src = URLWithParametersAdded; </script> <div id="cookie-consent" class="CookieConsent"> <div class="CookieConsent__Content"> <div class="CookieConsent__Row"> <div class="CookieConsent__Left"> <p>Cookies allow us to deliver the best possible experience for you on our website - by continuing to use our website or by closing this box, you are consenting to our use of cookies. Visit our <a href="/legal/privacy-policy" target="_blank">Privacy Policy</a> to learn more.</p> </div> <div class="CookieConsent__Right"> <a onclick="acceptCookieConsent();">Accept</a> </div> </div> </div> </div> <!-- Block: Footer --> <div class="Footer"> <div class="Footer__Contact"> <div class="Footer__ContactMessage">ARE YOU EXPERIENCING A SECURITY INCIDENT OR HAVE YOU BEEN BREACHED?</div> <a class="Footer__ContactNumber" href="tel:1-866-579-2200">Call 1-866-579-2200</a> </div> <div class="Footer__Content"> <div class="Footer__Top"> <div class="Footer__TopContent"> <div class="Footer__TopLeft"> <div class="Footer__TopLeftLogo"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 27.12 27.12"><circle cx="13.56" cy="13.56" r="13.56" style="fill:#263c91"/><path d="M17.82 8.59c-1.2-1.54-3.24-1.53-3.24-1.53h-2.04S10.5 7.05 9.3 8.59c-.73.94-.89 1.84-.89 2.47v5.01c0 .63.16 1.53.89 2.47 1.2 1.54 3.24 1.53 3.24 1.53h6.17v-2.89h-5.55s-.81 0-1.29-.61c-.29-.37-.36-.73-.36-.98V15h7.2v-3.93c0-.63-.16-1.53-.89-2.47Zm-6.31 2.78c0-.25.06-.61.36-.98.48-.61 1.29-.61 1.29-.61h.82s.81 0 1.29.61c.29.37.36.73.36.98v.76h-4.11v-.76Z" style="fill:#fff"/></svg> </div> <div class="Footer__TopLeftCopy"> <h3>The Proven Choice for <br>Managed Detection and Response</h3> <div class="Footer__TopLeftCopyCTAs"> <a href="/get-started">GET STARTED <span>→</span></a> <a href="https://esentire.channeltivity.com/Login" target="_blank">PARTNER LOGIN <span>→</span></a> </div> </div> </div> <div class="Footer__TopRight"> <div class="Footer__TopRightCopy"> <h3>Sales and <br>Customer Support</h3> </div> <div class="Footer__TopRightLinks"> <a href="tel:1-866-579-2200" class="Footer__TopRightLink"> <span>NORTH AMERICA</span> <span>1-866-579-2200</span> </a> <a href="tel:+44(0)8000 443242" class="Footer__TopRightLink"> <span>EMEA</span> <span>(0)8000-443242</span> </a> <a href="tel:+1 519 651 2200" class="Footer__TopRightLink"> <span>ANZ/APAC</span> <span>1-519-651-2200</span> </a> </div> </div> </div> </div> <div class="Footer__Middle"> <div class="Footer__MiddleContent"> <div class="Footer__MiddleSocialForm"> <div class="Footer__MiddleSocial"> <a href="https://ca.linkedin.com/company/esentire-inc-" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 34.62 35.53"><defs><style>.clsLinkedFooterIcon-1{fill:#172143;stroke-width:0}</style></defs><g id="Component_61_4"><path id="Rectangle_602" d="M2.96 12.68h6.21v19.79H2.96z" class="clsLinkedFooterIcon-1"/><path id="Path_1036" d="M25.95 12.24c-.23-.03-.47-.04-.72-.05-2.38-.13-4.66.92-6.12 2.8-.1.12-.19.25-.27.39v-2.65H12.9v19.79h6.21v-9.3c-.15-1.36.04-2.74.57-4 .56-.99 1.62-1.59 2.76-1.55a3.29 3.29 0 0 1 3.5 3.06V32.61h6.21V19.7c0-4.42-2.24-7.03-6.21-7.46" class="clsLinkedFooterIcon-1"/><path id="Path_1037" d="M9.67 6.52c0 1.99-1.61 3.6-3.6 3.6s-3.6-1.61-3.6-3.6 1.61-3.6 3.6-3.6 3.6 1.61 3.6 3.6" class="clsLinkedFooterIcon-1"/></g></svg> </a> <a href="https://twitter.com/eSentire" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34.32 35.52"><path d="M25.65 5.92h4.53l-9.89 11.3L31.92 32.6h-9.11l-7.13-9.33-8.16 9.33H2.98l10.58-12.09L2.4 5.91h9.34l6.45 8.53 7.46-8.52ZM24.06 29.9h2.51L10.38 8.49H7.69L24.06 29.9Z" style="fill:#172143;stroke-width:0"/></svg> </a> <a href="https://www.youtube.com/c/eSentireInc" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 43.64 35.51"><path d="M35.02 8.42H8.63c-3.53 0-6.38 2.86-6.38 6.38v11.42c0 3.53 2.86 6.38 6.38 6.38h26.39c3.53 0 6.38-2.86 6.38-6.38V14.8c0-3.53-2.86-6.38-6.38-6.38ZM17.88 26.37V14.63l10.17 5.87-10.17 5.87Z" style="fill:#172143;stroke-width:0"/></svg> </a> </div> <div class="Footer__MiddleForm"> <iframe id="Footer__IframeEmbed" scrolling="no" src="https://mdr.esentire.com/l/651833/2023-08-01/2pz6mw"></iframe> </div> </div> <div class="Footer__MiddleGrid"> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>What we do</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/what-we-do/esentire-managed-detection-and-response">Managed Detection and Response</a> <a href="/what-we-do/digital-forensics-and-incident-response">Digital Forensics and Incident Response</a> <a href="/what-we-do/exposure-vulnerability-and-risk-management">Exposure Management Services</a> <a href="/what-we-do/xdr-extended-detection-and-response">Extended Detection and Response (XDR)</a> <a href="/what-we-do/security-operations-center">Security Operations Center (SOC)</a> <a href="/what-we-do/mdr-integrations">Technology Integrations</a> <a href="/what-we-do/threat-response-unit">Threat Response Unit (TRU)</a> <a href="/what-we-do/team-esentire">Cyber Resilience Team</a> <a href="/what-we-do/esentire-managed-detection-and-response/microsoft-mdr">MDR for Microsoft</a> <a href="/what-we-do/esentire-managed-detection-and-response/aws-cloud-security">MDR for AWS</a> <a href="/what-we-do/esentire-managed-detection-and-response/mdr-for-genai">MDR for GenAI</a> <a href="/what-we-do/esentire-managed-detection-and-response/response-and-remediation">Response and Remediation</a> <a href="/how-we-do-it/mdr-pricing-packaging">MDR Pricing</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>How we do it</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/how-we-do-it/signals/mdr-for-endpoint">Endpoint</a> <a href="/how-we-do-it/signals/mdr-for-network">Network</a> <a href="/how-we-do-it/signals/mdr-for-log">Log</a> <a href="/how-we-do-it/signals/cloud">Cloud</a> <a href="/how-we-do-it/signals/identity">Identity</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Industries</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/how-we-do-it/industries/insurance-cybersecurity">Insurance</a> <a href="/how-we-do-it/industries/construction-cybersecurity">Construction</a> <a href="/how-we-do-it/industries/financial-services-cybersecurity">Finance</a> <a href="/how-we-do-it/industries/legal-cybersecurity">Legal</a> <a href="/how-we-do-it/industries/manufacturing-cybersecurity">Manufacturing</a> <a href="/how-we-do-it/industries/private-equity-cybersecurity">Private Equity</a> <a href="/how-we-do-it/industries/healthcare-cybersecurity">Healthcare</a> <a href="/how-we-do-it/industries/retail-cybersecurity">Retail</a> <a href="/how-we-do-it/industries/food-supply-cybersecurity">Food Supply</a> <a href="/how-we-do-it/industries/state-local-governments-cybersecurity">Government and Education</a> <a href="/how-we-do-it/industries/automotive-dealerships">Automotive Dealerships</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Use Cases</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/how-we-do-it/use-cases/ransomware">Ransomware</a> <a href="/how-we-do-it/use-cases/third-party-cyber-risk">Third-Party Risk</a> <a href="/how-we-do-it/use-cases/sensitive-data">Sensitive Data Security</a> <a href="/how-we-do-it/use-cases/cloud-misconfiguration-breaches">Cloud Misconfiguration</a> <a href="/how-we-do-it/use-cases/zero-day-exploits">Zero Day Attacks</a> <a href="/how-we-do-it/use-cases/cyber-risk-management">Cyber Risk</a> <a href="/how-we-do-it/use-cases/cybersecurity-compliance">Cybersecurity Compliance</a> <a href="/how-we-do-it/use-cases/mdr-outsourcing">Do More With Less</a> <a href="/how-we-do-it/use-cases/meet-cyber-insurance-requirements">Cyber Insurance</a> <a href="/how-we-do-it/use-cases/security-leadership">Security Leadership</a> <a href="/how-we-do-it/use-cases/cyber-threat-intelligence">Cyber Threat Intelligence</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Resources</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/resources/security-advisories">Security Advisories</a> <a href="/resources/blog">Blog</a> <a href="/resources/library">Resource Library</a> <a href="/resources/video-library">Video Library</a> <a href="/resources/tru-intelligence-center">TRU Intelligence Center</a> <a href="/resources/mdr-and-cybersecurity-case-studies">Case Studies</a> <a href="/switch-to-esentire">Switch to eSentire</a> <a href="/consolidate-and-save">Consolidate & Save</a> <a href="/esentire-mdr-vs-everyone">Real vs. Fake MDR</a> <a href="/esentire-mdr-vs-everyone/compare">Compare MDR Vendors</a> <a href="/cybersecurity-fundamentals-defined">Cybersecurity Glossary</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Tools</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/cybersecurity-assessment-tool">Cybersecurity Assessment</a> <a href="/mdr-roi-calculator">MDR ROI Calculator</a> <a href="/security-operations-center-pricing-calculator">SOC Calculator</a> <a href="/mitre-attck-framework-tool">MITRE ATT&CK® Tool</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Company</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/company/about-us">About Us</a> <a href="/company/leadership">Leadership</a> <a href="/company/newsroom">Newsroom</a> <a href="/company/event-calendar">Event Calendar</a> <a href="/company/careers">Careers</a> <a href="/partners">Partners</a> <a href="/en-au-nz/switch-to-esentire">Australia & New Zealand</a> <a href="/en-gb/switch-to-esentire">United Kingdom</a> </nav> </div> </div> </div> </div> <div class="Footer__Legal"> <p>2024 eSentire, Inc. All Rights Reserved.</p> <nav class="Footer__LegalNav"> <a href="/sitemap">Sitemap</a> <a href="/legal/terms-and-conditions">Terms and Conditions</a> <a href="/legal/privacy-policy">Privacy Policy</a> <a href="/legal/accessibility">Accessibility</a> <a href="/legal/documents">Legal</a> </nav> </div> </div> </div> <script> // Create cookie function setCookie(cname, cvalue, exdays) { const d = new Date(); d.setTime(d.getTime() + (exdays*24*60*60*1000)); let expires = "expires="+ d.toUTCString(); document.cookie = cname + "=" + cvalue + ";" + expires + ";path=/"; } // Delete cookie function deleteCookie(cname) { const d = new Date(); d.setTime(d.getTime() + (24*60*60*1000)); let expires = "expires="+ d.toUTCString(); document.cookie = cname + "=;" + expires + ";path=/"; } // Read cookie function getCookie(cname) { let name = cname + "="; let decodedCookie = decodeURIComponent(document.cookie); let ca = decodedCookie.split(';'); for(let i = 0; i <ca.length; i++) { let c = ca[i]; while (c.charAt(0) == ' ') { c = c.substring(1); } if (c.indexOf(name) == 0) { return c.substring(name.length, c.length); } } return ""; } // Set cookie consent function acceptCookieConsent(){ deleteCookie('user_cookie_consent'); setCookie('user_cookie_consent', 1, 30); document.getElementById("cookie-consent").classList.remove('show'); } let cookie_consent = getCookie("user_cookie_consent"); if(cookie_consent != ""){ }else{ document.getElementById("cookie-consent").classList.add('show'); } </script> <script type="application/ld+json">{"@context":"http://schema.org","@graph":[{"@type":"WebPage","author":{"@id":"https://www.esentire.com/#identity"},"copyrightHolder":{"@id":"https://www.esentire.com/#identity"},"copyrightYear":"2021","creator":{"@id":"https://www.esentire.com/#creator"},"dateCreated":"2021-07-20T13:46:10-04:00","dateModified":"2024-09-05T13:04:01-04:00","datePublished":"2021-07-20T13:21:00-04:00","description":"Stop ransomware attacks before they spread. Learn how eSentire MDR hunts, investigates, and stops ransomware attacks before they disrupt your business.","headline":"Stop Ransomware Before It Spreads","image":{"@type":"ImageObject","url":"https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV3/External/SEO/esentire-ransomware-meta.jpg"},"inLanguage":"en-us","mainEntityOfPage":"https://www.esentire.com/how-we-do-it/use-cases/ransomware","name":"Stop Ransomware Before It Spreads","publisher":{"@id":"https://www.esentire.com/#creator"},"url":"https://www.esentire.com/how-we-do-it/use-cases/ransomware"},{"@id":"https://www.esentire.com/#identity","@type":"LocalBusiness","address":{"@type":"PostalAddress","addressCountry":"CA","addressLocality":"Waterloo","addressRegion":"Ontario","postalCode":"N2L 3X2","streetAddress":"451 Phillip St, Suite 135, ON"},"alternateName":"eSentire Corporate Marketing","description":"eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire’s award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit www.esentire.com and follow @webinars.","email":"info@esentire.com","founder":"Eldon Sprickerhoff","foundingDate":"2001-01-01","foundingLocation":"Waterloo, Ontario","geo":{"@type":"GeoCoordinates","latitude":"43.48356169301266","longitude":"-80.54315326704616"},"image":{"@type":"ImageObject","height":"512","url":"https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assets/eSentire_emblem_512x512.jpg","width":"512"},"logo":{"@type":"ImageObject","height":"60","url":"https://esentire-dot-com-assets.s3.amazonaws.com/assets/_600x60_fit_center-center_82_none/302747/eSentire_emblem_512x512.png?mtime=1709753172","width":"60"},"name":"eSentire Inc.","openingHoursSpecification":[{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Sunday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Monday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Tuesday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Wednesday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Thursday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Friday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Saturday"],"opens":"09:00:00"}],"priceRange":"$$$","telephone":"1-866-579-2200","url":"https://www.esentire.com"},{"@id":"https://www.esentire.com/#creator","@type":"ProfessionalService","address":{"@type":"PostalAddress","addressCountry":"CA","addressLocality":"Waterloo","addressRegion":"Ontario","postalCode":"N2L 3X2","streetAddress":"451 Phillip St, Suite 135, ON"},"alternateName":"eSentire Corporate Marketing","email":"info@esentire.com","founder":"Eldon Sprickerhoff","foundingDate":"2001-01-01","foundingLocation":"Waterloo, Ontario","geo":{"@type":"GeoCoordinates","latitude":"43.48356169301266","longitude":"-80.54315326704616"},"image":{"@type":"ImageObject","height":"512","url":"https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assets/eSentire_emblem_512x512.jpg","width":"512"},"logo":{"@type":"ImageObject","height":"60","url":"https://esentire-dot-com-assets.s3.amazonaws.com/assets/_600x60_fit_center-center_82_none/302747/eSentire_emblem_512x512.png?mtime=1709753172","width":"60"},"name":"eSentire Inc.","priceRange":"$$$","telephone":"1-866-579-2200","url":"https://www.esentire.com"},{"@type":"BreadcrumbList","description":"Breadcrumbs list","itemListElement":[{"@type":"ListItem","item":"https://www.esentire.com","name":"Homepage","position":1},{"@type":"ListItem","item":"https://www.esentire.com/how-we-do-it","name":"How We Do It","position":2},{"@type":"ListItem","item":"https://www.esentire.com/how-we-do-it/use-cases","name":"Use Cases","position":3},{"@type":"ListItem","item":"https://www.esentire.com/how-we-do-it/use-cases/ransomware","name":"Ransomware","position":4}],"name":"Breadcrumbs"}]}</script> <script src="/main.js?v=4.11.57"></script> <script src="/style.js"></script> <script type="text/javascript" src="https://unpkg.com/aos@2.3.1/dist/aos.js"></script> <script type="text/javascript"> function readCookie(c_name) { var c_value = document.cookie; var c_start = c_value.indexOf(" " + c_name + "="); if (c_start == -1) { c_start = c_value.indexOf(c_name + "="); } if (c_start == -1) { c_value = null; } else { c_start = c_value.indexOf("=", c_start) + 1; var c_end = c_value.indexOf(";", c_start); if (c_end == -1) { c_end = c_value.length; } c_value = unescape(c_value.substring(c_start, c_end)); } return c_value; } </script> <script> AOS.init(); </script> <noscript> <img src="https://ws.zoominfo.com/pixel/3k8XsFBkOniCq5dTRwpV" alt="ZoomInfo Image for Video" width="1" height="1" style="display: none;" /> </noscript> <script type="text/javascript"> window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.defer = true; mf.src = "//cdn.mouseflow.com/projects/ce788296-8259-4e39-bcae-56ddd5b7e767.js"; document.getElementsByTagName("head")[0].appendChild(mf); })(); </script> </body> </html><!-- Cached by Blitz on 2024-11-21T21:14:51-05:00 --><!-- Served by Blitz on 2024-11-23T05:56:30-05:00 -->