CINXE.COM
eSentire | Manage Your Cyber Risk
<!doctype html> <html lang="en-US"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <meta name="robots" content="noodp,noydir"> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-57Z6ZWR'); </script> <!-- End Google Tag Manager --> <script> (function () { var zi = document.createElement('script'); zi.type = 'text/javascript'; zi.async = true; zi.src = 'https://ws.zoominfo.com/pixel/3k8XsFBkOniCq5dTRwpV'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(zi, s); })(); </script> <link rel="stylesheet" href="/style.css?v=4.11.57"> <link rel="stylesheet" href="https://unpkg.com/aos@2.3.1/dist/aos.css"> <link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/swiper@9/swiper-bundle.min.css"/> <link rel="shortcut icon" href="https://esentire-dot-com-assets.s3.ca-central-1.amazonaws.com/assetsV4/External/blue_favicon_48x48.ico?v=2024"> <link rel="stylesheet" href="https://use.typekit.net/evh1ctd.css"> <link rel="stylesheet" href="https://use.typekit.net/amm2djb.css"> <!-- Start VWO SmartCode --> <script referrerPolicy="no-referrer-when-downgrade" src="https://dev.visualwebsiteoptimizer.com/lib/780243.js" id="vwoCode"></script> <!-- End VWO SmartCode --> <title>eSentire | Manage Your Cyber Risk</title><meta name="generator" content="SEOmatic"> <meta name="description" content="Go beyond cyber risk management with eSentire. Learn how to build a cybersecurity strategy that reduces cyber risk, builds resilience, and prevents…"> <meta name="referrer" content="no-referrer-when-downgrade"> <meta name="robots" content="all"> <meta content="https://www.facebook.com/eSentireMDR/" property="fb:profile_id"> <meta content="en_US" property="og:locale"> <meta content="eSentire" property="og:site_name"> <meta content="website" property="og:type"> <meta content="https://www.esentire.com/how-we-do-it/use-cases/cyber-risk-management" property="og:url"> <meta content="Manage Your Cyber Risk" property="og:title"> <meta content="Go beyond cyber risk management with eSentire. Learn how to build a cybersecurity strategy that reduces cyber risk, builds resilience, and prevents…" property="og:description"> <meta content="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV3/External/SEO/Cyber-Risk_meta-image_v1.png" property="og:image"> <meta content="eSentire - The Authority in Managed Detection and Response" property="og:image:alt"> <meta name="twitter:card" content="summary_large_image"> <meta name="twitter:site" content="@eSentire"> <meta name="twitter:creator" content="@eSentire"> <meta name="twitter:title" content="Manage Your Cyber Risk"> <meta name="twitter:description" content="Go beyond cyber risk management with eSentire. Learn how to build a cybersecurity strategy that reduces cyber risk, builds resilience, and prevents…"> <meta name="twitter:image" content="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV3/External/SEO/Cyber-Risk_meta-image_v1.png"> <meta name="twitter:image:alt" content="eSentire - The Authority in Managed Detection and Response"> <link href="https://www.esentire.com/how-we-do-it/use-cases/cyber-risk-management" rel="canonical"> <link href="https://www.esentire.com" rel="home"></head> <body class="no-sidebar useCasesV3"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-57Z6ZWR" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Set Cookie for GCLID tracking --> <script type="text/javascript"> function readCookie(c_name) { var c_value = document.cookie; var c_start = c_value.indexOf(" " + c_name + "="); if (c_start == -1) { c_start = c_value.indexOf(c_name + "="); } if (c_start == -1) { c_value = null; } else { c_start = c_value.indexOf("=", c_start) + 1; var c_end = c_value.indexOf(";", c_start); if (c_end == -1) { c_end = c_value.length; } c_value = unescape(c_value.substring(c_start, c_end)); } return c_value; } function setCookie(a, d, b) { var c = new Date; c.setTime(c.getTime() + 864E5 * b); b = "; expires=" + c.toGMTString(); document.cookie = a + "=" + d + b } function getParam(a) { return (a = RegExp("[?&]" + a + "=([^&]*)").exec(window.location.search)) && decodeURIComponent(a[1].replace(/\+/g, " ")) } if (getParam("gclid")) { setCookie("gclid", getParam("gclid"), 270); }; if (getParam("utm_source")) { setCookie("utm_source", getParam("utm_source"), 270); }; if (getParam("utm_medium")) { setCookie("utm_medium", getParam("utm_medium"), 270); }; if (getParam("utm_campaign")) { setCookie("utm_campaign", getParam("utm_campaign"), 270); }; if (getParam("utm_content")) { setCookie("utm_content", getParam("utm_content"), 270); }; if (getParam("kpid")) { setCookie("kpid", getParam("kpid"), 270); }; if (getParam("sfcampaignid")) { setCookie("sfcampaignid", getParam("sfcampaignid"), 270) }; if (getParam("msclid")) { setCookie("msclid", getParam("msclid"), 270) }; if (getParam("li_fat_id")) { setCookie("li_fat_id", getParam("li_fat_id"), 270) }; </script> <!-- Block: NavBar --> <div class="NavBar"> <div class="NavBar__Content"> <div class="NavBar__Left"> <a class="NavBar__Logo" href="https://www.esentire.com"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 230 32" xml:space="preserve"><path d="M55.8 22c0 1.6-.3 3-1 4.2-.6 1.2-1.5 2.3-2.6 3.1-1.1.9-2.4 1.5-3.8 1.9-1.5.4-3 .6-4.6.6-2.4 0-4.5-.3-6.5-.9-1.9-.6-3.7-1.7-5.3-3.3l4.9-4.9c.8.8 1.9 1.4 3.1 1.7 1.2.3 2.5.5 3.8.5 3 0 4.4-.9 4.4-2.8 0-.8-.2-1.4-.6-1.8-.4-.4-1.1-.7-2-.8l-3.7-.5c-2.8-.4-4.8-1.3-6.2-2.8-1.4-1.5-2.1-3.6-2.1-6.3 0-1.4.2-2.7.8-4 .5-1.2 1.3-2.3 2.2-3.1 1-.9 2.2-1.6 3.5-2.1 1.4-.5 3-.7 4.7-.7 2.2 0 4.2.3 5.9.8 1.7.6 3.3 1.6 4.5 2.9l-4.8 4.8c-.4-.5-1-.8-1.6-1.1-.5-.2-1.1-.4-1.6-.5-.5-.1-1-.2-1.5-.2h-1.2c-.6 0-1.2.1-1.7.3-.4.2-.8.4-1.2.7-.3.3-.5.6-.7.9-.1.3-.2.7-.2 1 0 .2.1.5.1.7.1.3.3.5.5.7.2.2.5.4.8.6.4.2.9.3 1.3.4l3.7.5c2.7.4 4.8 1.2 6.1 2.6.8.8 1.4 1.8 1.8 2.9.6 1.4.8 2.7.8 4m7.4 9.6V.3h21v6.9H70.8v5.2h11.5v6.9H70.8v5.5h13.4v6.8h-21zm46.4 0-9.9-15.7v15.7h-7.6V.3h6.6l9.9 15.8V.3h7.6v31.3h-6.6zm28.8-24.5v24.4h-7.6V7.1h-7.6V.2H146v6.9h-7.6zm14.5 24.5V.3h7.6v31.3h-7.6zm31.9 0L179.3 20h-2.6v11.6h-7.6V.3h12.3c1.6 0 3.1.3 4.5.9 1.2.5 2.4 1.3 3.3 2.3.9.9 1.6 2 2 3.2.4 1.2.7 2.5.7 3.7 0 1-.1 2-.4 2.9-.3.8-.7 1.6-1.2 2.3-.5.7-1 1.2-1.6 1.7-.6.5-1.2.9-1.8 1.2l6.7 13.1h-8.8zm-.4-21.2c0-.8-.3-1.6-.9-2.2-.6-.6-1.4-1-2.4-1h-4.3v6.3h4.3c1 0 1.9-.3 2.4-1 .6-.5.9-1.3.9-2.1M200 31.6V.3h21v6.9h-13.4v5.2h11.5v6.9h-11.5v5.5H221v6.9l-21-.1zM22.7 3.9C19.8.2 14.9.2 14.9.2H10S5.1.2 2.2 3.9C.4 6.2 0 8.4 0 9.9V22c0 1.5.4 3.7 2.2 5.9C5 31.6 10 31.6 10 31.6h14.9v-7H11.4s-2 0-3.1-1.5c-.5-.7-.8-1.5-.9-2.4v-1.4h17.3V9.9c.1-1.5-.3-3.7-2-6M7.5 10.6c0-.9.3-1.7.9-2.4 1.2-1.5 3.1-1.5 3.1-1.5h2s2 0 3.1 1.5c.5.7.8 1.5.9 2.4v1.8h-10v-1.8zm218.3 15.7c1.5 0 2.7 1.2 2.7 2.7s-1.2 2.7-2.7 2.7c-1.5 0-2.7-1.2-2.7-2.7 0-1.5 1.2-2.7 2.7-2.7zm0 4.7c1.1 0 2.1-.9 2.1-2.1 0-1.1-.9-2.1-2.1-2.1-1.1 0-2.1.9-2.1 2.1 0 1.2.9 2.1 2.1 2.1zm-1.1-.7v-2.7h1.1c.8 0 1 .5 1 .8 0 .4-.2.7-.6.8l.7 1.1h-.6l-.7-1h-.4v1h-.5zm1-1.5c.4 0 .6-.1.6-.4 0-.3-.2-.4-.5-.4h-.5v.8h.4z" style="fill:#19234d"></path></svg> </a> </div> <div class="NavBar__Right"> <div class="NavBar__MobileGetStarted"> <a href="/get-started">Get Started</a> </div> <div class="NavBar__MainItems"> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="whatWeDo">What We Do</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="howWeDo">How We Do It</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="resources">Resources</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="company">Company</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="partners">Partners</div> </div> </div> <div class="NavBar__SecondaryItems"> <div class="NavBar__ButtonSubtleTriggerContainer NavBar__ButtonSubtleTriggerContainer--HideMobile"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleSearchIcon NavBar__ButtonSubtleTrigger" data-nav="search"> <svg data-name="New Layer" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" style="width: 26px;"><ellipse cx="12.18" cy="12.42" rx="10.18" ry="10.42" fill="none" stroke="#000" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2.5"></ellipse><path fill="none" stroke="#000" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2.5" d="M20.45 20.23L30 30"></path></svg> </div> </div> <div class="NavBar__ButtonGetStarted"> <div id="NavBar__Button-GetStarted" class="NavBar__ButtonSubtleTrigger NavBar__Button" data-nav="getStarted"> Get Started <svg class="NavBar__Button--Close" xmlns="http://www.w3.org/2000/svg" width="17.081" height="7.498" viewBox="0 0 17.081 7.498"> <path id="Path_34" data-name="Path 34" d="M1156.073,389.624l7.959,5.685,7.959-5.685" transform="translate(-1155.492 -388.811)" fill="none" stroke="#fff" stroke-linejoin="round" stroke-width="2"/> </svg> </div> </div> <button class="NavBar__MobileNavicon" data-mobile-nav-toggle> <span class="navicon"></span> </button> </div> </div> </div> <div class="NavBar__MobileDropdown" data-mobile-nav> <div class="NavBar__MobileButtons"> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="whatWeDo"> What we do <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="howWeDo"> How we do it <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="resources"> Resources <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="company"> Company <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="partners"> Partners <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> </div> <div class="NavBar__MobileCTA"> <a href="/get-started" class="NavBar__MobileCTAButton">Get Started</a> </div> </div> </div> <!-- WHAT WE DO --> <div class="WhatWeDo NavBar__SubMenu" data-menu="whatWeDo"> <div class="WhatWeDo__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">What We Do</div> </div> <div class="WhatWeDo__Content"> <div class="WhatWeDo__Links"> <h6>ESENTIRE SERVICES</h6> <a href="/what-we-do/esentire-managed-detection-and-response" class="WhatWeDo__LinksIconBox WhatWeDo__LinksIconBox--WithSubLinks"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/mdr_nav_1.png" alt="MDR Icon"> <div> <h5>Managed Detection and Response</h5> <p>Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.</p> </div> </a> <div class="WhatWeDo__LinksIconBoxInner"> <a href="/what-we-do/esentire-managed-detection-and-response"> <h5>All-In-One MDR Solution →</h5> </a> <a href="/what-we-do/esentire-managed-detection-and-response/microsoft-mdr"> <h5>MDR for Microsoft →</h5> </a> <a href="/what-we-do/esentire-managed-detection-and-response/mdr-for-genai"> <h5>MDR for GenAI →</h5> </a> </div> <a href="/what-we-do/digital-forensics-and-incident-response" class="WhatWeDo__LinksIconBox"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/dfir_nav_1.png" alt="DFIR Icon"> <div> <h5>Digital Forensics and Incident Response</h5> <p>Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.</p> </div> </a> <a href="/what-we-do/exposure-vulnerability-and-risk-management" class="WhatWeDo__LinksIconBox"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/exposure_nav_1.png" alt="Exposure Vulnerability and Risk Management Icon"> <div> <h5>Exposure Management Services</h5> <p>Cyber risk and advisory programs that identify security gaps and build security strategies to address them.</p> </div> </a> </div> <div class="WhatWeDo__Links"> <h6>PLATFORM, PEOPLE AND RESPONSE</h6> <div class="WhatWeDo__LinksBox"> <div class="WhatWeDo__LinksBoxLeft"> <a href="/what-we-do/security-operations-center"> <h5>Security Operations Center (SOC)</h5> <p>24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.</p> </a> <a href="/what-we-do/xdr-extended-detection-and-response"> <h5>Extended Detection and<br> Response (XDR)</h5> <p>XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.</p> </a> <a href="/what-we-do/mdr-integrations"> <h5>Technology Integrations</h5> <p>Seamless integration and threat investigation across your existing tech stack.</p> </a> </div> <div class="WhatWeDo__LinksBoxRight"> <a href="/what-we-do/threat-response-unit"> <h5>Threat Response Unit (TRU)</h5> <p>Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.</p> </a> <a href="/what-we-do/cyber-resilience-team"> <h5>Cyber Resilience Team</h5> <p>Extend your team capabilities and prevent business disruption with expertise from eSentire.</p> </a> <a href="/what-we-do/esentire-managed-detection-and-response/response-and-remediation"> <h5>Response and Remediation</h5> <p>We balance automated blocks with rapid human-led investigations to manage threats.</p> </a> </div> </div> </div> </div> </div> </div> <!-- HOW WE DO IT --> <div class="HowWeDo NavBar__SubMenu" data-menu="howWeDo"> <div class="HowWeDo__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">How We Do</div> </div> <div class="HowWeDo__Content"> <div class="HowWeDo__Links HowWeDo__Links-Icons"> <h6>24/7 MDR SIGNALS</h6> <a href="/how-we-do-it/signals/mdr-for-endpoint"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 58 58"><defs><style>.cls-endpointherosv1{fill:#fff}</style></defs><g id="Layer_2"><g id="Layer_2-2"><g id="Component_2459_7"><path id="Path_5133" d="M29 0c16 0 29 13 29 29S45 58 29 58 0 45 0 29 13 0 29 0Z" style="fill:#7f4ee5"/><g id="Group_1494"><g id="Group_1493"><path id="Path_5109" d="M45 38.6c-.4 0-.8-.4-.8-.8V16.7c0-.2-.2-.4-.4-.4H14.3c-.2 0-.4.2-.4.4v21.1c0 .4-.3.8-.7.9s-.8-.3-.9-.7V16.7c0-1.1.9-2 2-2h29.5c1.1 0 2 .9 2 2v21.1c0 .4-.4.8-.8.8" class="cls-endpointherosv1"/><path id="Path_5110" d="M24.1 38.6H10.6c-.4 0-.8-.4-.7-.9 0-.4.3-.7.7-.7h13.5c.4 0 .8.3.9.7s-.3.8-.7.9h-.2" class="cls-endpointherosv1"/><path id="Path_5111" d="M47.4 38.6H33.9c-.4 0-.8-.4-.7-.9 0-.4.3-.7.7-.7h13.5c.4 0 .8.3.9.7s-.3.8-.7.9h-.2" class="cls-endpointherosv1"/><path id="Path_5112" d="M46.1 43.4H11.9c-1.1 0-2-.9-2-2v-3.6c0-.4.3-.8.7-.9s.8.3.9.7v3.8c0 .2.2.4.4.4h34.3c.2 0 .4-.2.4-.4v-3.6c0-.4.4-.8.9-.7.4 0 .7.3.7.7v3.6c0 1.1-.9 2-2 2" class="cls-endpointherosv1"/><path id="Path_5113" d="M33.8 40.2h-9.6c-.4 0-.8-.4-.8-.8v-1.6c0-.4.3-.8.7-.9s.8.3.9.7v1h8v-.8c0-.4.4-.8.9-.7.4 0 .7.3.7.7v1.6c0 .4-.4.8-.8.8" class="cls-endpointherosv1"/><path id="Path_5114" d="M18.6 24.2c-.4 0-.8-.4-.8-.8v-3.2c0-.4.3-.8.7-.9.4 0 .8.3.9.7v3.3c0 .4-.4.8-.8.8" class="cls-endpointherosv1"/></g></g></g></g></g></svg><div> <h5>Endpoint</h5> <p>Guard endpoints by isolating and remediating threats to prevent lateral spread.</p> </div> </a> <a href="/how-we-do-it/signals/mdr-for-network"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 58 58"><defs><path d="M15.6 13.7h26.9v30.7H15.6z" style="fill:none"/><style>.cls-Networkherosv2{fill:#fff}</style></defs><g id="Layer_2"><g id="Layer_2-2"><g id="Component_2459_8"><path id="Path_5133-2" d="M29 0c16 0 29 13 29 29S45 58 29 58 0 45 0 29 13 0 29 0Z" style="fill:#6c67d5"/><g id="Group_1502"><g id="Group_1501"><path id="Path_5139" d="M40.8 44.3H17.3c-.9 0-1.7-.8-1.7-1.7V15.3c0-.9.8-1.7 1.7-1.7h23.5c.9 0 1.7.8 1.7 1.7v27.3c0 .9-.8 1.7-1.7 1.7M17.2 15.1c-.2 0-.3.1-.3.3v27.3c0 .2.1.3.3.3h23.5c.2 0 .3-.1.3-.3V15.3c0-.2-.1-.3-.3-.3H17.2Z" class="cls-Networkherosv2"/><path id="Path_5140" d="M41.7 24.6H16.2c-.4 0-.7-.3-.7-.7 0-.4.3-.7.7-.7h25.5c.4 0 .7.3.7.7 0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5141" d="M20.1 21.4c-.4 0-.7-.3-.7-.7v-2.5c0-.4.3-.7.7-.7s.7.3.7.7v2.5c0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5142" d="M20.1 31c-.4 0-.7-.3-.7-.7v-2.5c0-.4.3-.7.7-.7s.7.3.7.7v2.5c0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5143" d="M20.1 40.5c-.4 0-.7-.3-.7-.7v-2.5c0-.4.3-.7.7-.7s.7.3.7.7v2.5c0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5144" d="M41.7 34.8H16.2c-.4 0-.7-.3-.7-.7 0-.4.3-.7.7-.7h25.5c.4 0 .7.3.7.7s-.3.7-.7.7" class="cls-Networkherosv2"/></g></g></g></g></g></svg> <div> <h5>Network</h5> <p>Defend brute force attacks, active intrusions and unauthorized scans.</p> </div> </a> <a href="/how-we-do-it/signals/mdr-for-log"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><path d="M16 0c8.84 0 16 7.16 16 16s-7.16 16-16 16S0 24.84 0 16 7.16 0 16 0Z" style="stroke-width:0;fill:#687dd5"/><path d="M22.16 12.23a.278.278 0 0 0-.07-.23l-4.17-4.17a.235.235 0 0 0-.25-.06c-.03 0-.05-.01-.08-.01H12.4a.476.476 0 0 0-.48.47v13.46a.476.476 0 0 0 .48.48h9.29a.476.476 0 0 0 .48-.48V12.24m-4.18-3.6 3.29 3.29H18V8.64Zm3.66 13.01h-9.21V8.27h5.04v3.91c0 .14.12.26.26.26h3.91v9.22Zm-2.06 2.6h-9.28a.476.476 0 0 1-.48-.48V10.31c0-.26.21-.48.47-.48h.47c.14 0 .26.11.26.26s-.11.26-.26.26h-.43v13.38h9.2v-.44c0-.14.11-.26.26-.26s.26.11.26.26v.48a.476.476 0 0 1-.48.48m.24-4.52c-.14 0-.26-.12-.26-.26v-1.39c0-.14.11-.26.26-.26s.26.11.26.26v1.39c0 .14-.12.26-.26.26" style="fill:#fff;stroke-width:0"/></svg> <div> <h5>Log</h5> <p>Investigation and threat detection across multi-cloud or hybrid environments.</p> </div> </a> <a href="/how-we-do-it/signals/cloud"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><path d="M16 0c8.84 0 16 7.16 16 16s-7.16 16-16 16S0 24.84 0 16 7.16 0 16 0Z" style="stroke-width:0;fill:#40C3D9"/><path d="M20.52 21.64h-9.68c-2.06 0-3.72-1.69-3.72-3.75 0-1.52.93-2.88 2.34-3.45-.02-.2-.04-.39-.04-.59a5.416 5.416 0 0 1 5.34-5.49 5.423 5.423 0 0 1 5.14 3.5h.12c2.69 0 4.86 2.2 4.85 4.89 0 2.42-1.5 4.88-4.35 4.89ZM14.84 8.87c-2.71 0-4.91 2.2-4.91 4.91v.06c0 .24.02.48.06.72.02.12-.05.24-.17.28-1.69.57-2.59 2.4-2.03 4.09a3.204 3.204 0 0 0 3.04 2.19h9.66c2.54 0 3.87-2.21 3.87-4.38 0-2.41-1.94-4.37-4.35-4.38-.09 0-.17 0-.26.02a.262.262 0 0 1-.27-.17c-.67-2-2.55-3.34-4.66-3.34m6.64 8.91v-1.53c0-.14-.11-.25-.25-.25s-.25.11-.25.25v1.53c0 .14.11.25.25.25s.25-.11.25-.25" style="fill:#fff;stroke-width:0"/></svg> <div> <h5>Cloud</h5> <p>Remediate misconfigurations, vulnerabilities and policy violations.</p> </div> </a> <a href="/how-we-do-it/signals/identity"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" data-name="Layer 2" version="1.1" viewBox="0 0 58 58"><defs><clipPath id="clippath"><path d="M12.9 14.8h32.3v28.5H12.9z" style="stroke-width:0;fill:none"/></clipPath><style>.clsInsider-threat-4{stroke-width:0;fill:#fff}</style></defs><g id="Layer_2-2" data-name="Layer 2-2"><g id="Component_2459_11" data-name="Component 2459 11"><path id="Path_5133-5" d="M29 0c16 0 29 13 29 29S45 58 29 58 0 45 0 29 13 0 29 0Z" data-name="Path 5133-5" style="fill:#2cb1e2;stroke-width:0"/><g id="Group_1790" data-name="Group 1790" style="clip-path:url(#clippath)"><g id="Group_1789" data-name="Group 1789"><path id="Path_5151" d="M43.4 43.2H14.6c-1 0-1.8-.8-1.8-1.8V20.7c0-1 .8-1.8 1.8-1.8h28.7c1 0 1.8.8 1.8 1.8v20.7c0 1-.8 1.8-1.8 1.8M14.6 20.5c-.2 0-.3.1-.3.3v20.7c0 .2.1.3.3.3h28.7c.2 0 .3-.1.3-.3V20.8c0-.2-.1-.3-.3-.3H14.6Z" class="clsInsider-threat-4" data-name="Path 5151"/><path id="Path_5152" d="M44.4 29.2H13.6c-.4 0-.7-.3-.7-.7s.3-.7.7-.7h30.8c.4 0 .7.3.7.7s-.3.7-.7.7" class="clsInsider-threat-4" data-name="Path 5152"/><path id="Path_5153" d="M34.4 20.5c-.4 0-.7-.3-.7-.7v-2.1c0-.8-.6-1.4-1.4-1.4h-6.4c-.8 0-1.4.6-1.4 1.4v2.1c0 .4-.3.7-.7.7s-.7-.3-.7-.7v-2.1c0-1.6 1.3-2.9 2.9-2.9h6.4c1.6 0 2.9 1.3 2.9 2.9v2.1c0 .4-.3.7-.7.7" class="clsInsider-threat-4" data-name="Path 5153"/><path id="Path_5154" d="M29 26.4c-.4 0-.7-.3-.7-.7V23c0-.4.3-.7.7-.7s.7.3.7.7v2.7c0 .4-.3.7-.7.7" class="clsInsider-threat-4" data-name="Path 5154"/></g></g></g></g></svg> <div> <h5>Identity</h5> <p>Investigate and respond to compromised identities and insider threats.</p> </div> </a> </div> <div class="HowWeDo__RightLinks"> <div class="HowWeDo__Links"> <h6>INDUSTRIES</h6> <a href="/how-we-do-it/industries/insurance-cybersecurity"> <h5>Insurance</h5> </a> <a href="/how-we-do-it/industries/construction-cybersecurity"> <h5>Construction</h5> </a> <a href="/how-we-do-it/industries/financial-services-cybersecurity"> <h5>Finance</h5> </a> <a href="/how-we-do-it/industries/legal-cybersecurity"> <h5>Legal</h5> </a> <a href="/how-we-do-it/industries/manufacturing-cybersecurity"> <h5>Manufacturing</h5> </a> <a href="/how-we-do-it/industries/private-equity-cybersecurity"> <h5>Private Equity</h5> </a> <a href="/how-we-do-it/industries/healthcare-cybersecurity"> <h5>Healthcare</h5> </a> <a href="/how-we-do-it/industries/retail-cybersecurity"> <h5>Retail</h5> </a> <a href="/how-we-do-it/industries/food-supply-cybersecurity"> <h5>Food Supply</h5> </a> <a href="/how-we-do-it/industries/state-local-governments-cybersecurity"> <h5>Government and Education</h5> </a> <a href="/how-we-do-it/industries/automotive-dealerships"> <h5>Automotive Dealerships</h5> </a> </div> <div class="HowWeDo__Links"> <h6>USE CASES</h6> <div class="HowWeDo__Links-2"> <a href="/how-we-do-it/use-cases/ransomware"> <h5>Ransomware</h5> <p>Stop ransomware before it spreads.</p> </a> <a href="/how-we-do-it/use-cases/cybersecurity-compliance"> <h5>Cybersecurity Compliance</h5> <p>Meet regulatory compliance mandates.</p> </a> <a href="/how-we-do-it/use-cases/zero-day-exploits"> <h5>Zero Day Attacks</h5> <p>Detect and respond to zero-day exploits.</p> </a> <a href="/how-we-do-it/use-cases/cloud-misconfiguration-breaches"> <h5>Cloud Misconfiguration</h5> <p>End misconfigurations and policy violations.</p> </a> <a href="/how-we-do-it/use-cases/third-party-cyber-risk"> <h5>Third-Party Risk</h5> <p>Defend third-party and supply chain risk.</p> </a> <a href="/how-we-do-it/use-cases/mdr-outsourcing"> <h5>Do More With Less</h5> <p>Prevent disruption by outsourcing MDR.</p> </a> <a href="/how-we-do-it/use-cases/cyber-risk-management"> <h5>Cyber Risk</h5> <p>Adopt a risk-based security approach.</p> </a> <a href="/how-we-do-it/use-cases/meet-cyber-insurance-requirements"> <h5>Cyber Insurance</h5> <p>Meet insurability requirements with MDR.</p> </a> <a href="/how-we-do-it/use-cases/sensitive-data"> <h5>Sensitive Data Security</h5> <p>Protect your most sensitive data.</p> </a> <a href="/how-we-do-it/use-cases/security-leadership"> <h5>Security Leadership</h5> <p>Build a proven security program.</p> </a> <a href="/how-we-do-it/use-cases/cyber-threat-intelligence"> <h5>Cyber Threat Intelligence</h5> <p>Operationalize timely, accurate, and actionable cyber threat intelligence.</p> </a> </div> </div> </div> </div> <div class="HowWeDo__Box"> <div class="HowWeDo__BoxInner"> <div class="HowWeDo__BoxLeft"> <div class="HowWeDo__Links"> <a href="/how-we-do-it/mdr-pricing-packaging"> <h5>MDR Pricing</h5> <p>Three MDR package tiers are available based on per-user pricing and level of risk tolerance to enhance your existing defenses and resources.</p> </a> </div> </div> <div class="HowWeDo__BoxRight"> <a href="/how-we-do-it/mdr-pricing-packaging">EXPLORE MDR PACKAGES <span>→</span></a> </div> </div> </div> </div> </div> <!-- Resources --> <div class="Resources NavBar__SubMenu" data-menu="resources"> <div class="Resources__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Resources</div> </div> <div class="Resources__Content"> <div class="Resources__BlogResources"> <div class="Resources__Links Resources__Links-Blogs"> <div> <h6>From The Blog</h6> <a href="https://www.esentire.com/blog/bored-beavertail-invisibleferret-yacht-club-a-lazarus-lure-pt-2"> <span class="Resources__Eyebrow">Nov 14, 2024</span> <h5>Bored BeaverTail & InvisibleFerret Yacht Club – A Lazarus Lure Pt.2 </h5> </a> <a href="https://www.esentire.com/blog/bored-beavertail-yacht-club-a-lazarus-lure"> <span class="Resources__Eyebrow">Oct 17, 2024</span> <h5>Bored BeaverTail Yacht Club – A Lazarus Lure </h5> </a> <a href="https://www.esentire.com/blog/cybersecurity-spending-where-to-allocate-your-budget-in-2025"> <span class="Resources__Eyebrow">Oct 17, 2024</span> <h5>Cybersecurity Spending: Where to Allocate Your Budget in 2025 </h5> </a> </div> <div class="Resources__BoxCTA"> <a href="/resources/blog"> VIEW ARTICLES <span>→</span> </a> </div> </div> <div class="Resources__Links"> <div class="Resources__Links Resources__Links-Library"> <h6>Resources</h6> <a href="/resources/mdr-and-cybersecurity-case-studies"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsCaseStudiesIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1940"><circle id="Ellipse_16" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1906"><path id="Path_5883" d="M20.3 22.37c-1.12 0-2.03-.91-2.03-2.03 0-1.12.91-2.03 2.03-2.03s2.03.91 2.03 2.03c0 1.12-.91 2.03-2.03 2.03m0-3.47c-.8 0-1.44.64-1.44 1.44s.64 1.44 1.44 1.44 1.44-.64 1.44-1.44c0-.79-.65-1.44-1.44-1.44" class="clsCaseStudiesIcon-2"/><path id="Path_5884" d="M22.62 22.95c-.08 0-.15-.03-.21-.09l-1.09-1.09c-.1-.14-.06-.32.07-.42.1-.07.24-.07.35 0l1.09 1.09a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08" class="clsCaseStudiesIcon-2"/><path id="Path_5885" d="M17.41 22.95h-5.48c-.33 0-.6-.27-.6-.6V9.65c0-.33.27-.6.6-.6h5.78c.16-.03.32.08.35.24s-.08.32-.24.35H11.95v12.71h5.48c.16-.03.32.08.35.24s-.08.32-.24.35h-.1" class="clsCaseStudiesIcon-2"/><path id="Path_5886" d="M21.46 17.45c-.17 0-.3-.13-.3-.3V13.1c-.03-.16.08-.32.24-.35.16-.03.32.08.35.24V17.14c0 .17-.13.3-.3.3" class="clsCaseStudiesIcon-2"/><path id="Path_5887" d="M21.46 13.4H17.7c-.17 0-.3-.13-.3-.3V9.34c0-.17.15-.29.31-.29.07 0 .13.03.19.08l3.76 3.76a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08m-3.46-.59h2.75l-2.75-2.75v2.75Z" class="clsCaseStudiesIcon-2"/></g></g></svg> <h5>Case Studies</h5> </a> <a href="/resources/tru-intelligence-center"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><defs><clipPath id="a"><path d="M8 7h15.75v18.17H8z" style="stroke-width:0;fill:none"/></clipPath></defs><circle cx="16" cy="16" r="16" style="fill:#19234d;stroke-width:0"/><g style="clip-path:url(#a)"><path d="M15.5 21.37h1.25v.4H15.5v-.4Zm4.78-.02v.44h1.27v1.69h.44v-1.69h.37v.88h.44v-.88h.37v1.31h.44v-1.31h.14v-.44h-3.47Zm-8.27 0h-1.47a.844.844 0 0 0-1.49-.79c-.03.05-.05.11-.07.17-.46-.08-.9.23-.98.69a.849.849 0 0 0 .98.98c.12.45.58.72 1.03.59s.72-.58.59-1.03a.865.865 0 0 0-.07-.17H12v-.44Zm5.46 1.95a5.85 5.85 0 0 1-.82 1.59c-.12.17-.31.27-.52.28-.21 0-.41-.11-.53-.28a5.85 5.85 0 0 1-.82-1.59c.09 0 .17-.03.26-.06.38-.16.63-.54.61-.96h.95c-.01.42.23.8.61.96.08.03.17.05.26.06m-1.2-4.36-.33 1.8h-.3a.908.908 0 0 0-.54-.93c-.38-.12-.79-.14-1.18-.06 0 0-.36-.9-.94-2.77-.35-1.1-.54-2.25-.56-3.41.39.46.97.71 1.57.67.69.02 1.38-.15 1.97-.51l-.9 2.36.95-.15-.55 3.15.81-.15Zm3-1.96c-.58 1.87-.94 2.77-.94 2.77-.39-.08-.8-.06-1.18.06-.33.14-.55.47-.54.84v.09h-.37l.93-2.66-.95.15.97-3.15-1.19.13.3-1.46c.59.35 1.27.52 1.95.5.6.05 1.19-.2 1.57-.67-.02 1.16-.21 2.31-.56 3.41m-.28 2.98c1.12-2.28 1.7-4.78 1.71-7.31 0 0 2.81 3.66-1.71 7.31m-5.71 0c-4.52-3.66-1.72-7.32-1.72-7.32 0 2.54.59 5.04 1.71 7.31m5.72-12.02-.07.03c-.99.3-1.92.8-2.72 1.47l-.02.03-.02-.03a8.165 8.165 0 0 0-2.82-1.5l-.08-.03s.1-.09.25-.19c.79-.48 1.7-.73 2.63-.73 1 0 1.97.32 2.79.9l.07.05ZM13.03 20.8v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.08 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.07 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m2.6 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.08 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.07 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m.5-10c-.11-.73-.31-1.45-.59-2.14l-.02-.03c.14-.22.27-.46.38-.7l-.06-.04c-.48.41-1.01.75-1.58 1.02-.88.3-1.69.77-2.38 1.39-.04.03-.09.03-.13 0-.68-.6-1.46-1.06-2.32-1.35-.59-.28-1.14-.63-1.64-1.06l-.05.04c.1.23.22.45.36.66l-.02.03c-.24.64-.42 1.3-.53 1.98s0 .03 0 .04a2.238 2.238 0 0 0 2.17 2.75c.47.02.93-.13 1.28-.44-.15-.32-.26-.66-.33-1.01-.21.21-.51.32-.81.3-.74 0-1.34-.6-1.34-1.34.01-.47.1-.94.25-1.39.23.27.47.53.74.77a.59.59 0 0 0 .06.84.59.59 0 0 0 .92-.18c.24.13.47.26.68.39.03.64.24 1.27.62 1.79l.02.03.02-.03c.38-.52.59-1.15.62-1.79.21-.14.45-.27.7-.4.14.3.5.42.79.28s.42-.5.28-.79c-.03-.05-.06-.1-.1-.15.26-.23.5-.49.72-.76.15.45.23.92.25 1.39 0 .74-.6 1.34-1.34 1.34-.3.02-.6-.09-.81-.3-.07.35-.18.68-.33 1.01.36.3.82.46 1.28.44a2.232 2.232 0 0 0 2.2-2.59" style="fill:#fff;stroke-width:0"/></g></svg> <h5>TRU Intelligence Center</h5> </a> <a href="/cybersecurity-tools"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsDisplayCybersecurityIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1934"><circle id="Ellipse_47" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1911"><path id="Path_6011" d="M12.47 13.21h-1.43a.26.26 0 0 1-.17-.07l-1.8-1.8a.23.23 0 0 1 0-.34l1.47-1.43c.09-.09.25-.09.34 0l1.76 1.77s.07.11.07.17v1.47c0 .13-.11.24-.24.24m-1.33-.49h1.09V11.6l-1.52-1.52-1.12 1.09 1.56 1.56Z" class="clsDisplayCybersecurityIcon-2"/><g id="Group_1910"><path id="Path_6012" d="M15.11 15.86a.26.26 0 0 1-.17-.07l-2.64-2.64c-.09-.1-.09-.25.01-.34.09-.09.24-.09.33 0l2.64 2.64c.09.09.09.25 0 .34-.05.05-.11.07-.17.07" class="clsDisplayCybersecurityIcon-2"/><path id="Path_6013" d="M12.21 23.51c-.36 0-.72-.06-1.07-.17a.24.24 0 0 1-.1-.4l1.28-1.28-.74-.74s-.02-.02-.03-.04l-.7-.7-1.29 1.28c-.1.09-.25.09-.34 0a.207.207 0 0 1-.06-.1c-.36-1.02-.12-2.15.62-2.94a2.18 2.18 0 0 1 2.64-.46l5.04-5.03c-.47-.88-.28-1.96.46-2.63.79-.75 1.93-1 2.97-.65a.24.24 0 0 1 .1.4l-1.28 1.28.74.74.03.03.71.71 1.29-1.28c.1-.09.25-.09.34 0 .03.03.05.06.06.1.33 1.06.06 2.22-.7 3.03-.69.68-1.75.83-2.6.37l-5.04 5.03c.48.89.31 2-.42 2.71-.51.49-1.19.76-1.9.74m-.53-.53c.74.17 1.51-.04 2.07-.55.62-.61.73-1.57.26-2.3a.26.26 0 0 1 .04-.29l5.28-5.28c.08-.07.19-.09.28-.04.69.44 1.59.35 2.19-.21.54-.57.79-1.35.67-2.13l-1.15 1.15c-.09.09-.25.09-.34 0l-.91-.91-.03-.03-.88-.88c-.09-.09-.1-.25 0-.34l1.15-1.15c-.75-.13-1.52.1-2.07.63-.63.56-.76 1.5-.3 2.22.05.09.03.21-.04.29l-5.28 5.28a.23.23 0 0 1-.28.04 1.74 1.74 0 0 0-2.23.3c-.52.54-.74 1.31-.6 2.04l1.16-1.15c.09-.09.25-.09.34 0l.91.91s.02.02.03.04l.88.88c.09.09.1.25 0 .34l-1.15 1.15Z" class="clsDisplayCybersecurityIcon-2"/><path id="Path_6014" d="M20.99 23.49a.26.26 0 0 1-.17-.07l-4.11-4.11s-.03-.04-.05-.06l-.59-1.17a.23.23 0 0 1 .05-.28l1.17-1.17c.07-.07.19-.09.28-.04l1.17.59s.04.03.06.04l4.11 4.11c.09.09.09.25 0 .34l-1.76 1.76s-.11.07-.17.07m-3.9-4.5 3.91 3.91 1.42-1.42-3.91-3.91-.98-.49-.93.93.49.98Z" class="clsDisplayCybersecurityIcon-2"/></g></g></g></svg> <h5>Cybersecurity Tools</h5> </a> <a href="/resources/video-library"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsVicoIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1935"><circle id="Ellipse_43" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1912"><path id="Path_6009" d="M16.15 22.9C12.2 22.9 9 19.7 9 15.75s3.2-7.15 7.15-7.15 7.15 3.2 7.15 7.15-3.2 7.15-7.15 7.15m0-13.83c-3.68 0-6.67 2.99-6.67 6.67s2.99 6.67 6.67 6.67 6.67-2.99 6.67-6.67c0-3.68-2.99-6.67-6.67-6.67" class="clsVicoIcon-2"/><path id="Path_6010" d="M14.35 18.99c-.13 0-.24-.11-.24-.24v-6.01a.243.243 0 0 1 .36-.21l5.11 3.01c.11.07.15.22.08.33-.02.04-.05.06-.08.08l-5.11 3s-.08.03-.12.03m.24-5.82v5.17l4.39-2.58-4.39-2.58Z" class="clsVicoIcon-2"/></g></g></svg> <h5>Videos</h5> </a> <a href="/resources/library?resourceType%5B%5D=Report"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsReportIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1936"><circle id="Ellipse_44" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1895"><path id="Path_5961" d="M21.42 22.95h-9.24c-.33 0-.6-.27-.6-.6V9.65c0-.33.27-.6.6-.6h5.77c.16-.03.32.08.35.24.03.16-.08.32-.24.35H12.19v12.71h9.24v-9.26c-.03-.16.08-.32.24-.35s.32.08.35.24v9.35c0 .33-.27.59-.59.59" class="clsReportIcon-2"/><path id="Path_5962" d="M21.71 13.4h-3.76c-.17 0-.3-.13-.3-.3V9.34c0-.17.15-.29.31-.29.07 0 .13.03.19.08l3.76 3.76a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08m-3.46-.59h2.75l-2.75-2.75v2.75Z" class="clsReportIcon-2"/><path id="Path_5963" d="M16.79 21.21c-1.92 0-3.48-1.56-3.48-3.48s1.56-3.48 3.48-3.48 3.48 1.56 3.48 3.48-1.56 3.48-3.48 3.48m0-6.36c-1.59 0-2.89 1.29-2.89 2.89s1.29 2.89 2.89 2.89 2.89-1.29 2.89-2.89c0-1.59-1.29-2.89-2.89-2.89" class="clsReportIcon-2"/><path id="Path_5964" d="M19.98 18.03H16.8c-.17 0-.3-.13-.3-.3v-3.18c.03-.16.18-.27.35-.24.12.02.22.12.24.24v2.89h2.89c.16-.03.32.08.35.24.03.16-.08.32-.24.35h-.1" class="clsReportIcon-2"/><path id="Path_5965" d="M14.67 20.15c-.17 0-.29-.15-.29-.31 0-.07.03-.13.08-.19l2.12-2.12c.1-.14.28-.17.42-.07.14.1.17.28.07.42-.02.03-.04.05-.07.07l-2.12 2.12c-.06.05-.13.09-.21.09" class="clsReportIcon-2"/></g></g></svg> <h5>Reports</h5> </a> <a href="/resources/library?resourceType%5B%5D=Webinar"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsWebinarIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1937"><path id="Path_6008" d="M16 0c8.84 0 16 7.16 16 16s-7.16 16-16 16S0 24.84 0 16 7.16 0 16 0Z" style="stroke-width:0;fill:#19234d"/><g id="Group_1896"><path id="Path_5966" d="M15.95 11.33c-.17 0-.3-.13-.3-.3V9.29c.03-.16.18-.27.35-.24.12.02.22.12.24.24v1.74c0 .17-.13.3-.3.3" class="clsWebinarIcon-2"/><path id="Path_5967" d="M20 22.9c-.1 0-.19-.05-.24-.13l-1.83-2.6a.29.29 0 0 1 0-.42.29.29 0 0 1 .42 0c.03.02.05.05.06.09l1.83 2.6a.307.307 0 0 1-.25.47" class="clsWebinarIcon-2"/><path id="Path_5968" d="M11.9 22.9c-.17 0-.3-.14-.29-.31 0-.06.02-.11.05-.16l1.83-2.6c.07-.15.25-.22.4-.14.15.07.22.25.14.4-.01.03-.04.06-.06.09l-1.83 2.6c-.06.08-.15.13-.24.12" class="clsWebinarIcon-2"/><path id="Path_5969" d="M21.73 20.29H10.16c-.17 0-.3-.13-.3-.3v-8.68c-.03-.16.08-.32.24-.35s.32.08.35.24v8.48h10.99v-.86c-.03-.16.08-.32.24-.35s.32.08.35.24v1.26c0 .17-.13.3-.3.3" class="clsWebinarIcon-2"/><path id="Path_5970" d="M21.73 15.38c-.17 0-.3-.13-.3-.3v-3.76c-.03-.16.08-.32.24-.35s.32.08.35.24v3.86c0 .17-.13.3-.3.3" class="clsWebinarIcon-2"/><path id="Path_5971" d="M22.6 11.33H9.3a.299.299 0 0 1-.24-.35c.02-.12.12-.22.24-.24h13.3c.16.03.27.18.24.35-.02.12-.12.22-.24.24" class="clsWebinarIcon-2"/><path id="Path_5972" d="M22.6 17.4s-.07 0-.1-.02l-8.1-2.89a.306.306 0 0 1-.11-.41c.06-.11.19-.17.31-.15l8.1 2.89c.15.07.22.25.15.4-.04.1-.14.17-.25.18" class="clsWebinarIcon-2"/></g></g></svg> <h5>Webinars</h5> </a> <a href="/resources/library?resourceType%5B%5D=Data%20Sheet%20/%20Solution%20Brief"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsdatasheetIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1938"><circle id="Ellipse_46" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1893"><path id="Path_5952" d="M20.84 22.9H11.6c-.33 0-.6-.27-.6-.6V9.6c0-.33.27-.6.6-.6h5.77c.16-.03.32.08.35.24.03.16-.08.32-.24.35H11.61v12.72h9.24v-9.25c-.03-.16.08-.32.24-.35s.32.08.35.24v9.35c0 .33-.27.59-.59.59" class="clsdatasheetIcon-2"/><path id="Path_5953" d="M21.13 13.35h-3.76c-.17 0-.3-.13-.3-.3V9.29c0-.17.15-.29.31-.29.07 0 .13.03.19.08l3.76 3.76a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08m-3.46-.59h2.75L17.66 10v2.75Z" class="clsdatasheetIcon-2"/><path id="Path_5954" d="M17.46 16.06c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.45c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5955" d="M16.3 18.66c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.45c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5956" d="M13.7 20.1c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.44c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5957" d="M18.9 21.26c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.44c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5958" d="M18.39 20.03c-.08 0-.15-.03-.21-.09l-1.58-1.58a.294.294 0 0 1-.07-.42c.1-.14.28-.17.42-.07.03.02.05.04.07.07l1.58 1.58a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08" class="clsdatasheetIcon-2"/><path id="Path_5959" d="M14.33 19.03c-.17 0-.29-.15-.28-.32 0-.1.06-.19.14-.24l1.34-.74a.3.3 0 0 1 .28.52l-1.34.74s-.09.04-.14.04" class="clsdatasheetIcon-2"/><path id="Path_5960" d="M16.58 17.27s-.08 0-.12-.03a.301.301 0 0 1-.15-.39l.58-1.28c.09-.14.28-.17.42-.08.1.07.15.2.12.32l-.58 1.28c-.05.11-.15.17-.27.17" class="clsdatasheetIcon-2"/></g></g></svg> <h5>Data Sheets</h5> </a> <a href="/esentire-mdr-vs-everyone"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsRealVsFakeIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1933"><g id="Group_1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/></g><g id="Group_1924"><path id="Path_6040" d="M16.15 17.96c-.18 0-.32-.15-.32-.32 0-.15.11-.28.25-.31.04 0 1.05-.26 1.13-1.86-.45-.2-.88-.46-1.27-.77-.14-.11-.16-.31-.05-.45s.31-.16.45-.05c.39.31.83.56 1.3.74.13.04.22.16.22.3 0 2.34-1.58 2.69-1.65 2.7h-.06" class="clsRealVsFakeIcon-2"/><path id="Path_6041" d="M16.15 17.96h-.06c-.07-.01-1.65-.36-1.65-2.7 0-.14.09-.26.22-.3.47-.18.91-.43 1.3-.74.14-.11.34-.09.45.05s.09.34-.05.45c-.39.31-.82.56-1.27.77.09 1.63 1.12 1.86 1.13 1.86.17.04.28.21.25.38-.03.15-.16.25-.31.25" class="clsRealVsFakeIcon-2"/><path id="Path_6042" d="M10.38 21.55c-.18 0-.32-.14-.32-.32 0-.08.03-.16.09-.22l3.54-3.54c.13-.12.33-.12.45.01.12.12.12.32 0 .44l-3.54 3.54c-.06.06-.14.09-.23.09" class="clsRealVsFakeIcon-2"/><path id="Path_6043" d="M13.96 20.69c-.18 0-.32-.14-.32-.32v-2.36h-2.36c-.18 0-.33-.12-.34-.3s.12-.33.3-.34h2.72c.18 0 .32.14.32.32v2.68c0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6044" d="M18.18 14.14c-.18 0-.32-.14-.32-.32 0-.08.03-.16.09-.22l3.54-3.54c.13-.12.33-.12.45.01.12.12.12.32 0 .44l-3.54 3.54c-.06.06-.14.09-.23.09" class="clsRealVsFakeIcon-2"/><path id="Path_6045" d="M20.72 14.28h-2.68c-.18 0-.32-.14-.32-.32v-2.68c0-.18.12-.33.3-.34.18 0 .33.12.34.3v2.4h2.36c.18 0 .33.12.34.3 0 .18-.12.33-.3.34h-.04" class="clsRealVsFakeIcon-2"/><path id="Path_6046" d="M16 25.03c-.18 0-.32-.14-.32-.32v-1.74c0-.18.12-.33.3-.34.18 0 .33.12.34.3v1.78c0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6047" d="M16 9.35c-.18 0-.32-.14-.32-.32V7.29c0-.18.12-.33.3-.34.18 0 .33.12.34.3v1.78c0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6048" d="M24.71 16.32h-1.74c-.18 0-.33-.12-.34-.3s.12-.33.3-.34h1.78c.18 0 .33.12.34.3s-.12.33-.3.34h-.04" class="clsRealVsFakeIcon-2"/><path id="Path_6049" d="M9.03 16.32H7.29c-.18 0-.33-.12-.34-.3s.12-.33.3-.34h1.78c.18 0 .33.12.34.3s-.12.33-.3.34h-.04" class="clsRealVsFakeIcon-2"/><path id="Path_6050" d="M9.72 18.97a.32.32 0 0 1-.29-.19c-1.53-3.63.18-7.82 3.81-9.35 1.77-.75 3.77-.75 5.54 0 .17.06.25.24.19.41-.06.17-.24.25-.41.19 0 0-.02 0-.03-.01-3.31-1.4-7.12.15-8.52 3.46a6.53 6.53 0 0 0 0 5.06c.07.16 0 .35-.17.42-.04.02-.08.02-.12.03" class="clsRealVsFakeIcon-2"/><path id="Path_6051" d="M16 23.14c-.95 0-1.9-.19-2.77-.56a.315.315 0 0 1-.19-.41c.06-.17.24-.25.41-.19 0 0 .02 0 .03.01a6.499 6.499 0 0 0 8.66-8.15.31.31 0 0 1 .22-.39c.15-.04.31.03.38.18 1.31 3.72-.64 7.8-4.36 9.11-.76.27-1.56.41-2.37.41" class="clsRealVsFakeIcon-2"/><path id="Path_6052" d="M12.21 15.94c-.18 0-.32-.14-.32-.32a3.73 3.73 0 0 1 3.73-3.73c.18 0 .31.16.3.34 0 .16-.14.29-.3.3-1.71 0-3.09 1.38-3.09 3.09 0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6053" d="M16.38 20.11c-.18 0-.31-.16-.3-.34 0-.16.14-.29.3-.3 1.71 0 3.09-1.38 3.09-3.09 0-.18.12-.33.3-.34.18 0 .33.12.34.3v.04a3.73 3.73 0 0 1-3.73 3.73" class="clsRealVsFakeIcon-2"/></g></g></svg> <h5>Real vs. Fake MDR</h5> </a> <a href="/esentire-mdr-vs-everyone/compare"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" version="1.1" viewBox="0 0 32 32"><defs><style>.cls-Comparison-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1933" data-name="Group 1933"><g id="Group_1932" data-name="Group 1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" data-name="Ellipse 48" style="stroke-width:0;fill:#19234d"/></g><path d="M18.2 18.2c.2 0 .3-.1.3-.3v-7.1h3v7.1c0 .2.1.3.3.3s.3-.1.3-.3v-7.4c0-.2-.1-.3-.3-.3h-3.7c-.2 0-.3.1-.3.3v7.4c0 .2.1.3.3.3Z" class="cls-Comparison-2"/><path d="M20.1 24.1c.1 0 .2 0 .3-.1l4.4-5.9v-.3c0-.1-.2-.2-.3-.2h-2.6c-.2 0-.3.1-.3.3s.1.3.3.3h1.9l-3.8 5-3.8-5h1.9c.2 0 .3-.1.3-.3s-.1-.3-.3-.3h-2.6c-.1 0-.2 0-.3.2v.3l4.4 5.9s.2.1.3.1ZM10.1 21.9h3.7c.2 0 .3-.1.3-.3v-7.4c0-.2-.1-.3-.3-.3s-.3.1-.3.3v7.1h-3v-7.1c0-.2-.1-.3-.3-.3s-.3.1-.3.3v7.4c0 .2.1.3.3.3Z" class="cls-Comparison-2"/><path d="M7.5 14.5h2.6c.2 0 .3-.1.3-.3s-.1-.3-.3-.3H8.2l3.8-5 3.8 5h-1.9c-.2 0-.3.1-.3.3s.1.3.3.3h2.6c.1 0 .2 0 .3-.2V14l-4.4-5.9s-.2-.1-.3-.1c-.1 0-.2 0-.3.1L7.4 14v.3c0 .1.2.2.3.2Z" class="cls-Comparison-2"/></g></svg> <h5>Compare MDR Vendors</h5> </a> <a class="Resources__Links--Mobile" href="/resources/blog"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 32 32"><defs><clipPath id="clippath"><path d="M9.09 7.71H22.9v16.58H9.09z" style="stroke-width:0;fill:none"/></clipPath><style>.clsBlogNavIcon-4{stroke-width:0;fill:#fff}</style></defs><g id="Layer_1-2"><g id="Group_2087"><g id="Group_1933"><g id="Group_1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" style="fill:#172143;stroke-width:0"/></g><g id="Group_2091" style="clip-path:url(#clippath)"><g id="Group_2090"><path id="Path_6299" d="M15.14 18.51c-.19 0-.34-.15-.34-.34 0-.09.04-.17.1-.24l5.63-5.63c.14-.12.35-.11.48.02.12.13.12.32 0 .45l-5.63 5.63a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/><path id="Path_6300" d="M16.6 19.96c-.19 0-.34-.15-.34-.34 0-.09.04-.17.1-.24l5.63-5.63c.14-.12.35-.11.48.02.12.13.12.32 0 .45l-5.63 5.63a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/><path id="Path_6301" d="M22.27 14.29c-.19 0-.34-.15-.34-.34 0-.09.04-.17.1-.24.27-.27.27-.71 0-.98a.713.713 0 0 0-.98 0c-.12.14-.34.15-.48.02a.335.335 0 0 1-.02-.48l.02-.02c.52-.55 1.38-.58 1.93-.06s.58 1.38.06 1.93l-.06.06a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/><path id="Path_6302" d="M14.27 20.83c-.19 0-.34-.15-.34-.34 0-.04 0-.08.02-.12l.87-2.33c.06-.18.25-.28.42-.22s.28.25.22.42c0 .01 0 .02-.01.03l-.61 1.63 1.63-.61c.18-.05.37.05.42.22a.34.34 0 0 1-.19.41l-2.33.87s-.08.02-.12.02" class="clsBlogNavIcon-4"/><path id="Path_6303" d="M21.18 10.46c-.19 0-.34-.15-.34-.33V8.59c0-.11-.09-.19-.2-.19H13.7a.335.335 0 0 1-.32-.35c0-.17.15-.31.32-.32h6.95c.48 0 .87.39.87.87v1.54c0 .19-.15.34-.33.34" class="clsBlogNavIcon-4"/><path id="Path_6304" d="M20.65 24.29H9.96a.87.87 0 0 1-.87-.87V12.29a.33.33 0 0 1 .32-.35c.19-.01.34.13.35.32v11.17c0 .11.09.19.2.19h10.68c.11 0 .2-.09.2-.19v-5.35a.33.33 0 0 1 .32-.35c.19-.01.34.13.35.32v5.39c0 .48-.39.87-.87.87" class="clsBlogNavIcon-4"/><path id="Path_6305" d="M13.58 12.53H9.43c-.19 0-.34-.15-.33-.34 0-.09.04-.17.1-.24l4.15-4.15c.13-.13.34-.13.48 0 .06.06.1.15.1.24v4.15c0 .19-.15.34-.33.34m-3.36-.67h3v-3l-3 3Z" class="clsBlogNavIcon-4"/><path id="Path_6306" d="M21.53 14.95a.35.35 0 0 1-.24-.1l-1.38-1.38a.335.335 0 0 1-.02-.48c.12-.14.34-.15.48-.02l.02.02 1.38 1.38c.13.13.13.35 0 .48a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/></g></g></g></g></g></svg> <h5>Blogs</h5> </a> <a class="Resources__Links--Mobile" href="/resources/security-advisories"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 32 32"><defs><clipPath id="clippath"><path d="M8.48 6.97h15.04v18.06H8.48z" style="stroke-width:0;fill:none"/></clipPath><style>.clsSANavIconTop-4{stroke-width:0;fill:#fff}</style></defs><g id="Layer_1-2"><g id="Group_2086"><g id="Group_1933"><g id="Group_1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" style="fill:#172143;stroke-width:0"/></g><g id="Group_2089" style="clip-path:url(#clippath)"><g id="Group_2088"><path id="Path_6292" d="M16 25.03c-.19 0-.34-.16-.34-.34 0-.14.09-.27.23-.32 6.93-2.44 6.95-10.6 6.95-10.68 0-.19.15-.34.34-.34.19 0 .34.15.34.34 0 .09-.01 8.73-7.41 11.33-.04.01-.07.02-.11.02" class="clsSANavIconTop-4"/><path id="Path_6293" d="M23.18 14.03c-.19 0-.34-.15-.34-.34V9.93h-1.41c-.19 0-.34-.15-.34-.34s.15-.34.34-.34h1.53c.31 0 .57.26.57.57v3.88c0 .19-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6294" d="M16 25.03s-.08 0-.11-.02c-7.39-2.6-7.41-11.24-7.41-11.33 0-.18.14-.34.33-.34h.02c.19 0 .34.16.34.34 0 .08.02 8.24 6.95 10.68a.346.346 0 0 1-.11.67" class="clsSANavIconTop-4"/><path id="Path_6295" d="M8.82 14.03c-.19 0-.34-.15-.34-.34V9.81c0-.31.26-.57.57-.57h1.53c.19 0 .34.15.34.34s-.15.34-.34.34H9.16v3.76c0 .19-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6296" d="M21.4 9.92c-2.02.12-3.99-.64-5.4-2.08a6.978 6.978 0 0 1-5.4 2.08c-.19 0-.34-.15-.34-.34s.15-.34.34-.34c1.39.04 2.76-.33 3.94-1.05.45-.28.84-.63 1.15-1.06.06-.1.17-.16.29-.16h.04c.12 0 .22.06.29.16.32.42.71.78 1.16 1.05 1.18.73 2.55 1.1 3.94 1.05.19 0 .34.15.34.34s-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6297" d="M16 17.97c-.19 0-.34-.15-.34-.34v-5.4c0-.19.15-.34.34-.34.19 0 .34.15.34.34v5.4c0 .19-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6298" d="M16.53 19.78c0 .29-.24.53-.53.53s-.53-.24-.53-.53c0-.29.24-.53.53-.53.29 0 .53.24.53.53" class="clsSANavIconTop-4"/></g></g></g></g></g></svg> <h5>Security Advisories</h5> </a> </div> <div class="Resources__BoxCTA"> <a href="/resources/library"> EXPLORE LIBRARY <span>→</span> </a> </div> </div> </div> <div class="Resources__SecurityBox"> <div class="Resources__Links"> <div class="Resources__SecurityBoxAdvisories"> <h6>SECURITY ADVISORIES</h6> <a href="https://www.esentire.com/security-advisories/palo-alto-zero-day-vulnerability-cve-2024-0012"> <span class="Resources__Eyebrow">Nov 18, 2024</span> <h5>Palo Alto Zero-Day Vulnerability (CVE-2024-0012)</h5> <p> THE THREAT On November 18th, 2024, Palo Alto disclosed a critical actively exploited authentication bypass zero-day vulnerability impacting Palo Alto Networks PAN-OS. The…</p> </a> <a href="https://www.esentire.com/security-advisories/poc-released-for-citrix-vulnerabilities"> <span class="Resources__Eyebrow">Nov 13, 2024</span> <h5>PoC Released for Citrix Vulnerabilities</h5> <p> THE THREAT Update: eSentire has observed multiple exploitation attempts targeting CVE-2024-8069. In real-world attacks, threat actors successfully achieved RCE and attempted to…</p> </a> </div> <div class="Resources__BoxCTA"> <a href="/resources/security-advisories"> View Advisories <span>→</span> </a> </div> </div> </div> </div> </div> </div> <!-- Company --> <div class="Company NavBar__SubMenu" data-menu="company"> <div class="Company__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Company</div> </div> <div class="Company__Content"> <div class="Company__About"> <div class="Company__Links"> <h6>ABOUT ESENTIRE</h6> <p>eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.</p> <a href="/company/about-us"><h5>About Us <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a href="/company/leadership"><h5>Leadership <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a href="/company/careers"><h5>Careers <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a class="Company__Links--Mobile" href="/company/event-calendar"><h5>Event Calendar <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a class="Company__Links--Mobile" href="/company/newsroom"><h5>Newsroom <span class="Resources__LinksArrow"><em>→</em></span></h5></a> </div> </div> <div class="Company__Calendar"> <div class="Company__Links"> <h6>EVENT CALENDAR</h6> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Nov</div> <div class="Company__Day">21</div> </div> <h5>SkyHigh Cook Out</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Dec</div> <div class="Company__Day">04</div> </div> <h5>TechTalk Soho House Dinner, Chicago</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Dec</div> <div class="Company__Day">10</div> </div> <h5>December TRU Intelligence Briefing</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Jan</div> <div class="Company__Day">15</div> </div> <h5>Security Leaders Dinner, Denver</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Jan</div> <div class="Company__Day">16</div> </div> <h5>FutureCon Los&nbsp;Angeles</h5> </div> </div> <div class="Company__BoxCTA"> <a href="/company/event-calendar"> View Calendar <span>→</span> </a> </div> </div> <div class="Company__PressRelease"> <div class="Company__Links"> <h6>LATEST PRESS RELEASE</h6> <a href="https://www.esentire.com/news-releases/esentire-expands-partnership-with-td-synnex-to-bring-esentires-award-winning-24-7-mdr-and-soc-services-to-organizations-across-north-america"> <span class="Resources__Eyebrow">Aug 09, 2024</span> <h5>eSentire Expands Partnership with TD SYNNEX to Bring eSentire’s Award-Winning, 24/7 MDR and SOC Services to Organizations Across North America</h5> <p> Waterloo, Ontario, August 12, 2024 — eSentire, a leading global Managed Detection and Response (MDR) provider, today announced it has expanded its partnership with TD SYNNEX, a leading global distributor and solutions aggregator for the IT ecosystem. eSentire’s all-in-one, 24/7…</p> </a> </div> <div class="Company__BoxCTA"> <a href="/company/newsroom"> View Newsroom <span>→</span> </a> </div> </div> </div> </div> </div> <!-- Partners --> <div class="Partners NavBar__SubMenu" data-menu="partners"> <div class="Partners__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Partners</div> </div> <div class="Partners__Content"> <div class="Partners__PartnerProgram"> <div class="Partners__Links"> <h6>PARTNER PROGRAM</h6> <div class="Partners__E3Logo"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 119 81.99"><defs><style>.clsEcosystemICON-1{fill:#19234d;stroke-width:0}</style></defs><path d="M39.47 6.27C34.44-.18 25.91-.12 25.91-.12h-8.54S8.84-.18 3.81 6.27C.73 10.21.06 13.97.06 16.59v20.98c0 2.62.67 6.39 3.74 10.32 5.04 6.45 13.56 6.39 13.56 6.39H43.2V42.17H19.95s-3.4.02-5.41-2.55c-1.22-1.57-1.49-3.07-1.49-4.11v-2.45H43.2V16.59c0-2.62-.67-6.39-3.74-10.32M13.04 17.91c0-1.04.27-2.55 1.49-4.11 2-2.57 5.41-2.55 5.41-2.55h3.4s3.4-.02 5.41 2.55c1.22 1.57 1.49 3.07 1.49 4.11v3.2h-17.2v-3.2Z" class="clsEcosystemICON-1"/><path d="m75.52 49.25 7.45-10.32c1.97 1.69 3.87 2.95 5.67 3.77 1.8.82 3.75 1.23 5.84 1.23s4.02-.55 5.63-1.65 2.41-2.86 2.41-5.29c0-1.64-.64-3.14-1.91-4.53-1.27-1.38-3.06-2.07-5.37-2.07-1.3 0-2.47.13-3.51.38-1.04.26-1.76.5-2.16.72l-3.22-5.25 13.54-12.53H80.17V1.6h35.12v9.82l-10.32 11.17c3.72.96 6.64 2.82 8.76 5.58 2.12 2.76 3.18 6.23 3.18 10.41 0 2.82-.61 5.33-1.82 7.53s-2.85 4.05-4.91 5.54-4.35 2.64-6.85 3.43a25.41 25.41 0 0 1-7.66 1.19c-4.01 0-7.74-.61-11.21-1.82-3.47-1.21-6.45-2.95-8.93-5.2Z" style="fill:#40c3d9;stroke-width:0"/><path d="M59.98 0h.76v54.89h-.76z" style="fill:#9ea1aa;stroke-width:0"/><path d="m7.59 76.12.62.53c-.39.48-.92.86-1.59 1.15s-1.35.43-2.05.43c-.88 0-1.67-.2-2.36-.59S.97 76.69.59 75.98s-.58-1.53-.58-2.45c0-.87.18-1.66.55-2.37s.87-1.28 1.52-1.7c.66-.42 1.4-.63 2.25-.63s1.55.19 2.2.56c.65.38 1.15.93 1.52 1.66.37.73.55 1.64.55 2.71H.97c.03.67.19 1.29.5 1.84.3.55.72.99 1.25 1.32s1.15.5 1.85.5c.56 0 1.12-.12 1.7-.35.58-.23 1.01-.55 1.31-.93Zm-6.6-3.13h6.65c-.12-1.09-.47-1.92-1.06-2.5-.59-.58-1.35-.87-2.26-.87-.64 0-1.2.15-1.68.46-.48.3-.87.71-1.15 1.22-.29.51-.45 1.07-.49 1.69ZM21.68 76.12l.62.55c-.36.45-.85.83-1.47 1.12-.62.29-1.31.44-2.07.44-.87 0-1.64-.21-2.31-.62s-1.2-.98-1.59-1.69c-.39-.71-.58-1.51-.58-2.39s.2-1.69.59-2.4c.4-.71.93-1.27 1.61-1.68.68-.42 1.44-.62 2.28-.62.79 0 1.46.14 2.01.42.55.28 1.02.66 1.41 1.15l-.66.51c-.3-.39-.67-.7-1.12-.92s-.99-.34-1.64-.34c-.69 0-1.3.18-1.84.53s-.96.82-1.26 1.41c-.3.59-.46 1.24-.46 1.95s.16 1.35.47 1.94.74 1.06 1.27 1.42c.54.36 1.14.53 1.82.53s1.22-.12 1.72-.35c.5-.23.9-.55 1.2-.93ZM31.81 78.22c-.84 0-1.61-.21-2.31-.63a4.693 4.693 0 0 1-2.29-4.07c0-.87.21-1.66.62-2.37.42-.71.97-1.28 1.67-1.7s1.47-.63 2.31-.63 1.63.21 2.32.63c.69.42 1.25.99 1.66 1.7s.62 1.5.62 2.37-.21 1.66-.62 2.37c-.42.71-.97 1.28-1.66 1.7s-1.47.63-2.32.63Zm0-.8c.7 0 1.33-.18 1.89-.53.56-.35 1-.82 1.32-1.42s.48-1.25.48-1.96-.16-1.35-.5-1.93c-.33-.59-.77-1.07-1.33-1.43s-1.18-.55-1.87-.55-1.33.18-1.89.53c-.56.35-1 .82-1.32 1.41-.32.59-.48 1.25-.48 1.97s.16 1.35.5 1.94.78 1.07 1.34 1.43c.56.36 1.18.55 1.86.55ZM41.99 76.86l.56-.62c.38.38.81.66 1.29.87s1.06.3 1.72.3c.48 0 .92-.06 1.33-.18s.74-.31.98-.55c.25-.25.37-.56.37-.93 0-.44-.11-.77-.34-1-.23-.22-.57-.41-1.02-.55-.45-.14-1.01-.28-1.67-.44a8.86 8.86 0 0 1-1.45-.46c-.42-.18-.75-.42-1-.75-.25-.32-.37-.76-.37-1.3s.16-1 .47-1.36c.31-.36.72-.63 1.22-.81s1.03-.26 1.6-.26c.69 0 1.3.13 1.85.39s.98.59 1.32.99l-.6.55c-.31-.34-.67-.61-1.08-.82s-.9-.31-1.47-.31c-.38 0-.75.04-1.12.13-.37.08-.68.25-.92.49-.25.24-.37.59-.37 1.06 0 .38.14.67.41.9s.62.4 1.05.53.87.25 1.32.35c.49.1.98.24 1.46.42s.88.43 1.2.76c.32.33.48.79.48 1.39s-.18 1.09-.53 1.48c-.35.39-.8.67-1.34.85-.55.18-1.11.27-1.69.27-.83 0-1.54-.12-2.14-.37s-1.1-.58-1.52-.99ZM54.2 81.5l.45-.62c.12.12.28.22.48.31.21.09.43.14.68.14.39 0 .69-.14.9-.41s.42-.66.61-1.17l.74-1.89-3.99-8.82h.99l3.44 7.76 2.97-7.76h.95L58.03 80.1c-.1.26-.24.55-.42.85-.18.31-.41.58-.7.81-.29.22-.66.34-1.12.34-.36 0-.67-.06-.93-.18s-.49-.26-.68-.43ZM67.15 76.86l.56-.62c.38.38.81.66 1.29.87s1.06.3 1.72.3c.48 0 .92-.06 1.33-.18.41-.12.74-.31.98-.55.25-.25.37-.56.37-.93 0-.44-.11-.77-.34-1-.23-.22-.57-.41-1.02-.55s-1.01-.28-1.67-.44a8.86 8.86 0 0 1-1.45-.46c-.42-.18-.75-.42-1-.75s-.37-.76-.37-1.3.16-1 .47-1.36c.31-.36.72-.63 1.22-.81s1.03-.26 1.6-.26c.69 0 1.3.13 1.85.39s.98.59 1.32.99l-.6.55c-.31-.34-.67-.61-1.08-.82-.41-.21-.9-.31-1.47-.31-.38 0-.75.04-1.12.13s-.68.25-.92.49c-.25.24-.37.59-.37 1.06 0 .38.14.67.41.9s.62.4 1.05.53.87.25 1.32.35c.49.1.98.24 1.46.42s.88.43 1.2.76c.32.33.48.79.48 1.39s-.18 1.09-.53 1.48c-.35.39-.8.67-1.34.85-.55.18-1.11.27-1.69.27-.83 0-1.54-.12-2.14-.37s-1.1-.58-1.52-.99ZM81.36 75.24v-5.39h-1.79v-.82h1.79v-2.95h.87v2.95h2.95v.82h-2.95v5.17c0 .7.07 1.22.21 1.57s.34.57.57.67c.24.1.51.16.83.16s.6-.06.83-.18c.23-.12.47-.32.7-.6l.55.53c-.26.34-.55.59-.88.78s-.76.27-1.29.27c-.47 0-.88-.08-1.24-.25s-.64-.47-.85-.9c-.2-.43-.3-1.04-.3-1.83ZM98 76.12l.62.53c-.39.48-.92.86-1.59 1.15s-1.35.43-2.05.43c-.88 0-1.67-.2-2.36-.59s-1.24-.95-1.62-1.66-.58-1.53-.58-2.45c0-.87.18-1.66.55-2.37.36-.71.87-1.28 1.52-1.7.66-.42 1.4-.63 2.25-.63s1.55.19 2.2.56 1.16.93 1.52 1.66.55 1.64.55 2.71h-7.62c.03.67.19 1.29.5 1.84.3.55.72.99 1.25 1.32s1.15.5 1.85.5c.56 0 1.12-.12 1.7-.35.58-.23 1.01-.55 1.31-.93Zm-6.59-3.13h6.65c-.12-1.09-.47-1.92-1.06-2.5-.59-.58-1.35-.87-2.26-.87-.64 0-1.2.15-1.68.46-.48.3-.87.71-1.15 1.22-.29.51-.45 1.07-.49 1.69ZM105.17 77.98v-8.16c0-.23-.01-.49-.04-.78h.82c.03.29.04.54.05.77s.01.59.01 1.1c.14-.27.35-.57.63-.9s.64-.61 1.1-.85 1-.36 1.65-.36c.87 0 1.53.18 1.98.55s.77.88.95 1.54c.13-.24.35-.53.66-.85s.71-.61 1.19-.87c.48-.25 1.04-.38 1.67-.38.8 0 1.43.16 1.89.48s.79.77.97 1.36c.19.59.28 1.29.28 2.09v5.25h-.87v-4.96c0-.9-.1-1.59-.28-2.08-.19-.49-.46-.83-.81-1.03s-.79-.29-1.3-.29c-.58 0-1.12.15-1.6.46s-.87.7-1.17 1.19-.44 1.01-.44 1.57v5.15h-.88v-4.96c0-.9-.09-1.59-.27-2.08s-.45-.83-.8-1.03-.79-.29-1.3-.29c-.71 0-1.31.19-1.79.58s-.84.87-1.08 1.45c-.24.58-.36 1.15-.36 1.72v4.61h-.88Z" class="clsEcosystemICON-1"/></svg> <div class="Partners__E3LogoInner"> <p>We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.</p> <div class="Partners__BoxCTA"> <a href="/partners"> LEARN MORE <span>→</span> </a> </div> </div> </div> </div> </div> <div class="Partners__Box"> <div class="Partners__BoxInner"> <div class="Partners__BoxLeft"> <div class="Partners__Links"> <a href="/partners/become-a-partner"> <p>Apply to become an e3 ecosystem partner with eSentire today.</p> </a> </div> </div> <div class="Partners__BoxRight"> <a href="/partners/become-a-partner">APPLY NOW <span>→</span></a> </div> </div> <div class="Partners__BoxInner"> <div class="Partners__BoxLeft"> <div class="Partners__Links"> <a href="https://esentire.channeltivity.com/Login" target="_blank"> <p>Login to the Partner Portal for resources and content for current partners.</p> </a> </div> </div> <div class="Partners__BoxRight"> <a href="https://esentire.channeltivity.com/Login" target="_blank">LOGIN NOW <span>→</span></a> </div> </div> </div> </div> </div> </div> <!-- SEARCH --> <div class="Search NavBar__SubMenu" data-menu="search"> <div class="Search__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Search</div> </div> <div class="Search__Content"> <h3>Search our site</h3> <form action="/search/results" class="filter"> <div class="Search__TopField"> <svg xmlns="http://www.w3.org/2000/svg" width="24.417" height="24.416"><g data-name="Group 92" fill="none" stroke="#000" stroke-linecap="round" stroke-linejoin="round" stroke-width="2"><path data-name="Path 4" d="M19.7 10.351a9.352 9.352 0 1 0-9.349 9.349 9.353 9.353 0 0 0 9.349-9.349Z"/><path data-name="Line 1" d="m17.723 17.722 5.28 5.28"/></g></svg> <input id="searchField" type="search" name="q" placeholder="Enter a keyword" class="Search__SearchField" autofocus> <input type="submit" value="Search" class="Search__SubmitButton"> </div> </form> <h4>Quick Links</h4> <div class="Search__QuickLinks"> <a class="Search__QuickLink" href="/what-we-do/esentire-managed-detection-and-response"> <h5>ALL-IN-ONE MDR SERVICE <span>→</span></h5> <p>Multi-Signal MDR with 300+ technology integrations to support your existing investments.</p> </a> <a class="Search__QuickLink" href="/what-we-do/security-operations-center"> <h5>24/7 SOC SUPPORT <span>→</span></h5> <p>24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.</p> </a> <a class="Search__QuickLink" href="/how-we-do-it/mdr-pricing-packaging"> <h5>ESENTIRE MDR PRICING <span>→</span></h5> <p>Three MDR package tiers are available based on per-user pricing and level of risk tolerance.</p> </a> <a class="Search__QuickLink" href="/resources/tru-intelligence-center"> <h5>TRU INTELLIGENCE CENTER <span>→</span></h5> <p>The latest security advisories, blogs, reports, industry publications and webinars published by TRU.</p> </a> <a class="Search__QuickLink" href="/esentire-mdr-vs-everyone/compare"> <h5>MDR VENDOR COMPARISONS <span>→</span></h5> <p>Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.</p> </a> <a class="Search__QuickLink" href="/resources/mdr-and-cybersecurity-case-studies"> <h5>MDR CASE STUDIES <span>→</span></h5> <p>See why 2000+ organizations globally have chosen eSentire for their MDR Solution.</p> </a> </div> </div> </div> </div> <!-- Get Started Nav --> <div class="GetStartedNav NavBar__SubMenu" data-menu="getStarted"> <div class="GetStartedNav__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Get Started</div> </div> <div class="GetStartedNav__Content"> <div class="GetStartedNav__Links"> <a href="/get-started"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 51 51"><path d="M5 0h46v51H5c-2.76 0-5-2.24-5-5V5c0-2.76 2.24-5 5-5Z" style="fill:#263c91;stroke-width:0"/><path d="M33.11 16.61a7.879 7.879 0 0 0-5.79-2.73h-3.65a7.879 7.879 0 0 0-5.79 2.73 7.08 7.08 0 0 0-1.6 4.41v8.96c.02 1.61.58 3.16 1.6 4.41a7.879 7.879 0 0 0 5.79 2.73H34.7v-5.17h-9.92c-.89-.02-1.73-.42-2.31-1.09a2.81 2.81 0 0 1-.64-1.75v-1.05h12.86v-7.03a7.102 7.102 0 0 0-1.6-4.41m-11.26 4.97c0-.64.23-1.26.64-1.76.58-.67 1.42-1.07 2.31-1.09h1.45c.89.02 1.72.41 2.3 1.09.41.5.63 1.12.64 1.76v1.36h-7.34v-1.36Z" style="fill:none;stroke:#fff;stroke-linecap:round;stroke-linejoin:round"/></svg> <h5>Get Started <span class="GetStartedNav__LinksArrow"><em>→</em></span></h5> </a> <a href="/build-a-quote"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 51 51"><defs><style>.clsNavBAQ-1{fill:#fff;stroke-width:0}</style></defs><g id="Group_2081"><path id="Rectangle_3064" d="M5 0h46v51H5c-2.76 0-5-2.24-5-5V5c0-2.76 2.24-5 5-5Z" style="fill:#696de3;stroke-width:0"/><g id="Group_2077"><path id="Path_1056" d="M19.7 22.53a1.14 1.14 0 1 1 1.14-1.14c0 .63-.51 1.14-1.14 1.14m-.04-1.14s.02.04.03.04l-.04-.04Z" class="clsNavBAQ-1"/><path id="Path_1057" d="M19.7 26.93a1.14 1.14 0 1 1 1.14-1.14c0 .63-.51 1.14-1.14 1.14m-.04-1.14s.02.04.03.04l-.04-.04Z" class="clsNavBAQ-1"/><path id="Path_1058" d="M26.29 39.01H15.88c-.32 0-.59-.26-.59-.59V14.8c0-.32.26-.59.58-.59h4.56a.591.591 0 0 1 0 1.18h-3.98v22.46h9.83a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1059" d="M34.56 29.68c-.32 0-.59-.26-.59-.59v-13.7H30a.591.591 0 0 1 0-1.18h4.56c.32 0 .59.26.59.59v14.29c0 .32-.26.59-.59.59" class="clsNavBAQ-1"/><path id="Path_1060" d="M27.86 17.04h-5.28c-1.26.03-2.31-.97-2.35-2.24v-1.65a.591.591 0 0 1 1.18 0v1.65c.03.62.56 1.09 1.17 1.06h5.27c.62.03 1.15-.44 1.18-1.06v-1.65a.591.591 0 0 1 1.18 0v1.65a2.306 2.306 0 0 1-2.35 2.24" class="clsNavBAQ-1"/><path id="Path_1061" d="M29.59 13.74h-8.77a.591.591 0 0 1 0-1.18h8.77a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1062" d="M31.27 21.99h-7.72a.591.591 0 0 1 0-1.18h7.72a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1063" d="M31.27 26.38h-7.72a.591.591 0 0 1 0-1.18h7.72a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1064" d="M19.7 31.32a1.14 1.14 0 1 1 1.14-1.14c0 .63-.51 1.14-1.14 1.14m-.04-1.13s.02.04.03.04l-.04-.04Z" class="clsNavBAQ-1"/><path id="Path_1065" d="M31.27 30.77h-7.72a.591.591 0 0 1 0-1.18h7.72a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1066" d="M31.41 39.02c-.15 0-.29-.06-.4-.16l-3.44-3.23a.595.595 0 0 1 .02-.83c.22-.2.55-.21.78-.03l2.93 2.75 3.87-6c.18-.27.54-.35.81-.17.27.18.35.54.17.81l-4.25 6.59c-.09.15-.25.24-.42.26h-.07" class="clsNavBAQ-1"/></g></g></svg> <h5>Build A Quote <span class="GetStartedNav__LinksArrow"><em>→</em></span></h5> </a> <a href="/partners/become-a-partner"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 51 51"><defs><style>.clsBecomePartner-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_2082"><path id="Path_6059" d="M5 0h46v51H5c-2.76 0-5-2.24-5-5V5c0-2.76 2.24-5 5-5Z" style="stroke-width:0;fill:#40c3d9"/><g id="Group_2079"><path id="Path_1068" d="M33.34 34.79c-1.12-.1-2.12-.75-2.67-1.73l-3.12-4.12a.633.633 0 0 1 .12-.88c.27-.21.66-.16.87.12l3.16 4.18c.07.12.97 1.57 2.14 1.06.5-.22.81-.73.76-1.28-.03-.42-.17-.82-.41-1.16l-6.78-9.69c-.73.55-1.52 1.03-2.35 1.42-2.03.97-3.61 1.12-4.68.44-.75-.5-1.18-1.36-1.14-2.26 0-.69.56-1.07 1.41-1.65a19.46 19.46 0 0 0 3.03-2.47c.45-.45.83-.84 1.15-1.18 1.39-1.43 1.91-1.97 3.21-1.97h1.51c1.67-.14 3.34.35 4.66 1.39l.26.18c2.35 1.57 3.14 2.14 3.14 2.14.16.12.26.31.26.51v11.77c0 .35-.28.63-.62.63h-2.07l.02.04c.4.55.62 1.21.65 1.89.05 1.05-.55 2.01-1.52 2.43-.31.14-.66.22-1 .22m.99-5.85h2.32V18.15c-.39-.27-1.25-.87-2.84-1.93l-.26-.18a5.42 5.42 0 0 0-3.97-1.17h-1.51c-.75 0-.99.23-2.31 1.59-.33.34-.71.73-1.17 1.19-.98.98-2.06 1.85-3.21 2.62-.32.19-.61.42-.88.68 0 .45.21.88.57 1.14.38.24 1.34.5 3.47-.51.94-.44 1.81-1 2.6-1.66a.624.624 0 0 1 .93.1l6.25 8.94Z" class="clsBecomePartner-2"/><path id="Path_1069" d="M29.79 36.38c-.15 0-.31-.02-.46-.05-.74-.19-1.38-.65-1.81-1.28l-3.57-5.1a.625.625 0 0 1 1.02-.72l3.58 5.12c.35.68 1.19.94 1.86.58.03-.01.05-.03.08-.04.53-.35.52-.86.45-1.4v-.13c-.04-.34.21-.65.55-.68.34-.04.65.21.68.55v.01l-.62.06.64.04c.21.99-.18 2.01-1.01 2.59-.41.28-.9.44-1.4.45" class="clsBecomePartner-2"/><path id="Path_1070" d="M25.76 36.87c-.66.01-1.3-.25-1.76-.73l-3.62-5.17a.625.625 0 0 1 1.02-.72l3.58 5.11c.48.35 1.13.36 1.62.02.35-.19.58-.54.63-.93.08-.34.42-.54.76-.46.34.08.54.42.46.76v.02c-.14.74-.61 1.38-1.29 1.73-.44.22-.92.35-1.41.35" class="clsBecomePartner-2"/><path id="Path_1071" d="M21.81 37.38c-.78-.01-1.51-.41-1.93-1.06l-2.95-4.2c-.39-.65-1.41-1.9-2.17-1.9h-1.02c-.35 0-.63-.28-.62-.63V17.83c0-.35.28-.63.62-.63h3.07c.69-.04 1.37-.2 2-.49 1.8-.74 3.73-1.09 5.67-1.04.35-.01.64.26.65.6s-.26.64-.6.65h-.05c-1.79-.05-3.57.28-5.22.96-.77.35-1.6.55-2.45.58h-2.44v10.51h.4c1.67 0 3.06 2.22 3.21 2.47l2.95 4.19c.34.53 1.05.68 1.58.34a.55.55 0 0 0 .09-.07c.34-.16.6-.43.75-.77a.622.622 0 1 1 1.18.4c-.24.64-.71 1.16-1.32 1.47-.42.25-.9.39-1.39.4" class="clsBecomePartner-2"/></g></g></svg> <h5>Become A Partner <span class="GetStartedNav__LinksArrow"><em>→</em></span></h5> </a> </div> </div> </div> </div> <script> let buttonSubtles = document.querySelectorAll('.NavBar__ButtonSubtleTrigger'); let subMenus = document.querySelectorAll('.NavBar__SubMenu'); let mobileHamburgers = document.querySelectorAll('.NavBar__MobileNavicon'); let mobileHamburgerBacks = document.querySelectorAll('.MobileDropdownNav__BackButton'); function closeNavigation() { subMenus.forEach(subMenu => { subMenu.classList.remove('active'); }); buttonSubtles.forEach(buttonSubtleparent => { buttonSubtleparent.parentNode.classList.remove("active"); }); } buttonSubtles.forEach(buttonSubtle => { buttonSubtle.addEventListener('click', (e) => { e.preventDefault(); const id = buttonSubtle.getAttribute('data-nav'); if(document.querySelector(`.NavBar__SubMenu[data-menu="${id}"]`).classList.contains('active')) { document.querySelector(`.NavBar__SubMenu[data-menu="${id}"]`).classList.remove('active'); buttonSubtle.parentNode.classList.remove("active"); } else { closeNavigation(); document.querySelector(`.NavBar__SubMenu[data-menu="${id}"]`).classList.add('active'); buttonSubtle.parentNode.classList.add("active"); } }); }); mobileHamburgers.forEach(mobileHamburger => { mobileHamburger.addEventListener('click', (e) => { e.preventDefault(); if(document.getElementsByClassName("NavBar__MobileDropdown")[0].classList.contains("NavBar__MobileDropdown--Visible")) { subMenus.forEach(subMenu => { subMenu.classList.remove('active'); }); } mobileHamburger.parentNode.classList.toggle("NavBar__MobileNavicon--Close"); document.getElementsByClassName("NavBar__MobileDropdown")[0].classList.toggle("NavBar__MobileDropdown--Visible"); }); }); mobileHamburgerBacks.forEach(mobileHamburgerBack => { mobileHamburgerBack.addEventListener('click', (e) => { e.preventDefault(); closeNavigation(); }); }); let navigation = document.getElementsByClassName("NavBar")[0]; // Event listener for clicking outside the navigation document.addEventListener('click', (event) => { if (!navigation.contains(event.target)) { if(!event.target.matches('.Search__SearchField')) { if(!event.target.matches('.Search__TopField svg')) { closeNavigation(); } } } }); </script> <section class="UseCaseHero"> <div class="Breadcrumb__Container"> <div class="Breadcrumb"> <a href="/">Home</a> <a href="/how-we-do-it">How We Do It</a> <a href="/how-we-do-it/use-cases">Use Cases</a> <a href="">CYBER RISK</a> </div> </div> <div class="UseCaseHero__Content"> <div class="UseCaseHero__Container"> <div class="UseCaseHero__ContainerLeft"> <h3 class="eyebrow">CYBER RISK</h3> <h1>Go Beyond Cyber Risk Management. Build Cyber Resilience.</h1> <p>As the cost of cybercrime increases and cyber threats become more sophisticated than ever, you need a cybersecurity strategy that goes beyond cyber risk management. To stay ahead of modern cyber threats, you need to build a cyber resilient security operation that enables your business to anticipate, withstand, and recover from the most advanced cyberattacks.</p> <a class="UseCaseHero__LeftBtn" href="/get-started">GET STARTED</a> </div> <div class="UseCaseHero__ContainerRight"> <div class="UseCaseHero__ContainerRightZeroDayBox"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 100 100"><defs><clipPath id="clippath"><path d="M2519.9-1707.73h2123.34v1194.38H2519.9z" style="fill:none"/></clipPath><style>.CyberRisk-1{fill:none;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px;stroke:#40c3d9}</style></defs><g style="clip-path:url(#clippath);fill:none"><path d="M2779.65-2283c195.41-82.63 258.69 4.29 611.19-47.72 12.68-1.89 24.92-3.84 36.75-5.84 247.23-41.32 294.64-100.2 417.94-69.03 168.64 42.63 181.11 164.54 349.53 310.03 31 26.72 61.74 48.85 92.38 67.36 260.52 158.29 505.46 54.11 788.14 281.33 103.13 82.9 354.61 290.39 371.44 588.89 5.47 97.01-15.34 187.94-50.33 274.46-122.33 303.14-408.35 541.7-326.51 784.51 14.53 43.11 55.67 167.75 90.12 347.75 8.24 43.06 12.64 93 10.44 157.51-7.07 207.66-147.51 645.2-452.49 915.61-175.69 155.78-326.94 181.48-517.94 198.47-197.37 17.55-429.14 26.9-765.41 147.47-432.16 156.18-660.3 369.68-899.46 542.18-207.19 149.44-415.74 268.6-761.31 292.39-218.62 14.24-439.34 25.04-661.21-99.08-477.04-267.1-264.87-766.79-805.66-1666.62C152.94 479.88-3.3 277.51 69.4 95.72 140.64-82.26 355.07-38.35 522.75-287.4c137.44-204.51 64.49-341.95 232.19-511.26 115.75-116.9 171.78-71.97 288.91-186.25 212.7-207.56 116.49-442.07 265.71-515.79 147.95-73.12 285.16 134.69 659.24 125.62 105.6-2.61 159.25-4.14 217.59-40.45 160.95-100.19 92.41-303.75 247.06-551.03 25.74-41.15 137.18-228.05 346.19-316.43Z" style="stroke-miterlimit:10;stroke:#3db4d1;fill:none"/><path d="M2782.87-2511.82c202.96-89.66 269.18-.45 652.24-55.76 303.38-43.8 348.93-112.33 488.98-70.19 183.58 55.24 192.66 199.25 372.17 368.2 314.48 295.98 586.52 116.19 938.73 388.92 112.39 87.03 405.54 314.03 429.73 636.63 35.65 475.55-539.62 805.77-422.34 1145.95 14.98 43.44 59.07 179.59 102.63 377.21 10.2 46.27 16.87 100.73 17.08 172.19.67 228.04-136.01 727.76-460.13 1028.77-379.86 352.78-652.57 105.34-1394.38 355.58-900.67 303.83-996.65 836.61-1799.96 899.98-235.2 18.55-473.87 36.08-717.52-95.43-523.54-282.57-284.74-824.78-911.8-1813.76C-98.73 547.28-283.36 329.33-202.48 126-123.36-72.92 115.4-20.32 300.27-296.48c152.5-227.8 67.91-379.9 253.69-567.77 128.69-130.14 190.08-78.19 320.13-205.37 236.52-231.29 125.28-492.93 289.93-573.81 162.96-80.05 313.58 155.79 730.44 147.33 117.53-2.38 176.61-3.58 240.93-43.94 177.53-111.39 101.08-336.66 266.86-616.8 26.81-45.3 149.69-252.95 380.63-354.97Z" style="stroke-miterlimit:10;stroke:#40c3d9;fill:none"/></g><g id="Group_1760"><path id="Rectangle_1177" d="M19.89 61.38h9.58v20.53h-9.58z" class="CyberRisk-1"/><path id="Rectangle_1178" d="M37.68 54.53h9.58v27.38h-9.58z" class="CyberRisk-1"/><path id="Rectangle_1179" d="M55.47 47.69h9.58v34.22h-9.58z" class="CyberRisk-1"/><path id="Rectangle_1180" d="M73.27 40.85h9.58v41.06h-9.58z" class="CyberRisk-1"/><path id="Line_154" d="M82.4 21.97 45.89 34.52" class="CyberRisk-1"/><path id="Path_5278" d="m72.93 18.09 9.92 3.88-4.33 10.44" class="CyberRisk-1"/><path id="Path_5279" d="M26.73 29.04a37.53 37.53 0 0 0 9.58 5.48c0 14.48-9.58 16.42-9.58 16.42" class="CyberRisk-1"/><path id="Path_5280" d="M26.73 29.04c-2.9 2.29-6.13 4.14-9.58 5.48 0 14.48 9.58 16.42 9.58 16.42" class="CyberRisk-1"/></g></svg> <p>Maturity-based cybersecurity programs are no longer adequate for today’s cyber risks</p> </div> <div class="UseCaseHero__ContainerRightZeroDayBox"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 100 100"><defs><clipPath id="clippath"><path d="M2397.75-1709.43h2123.34v1194.38H2397.75z" style="fill:none"/></clipPath><style>.Cyber-Risk-2{fill:none;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px;stroke:#40c3d9}</style></defs><g style="clip-path:url(#clippath);fill:none"><path d="M2657.5-2284.7c195.41-82.63 258.69 4.29 611.19-47.72 12.68-1.89 24.92-3.84 36.75-5.84 247.23-41.32 294.64-100.2 417.94-69.03 168.64 42.63 181.11 164.54 349.53 310.03 31 26.72 61.74 48.85 92.38 67.36 260.52 158.29 505.46 54.11 788.14 281.33 103.13 82.9 354.61 290.39 371.44 588.89 5.47 97.01-15.34 187.94-50.33 274.46-122.33 303.14-408.35 541.7-326.51 784.51 14.53 43.11 55.67 167.75 90.12 347.75 8.24 43.06 12.64 93 10.44 157.51-7.07 207.66-147.51 645.2-452.49 915.61-175.69 155.78-326.94 181.48-517.94 198.47-197.37 17.55-429.14 26.9-765.41 147.47-432.16 156.18-660.3 369.68-899.46 542.18-207.19 149.44-415.74 268.6-761.31 292.39-218.62 14.24-439.34 25.04-661.21-99.08-477.04-267.1-264.87-766.79-805.66-1666.62C30.79 478.18-125.46 275.8-52.76 94.02 18.48-83.96 232.92-40.05 400.59-289.1c137.44-204.51 64.49-341.95 232.19-511.26 115.75-116.9 171.78-71.97 288.91-186.25 212.7-207.56 116.49-442.07 265.71-515.79 147.95-73.12 285.16 134.69 659.24 125.62 105.6-2.61 159.25-4.14 217.59-40.45 160.95-100.19 92.41-303.75 247.06-551.03 25.74-41.15 137.18-228.05 346.19-316.43Z" style="stroke-miterlimit:10;stroke:#3db4d1;fill:none"/><path d="M2660.72-2513.52c202.96-89.66 269.18-.45 652.24-55.76 303.38-43.8 348.93-112.33 488.98-70.19 183.58 55.24 192.66 199.25 372.17 368.2 314.48 295.98 586.52 116.19 938.73 388.92 112.39 87.03 405.54 314.03 429.73 636.63 35.65 475.55-539.62 805.77-422.34 1145.95 14.98 43.44 59.07 179.59 102.63 377.21 10.2 46.27 16.87 100.73 17.08 172.19.67 228.04-136.01 727.76-460.13 1028.77-379.86 352.78-652.57 105.34-1394.38 355.58-900.67 303.83-996.65 836.61-1799.96 899.98-235.2 18.55-473.87 36.08-717.52-95.43-523.54-282.56-284.73-824.77-911.8-1813.75-177.04-279.21-361.66-497.16-280.79-700.48C-245.52-74.62-6.76-22.02 178.12-298.18c152.5-227.8 67.91-379.9 253.69-567.77 128.69-130.14 190.08-78.19 320.13-205.37 236.52-231.29 125.28-492.93 289.93-573.81 162.96-80.05 313.58 155.79 730.44 147.33 117.53-2.38 176.61-3.58 240.93-43.94 177.53-111.39 101.08-336.66 266.86-616.8 26.81-45.3 149.69-252.95 380.63-354.97Z" style="stroke-miterlimit:10;stroke:#40c3d9;fill:none"/></g><path id="Line_153" d="M50 52.11v-8.22" class="Cyber-Risk-2"/><path id="Path_5275" d="M65.76 62.39H34.23l15.76-28.78 15.76 28.78Z" class="Cyber-Risk-2"/><g id="Group_1757"><path id="Path_5276" d="M50.69 57.59c0 .38-.31.68-.69.68s-.68-.31-.68-.69.31-.68.68-.68.69.31.69.68h0Z" class="Cyber-Risk-2"/><path id="Path_5277" d="m79.64 56.79 10.76-1.66-.03-10.53-10.77-1.41c-.78-3.34-2.12-6.53-3.97-9.42l6.57-8.72-7.48-7.43-8.74 6.66a30.334 30.334 0 0 0-9.26-3.8L55.14 9.59l-10.54.03-1.39 10.87c-3.34.76-6.53 2.08-9.43 3.91l-8.7-6.61-7.43 7.48 6.66 8.53c-1.85 2.9-3.19 6.09-3.97 9.44L9.61 44.86l.04 10.52L20.3 56.7c.75 3.35 2.08 6.55 3.91 9.45l-6.4 8.77 7.48 7.43 8.65-6.53c2.86 1.78 6 3.07 9.29 3.82l1.64 10.75 10.52-.04 1.43-10.73c3.31-.76 6.47-2.07 9.34-3.88l8.77 6.45 7.43-7.48-6.57-8.62c1.8-2.86 3.1-6.01 3.85-9.31Z" class="Cyber-Risk-2"/></g></svg> <p>Develop a cybersecurity strategy that reduces cyber risk and builds resilience with 24/7 threat detection & response</p> </div> </div> </div> </div> </section> <section class="UseCaseTop"> <div class="UseCaseTop__Content"> <div class="UseCaseTop__Container"> <div class="UseCaseTop__ContainerCopy"> <div class="UseCaseTop__ByNumbers"> <h3 class="eyebrow">CYBER RISK MANAGEMENT BY THE NUMBERS</h3> <div class="UseCaseTop__ByNumbersItems"> <div class="UseCaseTop__ByNumbersItem"> <h5>57<span>%</span></h5> <p>of mid-sized businesses don’t have a CISO<sup>1</sup></p> </div> <div class="UseCaseTop__ByNumbersItem"> <h5>25,080</h5> <p>new vulnerabilities disclosed in 2022<sup>2</sup></p> </div> <div class="UseCaseTop__ByNumbersItem"> <h5>$4.35<span>M</span></h5> <p>average total cost of a data breach<sup>3</sup></p> </div> <div class="UseCaseTop__ByNumbersItem"> <h5>45<span>%</span></h5> <p>of organizations cited challenges with maintaining regulatory compliance with increased remote work<sup>4</sup></p> </div> </div> <div class="UseCaseTop__ByNumbersBottomCopy"> 1 Trends in Midsize Enterprise Security and Risk Management, Gartner 2021 <br>2 2022 Threat Landscape Report,Tenable <br>3 2022 Cost of a Data Breach Report, IBM <br>4 State of Remote Work Security, Cybersecurity Insiders 2021 </div> </div> <h2>Adopt a Risk-Based Approach to Cybersecurity</h2> <p>As cyber risks grow in number and complexity, business leaders are left wondering just how effective their cybersecurity programs are. When it comes to developing and managing effective cybersecurity operations, the debate within the industry appears to be: should you adopt a maturity-based approach or a risk-based approach</p> <p><b>Using a Maturity-Based Approach: </b>This is the traditional approach to cyber risk management, wherein organizations aim to achieve a desired level of maturity by implementing certain capabilities and controls. This allows you to demonstrate the controls and defenses your organization has built based on standard industry frameworks (e.g., NIST or CMMC).</p> <p>However, the drawback is that this model may require a hefty financial investment if the focus is placed on building a multi-layer of defense against everything. </p> <p><b>Using a Risk-Based Approach: </b>This approach allows business leaders to direct investments against the most pressing cyber threats with the goal of effectively reducing cyber risk over time. This is a more cost-effective cyber risk management approach that leads to superior security outcomes when compared to<br>maturity-based or compliance-based approaches.</p> <p><strong>So, why adopt a risk-based approach to cybersecurity? </strong></p> <p> A risk-based approach to your cybersecurity program provides deep visibility into your environment with 24/7 threat detection and response. By leveraging an approach centered on cyber risk management, business leaders have the option to invest heavily in defenses for the vulnerabilities that affect the business’ most critical areas.</p> </div> </div> </div> </section> <section class="ReduceImpact ReduceImpact__ClearBG ReduceImpact__CyberRisk"> <div class="ReduceImpact__Content"> <h2>How eSentire Helps with Cyber Risk Management</h2> <h3>Build Resilience. Prevent Disruption: Gain peace of mind as you build a more resilient security operation that aligns your business objectives with your unique risk exposure.</h3> <p>We continuously move your cybersecurity program ahead, proactively identifying gaps in your cybersecurity posture, and building comprehensive cybersecurity strategies to minimize business risk. We recommend adopting a risk-based approach to cybersecurity that builds resilience and prevents disruption with:</p> <div class="ReduceImpact__Items"> <div class="ReduceImpact__Item"> <div class="ReduceImpact__ItemCopy"> <p><strong>A comprehensive Vulnerability Management program</strong></p> <p>Identify, and patch, vulnerabilities across on-premises and cloud environments, and get expert advice to keep your business ahead of the threat landscape. </p> </div> </div> <div class="ReduceImpact__Item"> <div class="ReduceImpact__ItemCopy"> <p><strong>Phishing and Security Awareness Training (PSAT)</strong></p> <p>Identify key areas of risk and test user resilience to drive behavioral change with your employees.</p> </div> </div> <div class="ReduceImpact__Item"> <div class="ReduceImpact__ItemCopy"> <p><strong>24/7 Managed Detection and Response (MDR)</strong></p> <p>Build a more resilient security operation with cutting-edge open XDR technology, multi-signal threat intelligence, and an industry-leading 24/7 team of Elite Threat Hunters to identify, contain, and respond to threats that bypass traditional security controls.</p> </div> </div> <div class="ReduceImpact__Item"> <div class="ReduceImpact__ItemCopy"> <p><strong>Digital Forensics and Incident Response (DFIR)</strong></p> <p>Be ready to recover from the most advanced attacks with the world’s fastest threat suppression with a 4-hour SLA.</p> </div> </div> </div> <p>At eSentire, we work with you to develop a risk-based approach to cybersecurity that aligns your investments to security outcomes that:</p> <ul> <li>Alleviate resource constraints in your organization</li> <li>Build an enterprise-level information security program, policies and procedures</li> <li>Meet and exceed compliance requirements</li> <li>Provide comprehensive threat landscape visibility</li> <li>Align business objectives with your unique risk and exposure</li> </ul> </div> </section> <section class="UsingMitre"> <div class="UsingMitre__Content"> <h2>Using the MITRE ATT&CK® Framework to Reduce Cyber Risk</h2> <div class="UsingMitre__Container"> <div class="UsingMitre__ContainerLeft"> <p>We recommend leveraging the MITRE ATT&CK® framework as an operational and tactical roadmap to determine where to apply your security capabilities and build a resilient security operation.</p> <p>By incorporating the MITRE ATT&CK® framework into your cyber risk management program, you can identify the gaps and vulnerabilities specific to your business, and build the case for making a cybersecurity investment to your executive leaders and the board.</p> </div> <div class="UsingMitre__ContainerRight"> <div class="UsingMitre__ContainerRightBox"> <h3>What is the MITRE ATT&CK® Framework?</h3> <p>The ATT&CK framework is a curated knowledge base and model for cyber adversary behavior that reflects the phases of an adversary’s attack lifecycle and the platforms they are known to target. The tactics, techniques, and procedures (TTPs) are derived from real-world observations of cyberattackers.</p> </div> </div> </div> </div> <div class="UsingMitre__Cta"> <div class="UsingMitre__Callout"> <div class="UsingMitre__CalloutLeft"> <img src="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV4/Common/Use-Cases/mitre-attck-hero-img.png" alt="Threat Intel Report Callout"> </div> <div class="UsingMitre__CalloutRight"> <h3>MITRE ATT&CK® Framework Tool</h3> <p>Try this tool to learn the top tactics and techniques used in cyberattacks that our Elite Threat Hunters and SOC Cyber Analysts have contained and remediated on our customers’ behalf. For each tactic, our threat researchers provide recommendations on how to improve your cybersecurity program and detail how eSentire can help protect your organization.</p> <a href="/mitre-attck-framework-tool">TRY THE TOOL</a> </div> </div> </div> </section> <section class="SpotFactVsFiction"> <div class="SpotFactVsFiction__Content"> <h2>Quantifying Organizational Cyber Risk</h2> <p>While it’s not feasible to build business responses for each TTP found in the MITRE ATT&CK® framework, you should familiarize yourself with the most common TTPs and understand the associated cyber risks you’re facing. Based on the severity of the observed technique, your team can identify critical vulnerabilities and build a proactive response to help your business anticipate, withstand, and recover from cyberattacks. </p> <p>To be successful in using a risk-based approach, here are some questions you can ask yourself:</p> <div class="SpotFactVsFiction__Points"> <div class="SpotFactVsFiction__Point"> <h4>1</h4> <p>Does my executive team accept that cyber risk is an enterprise risk?</p> </div> <div class="SpotFactVsFiction__Point"> <h4>2</h4> <p>What are my business’ “sources of value” and do I understand the specific risks that can impact those sources of value?</p> </div> <div class="SpotFactVsFiction__Point"> <h4>3</h4> <p>Do I know the specific TTPs that threat actors can use to target my business?</p> </div> <div class="SpotFactVsFiction__Point"> <h4>4</h4> <p>How am I planning to address the vulnerabilities that were discovered?</p> </div> <div class="SpotFactVsFiction__Point"> <h4>5</h4> <p>Have I identified all potential vulnerabilities that can impact my organization today?</p> </div> </div> <div class="SpotFactVsFiction__Cta"> <div class="SpotFactVsFiction__CtaLeft"> <h3 class="eyebrow">BLOG</h3> <h3>Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?</h3> </div> <div class="SpotFactVsFiction__CtaRight"> <a href="/blog/maturity-based-approach-vs-risk-based-approach-whats-the-right-answer">READ NOW</a> </div> </div> </div> <div class="FAQPopup__CTAContent FAQPopup__CTAContent__MT75 FAQPopup__CTAContent__MB0"> <div class="FAQPopup__CTA"> <h3>Cyber Risk Management FAQ </h3> <a class="FAQPopup__CTATrigger" data-modal-id="FAQPopup">View Now</a> </div> </div> </section> <section class="FAQPopup" data-modal-id="FAQPopup"> <div class="FAQPopup__Content"> <div class="FAQPopup__Close" data-modal-id="FAQPopup"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 10 10"><defs><style>.ClostBlack1{fill:#000000}</style></defs><g id="Layer_2-2"><path class="ClostBlack1" d="M5 10c-2.76 0-5-2.24-5-5s2.24-5 5-5 5 2.24 5 5-2.24 5-5 5ZM5 .59C2.57.59.59 2.57.59 5S2.57 9.41 5 9.41 9.41 7.43 9.41 5 7.43.59 5 .59Z"></path><path class="ClostBlack1" d="M6.64 6.93c-.08 0-.15-.03-.21-.09L3.16 3.57c-.11-.11-.11-.3 0-.42s.3-.11.42 0l3.27 3.27c.11.11.11.3 0 .42-.06.06-.13.09-.21.09Z"></path><path class="ClostBlack1" d="M3.36 6.93c-.08 0-.15-.03-.21-.09a.308.308 0 0 1 0-.42l3.27-3.27c.11-.11.3-.11.42 0s.11.3 0 .42L3.57 6.84c-.06.06-.13.09-.21.09Z"></path></g></svg> </div> <div class="FAQPopup__Container"> <h2>Cyber Risk Management FAQ </h2> <div class="FAQPopup__List"> <div class="FAQPopup__ListItem" data-drawer-id="1"> <div class="FAQPopup__ListItemTop"> <h4>What is cyber risk management? </h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="1"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>Cyber risk management involves identifying, assessing, and taking steps for cyber risk reduction. It is a significant part of a broader risk management framework and aims to organize and prioritize cyber risks based on the potential impacts on your business and the level of vulnerability. Some examples of cyber risk management include implementing multi-factor authentication, conducting phishing and security awareness training programs, having a vulnerability management program, etc.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="2"> <div class="FAQPopup__ListItemTop"> <h4>What is the difference between a maturity-based approach and a risk-based approach to cyber risk management? </h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="2"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>A maturity-based approach to managing cyber risk involves implementing specific capabilities and controls with the goal of achieving a desired level of maturity based on standard industry frameworks, such as the Cybersecurity Maturity Model Certification (CMMC). A risk-based approach, on the other hand, focuses on building appropriate controls for your significant vulnerabilities, allowing you to prioritize your defenses for the most critical areas of your business.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="3"> <div class="FAQPopup__ListItemTop"> <h4>Why should my organization adopt a risk-based approach to cybersecurity? </h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="3"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>By leveraging a risk-based approach centered on cyber risk management, you have the option to invest heavily in your defenses for the vulnerabilities that affect your business’ most critical areas that reduce cyber risk the most.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="4"> <div class="FAQPopup__ListItemTop"> <h4>How does eSentire help with cyber risk management? </h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="4"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>eSentire helps with your cyber risk management by proactively identifying gaps in your cybersecurity posture and builds comprehensive cybersecurity strategies to minimize your business risk. We help organizations build resilience and prevents disruption with:</p> <ul> <li><a href="/what-we-do/exposure-vulnerability-and-risk-management/managed-vulnerability-service">eSentire Vulnerability Managment</a> Service to help you identify, prioritize, and patch vulnerabilities before attackers can exploit them to gain access into your environment.</li> <li><a href="/what-we-do/exposure-vulnerability-and-risk-management/technical-testing/security-awareness-training-managed-phishing-training">eSentire Managed Phishing and Security Awareness Training (PSAT)</a> to test your employees on real-world phishing scenarios, test user resiliency, and drive behavioral change. </li> <li>24/7 <a href="/what-we-do/esentire-managed-detection-and-response">eSentire Managed Detection and Response (MDR)</a> for deep visibility into your environment with 24/7 threat detection and response.</li> <li><a href="/what-we-do/digital-forensics-and-incident-response">eSentire Digital Forensics and Incident Response (DFIR)</a> to ensure you're ready if there’s an incident and can recover quickly. </li> </ul> </div> </div> </div> </div> </div> </section> <script> let FAQPopUpCtas = document.querySelectorAll('.FAQPopup__CTATrigger'); let FAQPopUpCloseBtns = document.querySelectorAll('.FAQPopup__Close'); let FAQPopUpCloseBtnsInline = document.querySelectorAll('.FAQPopup__CloseInline'); FAQPopUpCtas.forEach(FAQPopUpCta => { FAQPopUpCta.addEventListener('click', (e) => { e.preventDefault(); const id = FAQPopUpCta.getAttribute('data-modal-id'); document.querySelector(`.FAQPopup[data-modal-id="${id}"]`).classList.add('active'); document.getElementsByTagName("body")[0].style.overflow = "hidden"; }); }); FAQPopUpCloseBtns.forEach(FAQPopUpCloseBtn => { FAQPopUpCloseBtn.addEventListener('click', (e) => { e.preventDefault(); const id = FAQPopUpCloseBtn.getAttribute('data-modal-id'); document.querySelector(`.FAQPopup[data-modal-id="${id}"]`).classList.remove('active'); document.getElementsByTagName("body")[0].style.overflow = "auto"; }); }); FAQPopUpCloseBtnsInline.forEach(FAQPopUpCloseBtn => { FAQPopUpCloseBtn.addEventListener('click', (e) => { const id = FAQPopUpCloseBtn.getAttribute('data-modal-id'); document.querySelector(`.FAQPopup[data-modal-id="${id}"]`).classList.remove('active'); document.getElementsByTagName("body")[0].style.overflow = "auto"; }); }); </script> <script> let FAQPopupDrawerTriggers = document.querySelectorAll('.FAQPopup__ListItemTopIcon'); let FAQPopupDrawers = document.querySelectorAll('.FAQPopup__ListItem'); FAQPopupDrawerTriggers.forEach(FAQPopupDrawerTrigger => { FAQPopupDrawerTrigger.addEventListener('click', (e) => { e.preventDefault(); const drawerId = FAQPopupDrawerTrigger.getAttribute('data-drawer-id'); document.querySelector(`.FAQPopup__ListItem[data-drawer-id="${drawerId}"]`).classList.toggle('FAQPopup__ListItem--Open'); }); }); </script> <section class="IndustryServices IndustryServices__UseCase"> <div class="IndustryServices__Content"> <div class="IndustryServices__Container"> <h2>Take Control of Cyber Risk </h2> <p>By utilizing a risk-based cybersecurity approach, instead of a maturity-based approach, your team will be able to maintain deep visibility into your environment for 24/7 threat detection and response. We recommend prioritizing your resources across three key services areas for ideal cyber risk management.</p> <div class="IndustryServices__Cards"> <div class="IndustryServices__Card"> <div class="IndustryServices__CardTop IndustryServices__CardTopBanner"> <div class="IndustryServices__CardBanner"> <h3>ANTICIPATE</h3> </div> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" viewBox="0 0 55 55"><defs><style>.clsMRS-1{fill:none;stroke:#5063f9;stroke-linecap:round;stroke-linejoin:round}</style></defs><circle id="Ellipse_6" cx="27.5" cy="27.5" r="27.5" data-name="Ellipse 6" style="fill:#d4d8e9"></circle><g id="Group_601" data-name="Group 601"><path id="Line_32" d="M33.97 35.89v-4.12" class="clsMRS-1" data-name="Line 32"></path><path id="Path_996" d="M41.85 41.02H26.09l7.88-14.39 7.88 14.39Z" class="clsMRS-1" data-name="Path 996"></path><path id="Path_997" d="M34.6 38.33c0 .35-.28.64-.64.64s-.64-.28-.64-.63.28-.64.64-.64c.35 0 .63.28.64.63Z" data-name="Path 997" style="fill:#5063f9"></path><path id="Path_998" d="M36.19 23.31v-5.66c0-.19-.16-.35-.35-.35h-2.22" class="clsMRS-1" data-name="Path 998"></path><path id="Path_999" d="M22.9 38.14c-7.83-4.71-7.75-14.83-7.75-14.83" class="clsMRS-1" data-name="Path 999"></path><path id="Path_1000" d="M15.15 23.31v-5.66c0-.19.16-.35.35-.35h2.22" class="clsMRS-1" data-name="Path 1000"></path><path id="Path_1001" d="M17.75 17.3c5.75 0 7.89-3.32 7.89-3.32h.05s2.14 3.32 7.89 3.32" class="clsMRS-1" data-name="Path 1001"></path></g></svg> <h3>Exposure Management Services</h3> <ul> <li>Button down initial access vectors</li> <li>Develop robust security strategy, training initiatives, and testing cadence</li> <li>Assessments and testing through Penetration Testing, Vulnerability Scanning, Phishing and Security Awareness Training programs</li> </ul> </div> <a href="/what-we-do/exposure-vulnerability-and-risk-management">LEARN MORE →</a> </div> <div class="IndustryServices__Card"> <div class="IndustryServices__CardTop IndustryServices__CardTopBanner"> <div class="IndustryServices__CardBanner"> <h3>WITHSTAND</h3> </div> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" viewBox="0 0 55 55"><defs><style>.MDRcls-1{fill:none;stroke:#5063f9;stroke-linecap:round;stroke-linejoin:round}</style></defs><circle id="Ellipse_6" cx="27.5" cy="27.5" r="27.5" data-name="Ellipse 6" style="fill:#d4d8e9"></circle><g id="Group_600" data-name="Group 600"><path id="Path_988" d="M27.76 24.81c.74.58 1.56 1.05 2.43 1.39 0 3.68-2.43 4.17-2.43 4.17" class="MDRcls-1" data-name="Path 988"></path><path id="Path_989" d="M27.76 24.81c-.74.58-1.56 1.05-2.43 1.39 0 3.68 2.43 4.17 2.43 4.17" class="MDRcls-1" data-name="Path 989"></path><path id="Line_26" d="m17.68 36.63 6.18-6.19" class="MDRcls-1" data-name="Line 26"></path><path id="Path_990" d="M19.26 30.45h4.68v4.68" class="MDRcls-1" data-name="Path 990"></path><path id="Line_27" d="m37.49 17.51-6.18 6.18" class="MDRcls-1" data-name="Line 27"></path><path id="Path_991" d="M35.74 23.93h-4.68v-4.68" class="MDRcls-1" data-name="Path 991"></path><path id="Line_28" d="M27.5 39.67v3.04" class="MDRcls-1" data-name="Line 28"></path><path id="Line_29" d="M27.5 12.29v3.04" class="MDRcls-1" data-name="Line 29"></path><path id="Line_30" d="M42.71 27.5h-3.04" class="MDRcls-1" data-name="Line 30"></path><path id="Line_31" d="M15.33 27.5h-3.04" class="MDRcls-1" data-name="Line 31"></path><path id="Path_992" d="M16.53 32.13c-2.56-6.06.29-13.04 6.35-15.6 2.96-1.25 6.29-1.25 9.25 0" class="MDRcls-1" data-name="Path 992"></path><path id="Path_993" d="M38.72 23.53c2.19 6.2-1.07 13-7.27 15.19-2.79.98-5.85.89-8.58-.26" class="MDRcls-1" data-name="Path 993"></path><path id="Path_994" d="M20.89 26.84c0-3.29 2.66-5.95 5.95-5.95h0" class="MDRcls-1" data-name="Path 994"></path><path id="Path_995" d="M34.11 28.16c0 3.29-2.66 5.95-5.95 5.95h0" class="MDRcls-1" data-name="Path 995"></path></g></svg> <h3>Managed Detection and Response (MDR)</h3> <ul> <li>Gain continuous protection with 24/7 threat detection, isolation, disruption, and containment from our SOC Cyber Analysts and Elite Threat Hunters of ransomware attacks</li> <li>Expertise to understand attacker presence, evaluate footholds, and battle persistent access attempts</li> <li>Original threat research, compromise driven content development, and high velocity advisory insights</li> </ul> </div> <a href="/what-we-do/esentire-managed-detection-and-response">LEARN MORE →</a> </div> <div class="IndustryServices__Card"> <div class="IndustryServices__CardTop IndustryServices__CardTopBanner"> <div class="IndustryServices__CardBanner"> <h3>RECOVER</h3> </div> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" viewBox="0 0 55 55"><defs><style>.clsDFIR-1{fill:none;stroke:#5063f9;stroke-linecap:round;stroke-linejoin:round}</style></defs><circle id="Ellipse_6" cx="27.5" cy="27.5" r="27.5" data-name="Ellipse 6" style="fill:#d4d8e9"></circle><g id="Group_602" data-name="Group 602"><path id="Path_973" d="M32.58 20.53c.4.82.64 1.71.7 2.62" class="clsDFIR-1" data-name="Path 973"></path><path id="Path_974" d="M21.03 16.33c1.21-.6 2.55-.91 3.91-.91a8.26 8.26 0 0 1 6.71 3.44" class="clsDFIR-1" data-name="Path 974"></path><path id="Path_975" d="M16.76 32.42c1.44-4.47.83-6.57.83-8.53 0-3.47.34-4.92 1.82-6.38" class="clsDFIR-1" data-name="Path 975"></path><path id="Path_976" d="M25.13 18.26c2.57.11 4.75 1.94 5.31 4.45" class="clsDFIR-1" data-name="Path 976"></path><path id="Path_977" d="M20.18 25.45a9.05 9.05 0 0 1-.14-1.56c-.12-3.14.9-4.66 3.2-5.43" class="clsDFIR-1" data-name="Path 977"></path><path id="Path_978" d="M19 34.28c.51-1.23.88-2.52 1.1-3.84.14-1.02.22-2.04.22-3.07" class="clsDFIR-1" data-name="Path 978"></path><path id="Path_979" d="M27.09 22.12c.38.55.68 1.15.87 1.79" class="clsDFIR-1" data-name="Path 979"></path><path id="Path_980" d="M21.51 34.88c.87-1.89 1.37-3.92 1.47-5.99 0-3.4-.41-2.73-.41-4.97 0-1.72.84-2.87 2.37-2.87.19-.01.38.02.56.09" class="clsDFIR-1" data-name="Path 980"></path><path id="Path_981" d="M25.69 26.19c.04-.81-.17-1.61-.6-2.3" class="clsDFIR-1" data-name="Path 981"></path><path id="Path_982" d="M24.29 35.34s.64-1.56 1.02-2.7" class="clsDFIR-1" data-name="Path 982"></path><path id="Path_983" d="M32.06 15.41c2.67 1.99 3.72 5.36 3.72 9" class="clsDFIR-1" data-name="Path 983"></path><path id="Path_984" d="M15.17 20.86c.08-.91.31-1.81.67-2.65 1.71-3.7 4.91-5.31 9.09-5.31 1.97-.04 3.92.46 5.63 1.43" class="clsDFIR-1" data-name="Path 984"></path><path id="Path_985" d="M14.82 29.72c.3-1.43.41-2.88.32-4.34-.05-.84-.09-1.73-.08-2.62" class="clsDFIR-1" data-name="Path 985"></path><path id="Line_24" d="m36.03 34.84 1.07 1.08" class="clsDFIR-1" data-name="Line 24"></path><path id="Path_986" d="m41.15 42.3-3.89-3.89c-.64-.64-.64-1.69 0-2.33s1.69-.64 2.33 0l3.89 3.89c.64.64.64 1.69 0 2.33-.64.64-1.69.64-2.33 0Z" class="clsDFIR-1" data-name="Path 986"></path><path id="Path_987" d="M38.17 29.7c0-3.72-3.02-6.74-6.74-6.74s-6.74 3.02-6.74 6.74 3.02 6.74 6.74 6.74h0c3.72 0 6.74-3.02 6.74-6.74Z" class="clsDFIR-1" data-name="Path 987"></path><path id="Line_25" d="M31.44 30.34v-4.53" class="clsDFIR-1" data-name="Line 25"></path><circle id="Ellipse_56" cx="31.44" cy="32.89" r=".37" class="clsDFIR-1" data-name="Ellipse 56"></circle></g></svg> <h3>Digital Forensics and Incident Response (DFIR)</h3> <ul> <li>Emergency Incident Response support and Incident Response Retainer SLA with 4-hour threat suppression</li> <li>Digital Forensics investigations and determination of breach extent with results that can bear scrutiny in court of law</li> <li>Guidance through evidence handling, crisis communications, compliance notifications, and more</li> </ul> </div> <a href="/what-we-do/digital-forensics-and-incident-response">LEARN MORE →</a> </div> </div> </div> </div> </section> <section class="HeadingChecks"> <div class="HeadingChecks__Content"> <div class="HeadingChecks__ContentTop"> <h2>Managing Cyber Risk: Moving to a Risk-Based Security Approach</h2> <p>In this episode of Managing Cyber Risk, eSentire’s Tia Hopkins, Chief Cyber Resilience Officer & Field CTO, discusses the difference between cyber risk tolerance and risk appetite, why the risk-based cybersecurity approach is the best choice for your organization, and how you can get started cyber risk reduction strategies.</p> </div> <div class="HeadingChecks__SoundCloud"> <iframe width="100%" height="166" scrolling="no" frameborder="no" allow="autoplay" src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/1125931720&color=%2340c3d9&auto_play=false&hide_related=false&show_comments=true&show_user=true&show_reposts=false&show_teaser=true"></iframe> <div style="font-size: 10px; color: #cccccc;line-break: anywhere;word-break: normal;overflow: hidden;white-space: nowrap;text-overflow: ellipsis; font-family: Interstate,Lucida Grande,Lucida Sans Unicode,Lucida Sans,Garuda,Verdana,Tahoma,sans-serif;font-weight: 100;"><a href="https://soundcloud.com/cybercrimemagazine" title="Cybercrime Magazine" target="_blank" style="color: #cccccc; text-decoration: none;">Cybercrime Magazine</a> · <a href="https://soundcloud.com/cybercrimemagazine/managing-cyber-risk-moving-to-a-risk-based-security-approach-esentire" title="Managing Cyber Risk. Moving To A Risk-Based Security Approach. Tia Hopkins & Mark Sangster, eSentire" target="_blank" style="color: #cccccc; text-decoration: none;">Managing Cyber Risk. Moving To A Risk-Based Security Approach. Tia Hopkins & Mark Sangster, eSentire</a></div> </div> </div> </section> <section class="G2LeaderSlider G2LeaderSlider__Default"> <div class="G2LeaderSlider__Content"> <h2>Security Leaders Count on eSentire to Prevent Business Disruption</h2> <div class="G2LeaderSlider__Badges"> <a class="G2LeaderSlider__BadgesLeft" href="https://www.g2.com/products/esentire/reviews" target="_blank"> <div class="G2LeaderSlider__BadgesLeftG2"> <img src="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV4/What-We-Do/SOC/g2_rating_2x.png" alt="A 4.7/5 G2 rating which indicates that customers rate eSentire as one of the best SOC-as-a-Service companies."> </div> <div class="G2LeaderSlider__BadgesLeftBadges"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/G2-Badges/2024-Fall/eSentire_G2_FALL24_Badges_CS_desktop_2x.png" alt="G2 Leader Desktop Badges in the MDR category showing that eSentire is recognized as one of the best SOC-as-a-Service providers."> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/G2-Badges/2024-Fall/eSentire_G2_FALL24_Badges_mobile_2x.png" alt="G2 Leader Mobile Badges in the MDR category showing that eSentire is recognized as one of the best SOC-as-a-Service providers."> </div> </a> <div class="G2LeaderSlider__BadgesRight"> <a href="/resources/mdr-and-cybersecurity-case-studies">READ MORE REVIEWS AND CASE STUDIES</a> </div> </div> <div class="G2LeaderSlider__Slides swiper"> <div class="swiper-wrapper"> <div class="G2LeaderSlider__Slide swiper-slide"> <div class="G2LeaderSlider__SlideQuoteRating"> <div class="G2LeaderSlider__SlideQuote"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 52 44"><path d="M0 0h52v44H0z" style="stroke-width:0;fill:#ef4d36"/><path d="M16.19 33.23c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.93.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.47 21.47 0 0 1 3.18-3.07h6.88a32.561 32.561 0 0 0-4.18 4.52 16.54 16.54 0 0 0-2.63 5.11c1.37.18 2.62.88 3.48 1.96.74 1 1.13 2.2 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52m17.41-.01c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.92.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.97 21.97 0 0 1 3.18-3.07h6.88a33.137 33.137 0 0 0-4.18 4.52 16.983 16.983 0 0 0-2.63 5.11c1.37.17 2.62.88 3.48 1.96.73 1 1.12 2.21 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52" style="fill:#fff;stroke-width:0"/></svg> </div> <div class="G2LeaderSlider__SlideRating"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 212 48"><defs><style>.clsRating-3{stroke-width:0;fill:#ef4d35}</style></defs><g id="Layer_1-2"><path id="Path_13" d="m29.19 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_14" d="m69.18 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_16" d="m105.82 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_17" d="m144.51 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_18" d="m182.85 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><g id="Rectangle_1016"><rect width="212" height="48" rx="5" ry="5" style="stroke-width:0;fill:none"/><rect width="210" height="46" x="1" y="1" rx="4" ry="4" style="stroke:#ef4d36;stroke-width:2px;fill:none"/></g></g></svg> </div> </div> <div class="G2LeaderSlider__SlideCopy"> <p>Excellent MDR Provider, amazing value for the service that you get!</p> <h3>Michael S.</h3> <h4>Enterprise Company</h4> <a href="https://www.g2.com/products/esentire/reviews/esentire-review-8340849" target="_blank">READ THE FULL REVIEW <span>→</span></a> </div> <div class="G2LeaderSlider__SlideNav"> <div class="G2LeaderSlider__SlidePrevious" tabindex="0" role="button" aria-label="Previous slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsPreviousSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2974" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsPreviousSlide-1"></path><path id="Path_2975" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsPreviousSlide-1"></path></g></svg> </div> <div class="G2LeaderSlider__SlideNext" tabindex="0" role="button" aria-label="Next slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsNextSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2972" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsNextSlide-1"></path><path id="Path_2973" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsNextSlide-1"></path></g></svg> </div> </div> </div> <div class="G2LeaderSlider__Slide swiper-slide"> <div class="G2LeaderSlider__SlideQuoteRating"> <div class="G2LeaderSlider__SlideQuote"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 52 44"><path d="M0 0h52v44H0z" style="stroke-width:0;fill:#ef4d36"/><path d="M16.19 33.23c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.93.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.47 21.47 0 0 1 3.18-3.07h6.88a32.561 32.561 0 0 0-4.18 4.52 16.54 16.54 0 0 0-2.63 5.11c1.37.18 2.62.88 3.48 1.96.74 1 1.13 2.2 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52m17.41-.01c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.92.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.97 21.97 0 0 1 3.18-3.07h6.88a33.137 33.137 0 0 0-4.18 4.52 16.983 16.983 0 0 0-2.63 5.11c1.37.17 2.62.88 3.48 1.96.73 1 1.12 2.21 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52" style="fill:#fff;stroke-width:0"/></svg> </div> <div class="G2LeaderSlider__SlideRating"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 212 48"><defs><style>.clsRating-3{stroke-width:0;fill:#ef4d35}</style></defs><g id="Layer_1-2"><path id="Path_13" d="m29.19 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_14" d="m69.18 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_16" d="m105.82 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_17" d="m144.51 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_18" d="m182.85 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><g id="Rectangle_1016"><rect width="212" height="48" rx="5" ry="5" style="stroke-width:0;fill:none"/><rect width="210" height="46" x="1" y="1" rx="4" ry="4" style="stroke:#ef4d36;stroke-width:2px;fill:none"/></g></g></svg> </div> </div> <div class="G2LeaderSlider__SlideCopy"> <p>Best money I have ever spent on Infosec</p> <h3>Chris T.</h3> <h4>Enterprise Company</h4> <a href="https://www.g2.com/products/esentire/reviews/esentire-review-8352579" target="_blank">READ THE FULL REVIEW <span>→</span></a> </div> <div class="G2LeaderSlider__SlideNav"> <div class="G2LeaderSlider__SlidePrevious" tabindex="0" role="button" aria-label="Previous slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsPreviousSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2974" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsPreviousSlide-1"></path><path id="Path_2975" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsPreviousSlide-1"></path></g></svg> </div> <div class="G2LeaderSlider__SlideNext" tabindex="0" role="button" aria-label="Next slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsNextSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2972" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsNextSlide-1"></path><path id="Path_2973" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsNextSlide-1"></path></g></svg> </div> </div> </div> <div class="G2LeaderSlider__Slide swiper-slide"> <div class="G2LeaderSlider__SlideQuoteRating"> <div class="G2LeaderSlider__SlideQuote"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 52 44"><path d="M0 0h52v44H0z" style="stroke-width:0;fill:#ef4d36"/><path d="M16.19 33.23c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.93.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.47 21.47 0 0 1 3.18-3.07h6.88a32.561 32.561 0 0 0-4.18 4.52 16.54 16.54 0 0 0-2.63 5.11c1.37.18 2.62.88 3.48 1.96.74 1 1.13 2.2 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52m17.41-.01c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.92.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.97 21.97 0 0 1 3.18-3.07h6.88a33.137 33.137 0 0 0-4.18 4.52 16.983 16.983 0 0 0-2.63 5.11c1.37.17 2.62.88 3.48 1.96.73 1 1.12 2.21 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52" style="fill:#fff;stroke-width:0"/></svg> </div> <div class="G2LeaderSlider__SlideRating"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 212 48"><defs><style>.clsRating-3{stroke-width:0;fill:#ef4d35}</style></defs><g id="Layer_1-2"><path id="Path_13" d="m29.19 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_14" d="m69.18 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_16" d="m105.82 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_17" d="m144.51 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_18" d="m182.85 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><g id="Rectangle_1016"><rect width="212" height="48" rx="5" ry="5" style="stroke-width:0;fill:none"/><rect width="210" height="46" x="1" y="1" rx="4" ry="4" style="stroke:#ef4d36;stroke-width:2px;fill:none"/></g></g></svg> </div> </div> <div class="G2LeaderSlider__SlideCopy"> <p>eSentire excels with advanced threat detection, real-time monitoring, MDR services, customized security, 24/7 SOC, and proactive threat hunting."</p> <h3>David P.</h3> <h4>Mid-Market Company</h4> <a href="https://www.g2.com/products/esentire/reviews/esentire-review-8373472" target="_blank">READ THE FULL REVIEW <span>→</span></a> </div> <div class="G2LeaderSlider__SlideNav"> <div class="G2LeaderSlider__SlidePrevious" tabindex="0" role="button" aria-label="Previous slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsPreviousSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2974" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsPreviousSlide-1"></path><path id="Path_2975" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsPreviousSlide-1"></path></g></svg> </div> <div class="G2LeaderSlider__SlideNext" tabindex="0" role="button" aria-label="Next slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsNextSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2972" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsNextSlide-1"></path><path id="Path_2973" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsNextSlide-1"></path></g></svg> </div> </div> </div> <div class="G2LeaderSlider__Slide swiper-slide"> <div class="G2LeaderSlider__SlideQuoteRating"> <div class="G2LeaderSlider__SlideQuote"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 52 44"><path d="M0 0h52v44H0z" style="stroke-width:0;fill:#ef4d36"/><path d="M16.19 33.23c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.93.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.47 21.47 0 0 1 3.18-3.07h6.88a32.561 32.561 0 0 0-4.18 4.52 16.54 16.54 0 0 0-2.63 5.11c1.37.18 2.62.88 3.48 1.96.74 1 1.13 2.2 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52m17.41-.01c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.92.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.97 21.97 0 0 1 3.18-3.07h6.88a33.137 33.137 0 0 0-4.18 4.52 16.983 16.983 0 0 0-2.63 5.11c1.37.17 2.62.88 3.48 1.96.73 1 1.12 2.21 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52" style="fill:#fff;stroke-width:0"/></svg> </div> <div class="G2LeaderSlider__SlideRating"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 212 48"><defs><style>.clsRating-3{stroke-width:0;fill:#ef4d35}</style></defs><g id="Layer_1-2"><path id="Path_13" d="m29.19 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_14" d="m69.18 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_16" d="m105.82 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_17" d="m144.51 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_18" d="m182.85 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><g id="Rectangle_1016"><rect width="212" height="48" rx="5" ry="5" style="stroke-width:0;fill:none"/><rect width="210" height="46" x="1" y="1" rx="4" ry="4" style="stroke:#ef4d36;stroke-width:2px;fill:none"/></g></g></svg> </div> </div> <div class="G2LeaderSlider__SlideCopy"> <p>You can depend on the eSentire team at any time and situation. They're a strong SOC team, capable of quickly assessing the severity of an incident and taking appropriate action.</p> <h3>Verified Customer</h3> <h4>Financial Services</h4> <a href="https://www.g2.com/products/esentire/reviews/esentire-review-8524350" target="_blank">READ THE FULL REVIEW <span>→</span></a> </div> <div class="G2LeaderSlider__SlideNav"> <div class="G2LeaderSlider__SlidePrevious" tabindex="0" role="button" aria-label="Previous slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsPreviousSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2974" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsPreviousSlide-1"></path><path id="Path_2975" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsPreviousSlide-1"></path></g></svg> </div> <div class="G2LeaderSlider__SlideNext" tabindex="0" role="button" aria-label="Next slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsNextSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2972" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsNextSlide-1"></path><path id="Path_2973" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsNextSlide-1"></path></g></svg> </div> </div> </div> <div class="G2LeaderSlider__Slide swiper-slide"> <div class="G2LeaderSlider__SlideQuoteRating"> <div class="G2LeaderSlider__SlideQuote"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 52 44"><path d="M0 0h52v44H0z" style="stroke-width:0;fill:#ef4d36"/><path d="M16.19 33.23c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.93.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.47 21.47 0 0 1 3.18-3.07h6.88a32.561 32.561 0 0 0-4.18 4.52 16.54 16.54 0 0 0-2.63 5.11c1.37.18 2.62.88 3.48 1.96.74 1 1.13 2.2 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52m17.41-.01c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.92.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.97 21.97 0 0 1 3.18-3.07h6.88a33.137 33.137 0 0 0-4.18 4.52 16.983 16.983 0 0 0-2.63 5.11c1.37.17 2.62.88 3.48 1.96.73 1 1.12 2.21 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52" style="fill:#fff;stroke-width:0"/></svg> </div> <div class="G2LeaderSlider__SlideRating"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 212 48"><defs><style>.clsRating-3{stroke-width:0;fill:#ef4d35}</style></defs><g id="Layer_1-2"><path id="Path_13" d="m29.19 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_14" d="m69.18 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_16" d="m105.82 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_17" d="m144.51 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_18" d="m182.85 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><g id="Rectangle_1016"><rect width="212" height="48" rx="5" ry="5" style="stroke-width:0;fill:none"/><rect width="210" height="46" x="1" y="1" rx="4" ry="4" style="stroke:#ef4d36;stroke-width:2px;fill:none"/></g></g></svg> </div> </div> <div class="G2LeaderSlider__SlideCopy"> <p>eSentire takes care of all the work! I request what I need and Boom, its done! I check the dashboard regularly just to keep an eye out on things, but i feel safe knowing they have my back.</p> <h3>Verified Customer</h3> <h4>Electrical/Electronic Manufacturing</h4> <a href="https://www.g2.com/products/esentire/reviews/esentire-review-6969630" target="_blank">READ THE FULL REVIEW <span>→</span></a> </div> <div class="G2LeaderSlider__SlideNav"> <div class="G2LeaderSlider__SlidePrevious" tabindex="0" role="button" aria-label="Previous slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsPreviousSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2974" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsPreviousSlide-1"></path><path id="Path_2975" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsPreviousSlide-1"></path></g></svg> </div> <div class="G2LeaderSlider__SlideNext" tabindex="0" role="button" aria-label="Next slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsNextSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2972" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsNextSlide-1"></path><path id="Path_2973" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsNextSlide-1"></path></g></svg> </div> </div> </div> <div class="G2LeaderSlider__Slide swiper-slide"> <div class="G2LeaderSlider__SlideQuoteRating"> <div class="G2LeaderSlider__SlideQuote"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 52 44"><path d="M0 0h52v44H0z" style="stroke-width:0;fill:#ef4d36"/><path d="M16.19 33.23c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.93.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.47 21.47 0 0 1 3.18-3.07h6.88a32.561 32.561 0 0 0-4.18 4.52 16.54 16.54 0 0 0-2.63 5.11c1.37.18 2.62.88 3.48 1.96.74 1 1.13 2.2 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52m17.41-.01c-2.22 0-3.84-.51-4.85-1.52a5.187 5.187 0 0 1-1.52-3.81v-1.55c0-1.47.22-2.92.63-4.33a21.31 21.31 0 0 1 4.26-7.92 21.97 21.97 0 0 1 3.18-3.07h6.88a33.137 33.137 0 0 0-4.18 4.52 16.983 16.983 0 0 0-2.63 5.11c1.37.17 2.62.88 3.48 1.96.73 1 1.12 2.21 1.11 3.44v1.85c.04 1.43-.51 2.81-1.52 3.81-1.01 1.01-2.63 1.52-4.85 1.52" style="fill:#fff;stroke-width:0"/></svg> </div> <div class="G2LeaderSlider__SlideRating"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 212 48"><defs><style>.clsRating-3{stroke-width:0;fill:#ef4d35}</style></defs><g id="Layer_1-2"><path id="Path_13" d="m29.19 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_14" d="m69.18 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_16" d="m105.82 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_17" d="m144.51 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><path id="Path_18" d="m182.85 10.31-4.37 8.86-9.78 1.42 7.08 6.9-1.67 9.74 8.75-4.6 8.75 4.6-1.67-9.74 7.08-6.9-9.78-1.42-4.37-8.86Z" class="clsRating-3"/><g id="Rectangle_1016"><rect width="212" height="48" rx="5" ry="5" style="stroke-width:0;fill:none"/><rect width="210" height="46" x="1" y="1" rx="4" ry="4" style="stroke:#ef4d36;stroke-width:2px;fill:none"/></g></g></svg> </div> </div> <div class="G2LeaderSlider__SlideCopy"> <p>It is a complete system, the support is excellent. I like that they can isolate a resource at 2:00 AM without waking me up.</p> <h3>Verified Customer</h3> <h4>Utilities</h4> <a href="https://www.g2.com/products/esentire/reviews/esentire-review-6851447" target="_blank">READ THE FULL REVIEW <span>→</span></a> </div> <div class="G2LeaderSlider__SlideNav"> <div class="G2LeaderSlider__SlidePrevious" tabindex="0" role="button" aria-label="Previous slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsPreviousSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2974" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsPreviousSlide-1"></path><path id="Path_2975" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsPreviousSlide-1"></path></g></svg> </div> <div class="G2LeaderSlider__SlideNext" tabindex="0" role="button" aria-label="Next slide" aria-controls="swiper-wrapper-1072fe7221b559f5d" aria-disabled="false"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsNextSlide-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_2-2"><path id="Path_2972" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsNextSlide-1"></path><path id="Path_2973" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsNextSlide-1"></path></g></svg> </div> </div> </div> </div> </div> </div> </section> <!-- Swiper JS --> <script src="https://cdn.jsdelivr.net/npm/swiper@9/swiper-bundle.min.js"></script> <!-- Initialize Swiper --> <script> var swiper = new Swiper(".G2LeaderSlider__Slides", { slidesPerView: 1, spaceBetween: 0, navigation: { nextEl: ".G2LeaderSlider__SlideNext", prevEl: ".G2LeaderSlider__SlidePrevious", }, autoplay: { delay: 11000 } }); </script> <section class="Recommended"> <div class="Recommended__Top"> <h2>Dive Deeper Into How to Manage Cyber Risk</h2> </div> <div class="Recommended__Bottom"> <a href="/resources/library/contextualizing-the-mitre-att-ck-framework-for-risk-reduction" class="Recommended__Block" data-aos="fade-up" data-aos-duration="1000" data-aos-delay="150"> <div class="Recommended__BlockTop"> <div class="Recommended__BlockTitle">REPORT</div> <div class="Recommended__BlockSummary">Contextualizing the MITRE ATT&CK® Framework for Risk Reduction</div> </div> <div class="Recommended__BlockFooter">DOWNLOAD NOW →</div> </a> <a href="/blog/how-to-increase-cyber-resilience-at-your-organization" class="Recommended__Block" data-aos="fade-up" data-aos-duration="1000" data-aos-delay="150"> <div class="Recommended__BlockTop"> <div class="Recommended__BlockTitle">BLOG</div> <div class="Recommended__BlockSummary">How to Increase Cyber Resilience at Your Organization</div> </div> <div class="Recommended__BlockFooter">READ NOW →</div> </a> <a href="/resources/library/navigating-risk-reduction-and-cyber-insurance" class="Recommended__Block" data-aos="fade-up" data-aos-duration="1000" data-aos-delay="150"> <div class="Recommended__BlockTop"> <div class="Recommended__BlockTitle">WEBINAR</div> <div class="Recommended__BlockSummary">Navigating Risk Reduction and Cyber Insurance</div> </div> <div class="Recommended__BlockFooter">WATCH NOW →</div> </a> </div> <div class="Recommended__Cta"> <div class="Recommended__CtaLeft"> <h3>View our cyber risk management resources to learn more about how eSentire protects businesses.</h3> </div> <div class="Recommended__CtaRight"> <a href="/resources/library?topics%5B%5D=Cyber%20Risk">VIEW ALL RESOURCES</a> </div> </div> </section> <section class="GetStartedLong"> <div class="GetStartedLong__Content"> <div class="GetStartedLong__Grid"> <div class="GetStartedLong__GridLeft"> <h2>Ready to<br>Get Started?</h2> <p>We're here to help! Submit your information and an eSentire representative will be in touch to help you build a more resilient security operation today.</p> </div> <div class="GetStartedLong__GridRight"> <iframe id="GetStarted__IframeEmbed" class="GetStartedLong__GridForm" scrolling="no" src="https://mdr.esentire.com/l/651833/2022-01-11/lsxf7"></iframe> </div> </div> </div> </section> <script> var getStartedFrame = document.getElementById("GetStarted__IframeEmbed"); var URLWithParametersAdded = new URL(getStartedFrame.src+window.location.search); if (!window.location.search.includes('gclid') && readCookie('gclid') != null) { URLWithParametersAdded.searchParams.append('gclid', readCookie('gclid')); } if (!window.location.search.includes('kpid') && readCookie('kpid') != null) { URLWithParametersAdded.searchParams.append('kpid', readCookie('kpid')); } if (!window.location.search.includes('sfcampaignid') && readCookie('sfcampaignid') != null) { URLWithParametersAdded.searchParams.append('sfcampaignid', readCookie('sfcampaignid')); } if (!window.location.search.includes('msclid') && readCookie('msclid') != null) { URLWithParametersAdded.searchParams.append('msclid', readCookie('msclid')); } if (!window.location.search.includes('li_fat_id') && readCookie('li_fat_id') != null) { URLWithParametersAdded.searchParams.append('li_fat_id', readCookie('li_fat_id')); } if (!window.location.search.includes('utm_source') && readCookie('utm_source') != null) { URLWithParametersAdded.searchParams.append('utm_source', readCookie('utm_source')); } if (!window.location.search.includes('utm_medium') && readCookie('utm_medium') != null) { URLWithParametersAdded.searchParams.append('utm_medium', readCookie('utm_medium')); } if (!window.location.search.includes('utm_campaign') && readCookie('utm_campaign') != null) { URLWithParametersAdded.searchParams.append('utm_campaign', readCookie('utm_campaign')); } if (!window.location.search.includes('utm_content') && readCookie('utm_content') != null) { URLWithParametersAdded.searchParams.append('utm_content', readCookie('utm_content')); } getStartedFrame.src = URLWithParametersAdded; </script> <div id="cookie-consent" class="CookieConsent"> <div class="CookieConsent__Content"> <div class="CookieConsent__Row"> <div class="CookieConsent__Left"> <p>Cookies allow us to deliver the best possible experience for you on our website - by continuing to use our website or by closing this box, you are consenting to our use of cookies. Visit our <a href="/legal/privacy-policy" target="_blank">Privacy Policy</a> to learn more.</p> </div> <div class="CookieConsent__Right"> <a onclick="acceptCookieConsent();">Accept</a> </div> </div> </div> </div> <!-- Block: Footer --> <div class="Footer"> <div class="Footer__Contact"> <div class="Footer__ContactMessage">ARE YOU EXPERIENCING A SECURITY INCIDENT OR HAVE YOU BEEN BREACHED?</div> <a class="Footer__ContactNumber" href="tel:1-866-579-2200">Call 1-866-579-2200</a> </div> <div class="Footer__Content"> <div class="Footer__Top"> <div class="Footer__TopContent"> <div class="Footer__TopLeft"> <div class="Footer__TopLeftLogo"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 27.12 27.12"><circle cx="13.56" cy="13.56" r="13.56" style="fill:#263c91"/><path d="M17.82 8.59c-1.2-1.54-3.24-1.53-3.24-1.53h-2.04S10.5 7.05 9.3 8.59c-.73.94-.89 1.84-.89 2.47v5.01c0 .63.16 1.53.89 2.47 1.2 1.54 3.24 1.53 3.24 1.53h6.17v-2.89h-5.55s-.81 0-1.29-.61c-.29-.37-.36-.73-.36-.98V15h7.2v-3.93c0-.63-.16-1.53-.89-2.47Zm-6.31 2.78c0-.25.06-.61.36-.98.48-.61 1.29-.61 1.29-.61h.82s.81 0 1.29.61c.29.37.36.73.36.98v.76h-4.11v-.76Z" style="fill:#fff"/></svg> </div> <div class="Footer__TopLeftCopy"> <h3>The Proven Choice for <br>Managed Detection and Response</h3> <div class="Footer__TopLeftCopyCTAs"> <a href="/get-started">GET STARTED <span>→</span></a> <a href="https://esentire.channeltivity.com/Login" target="_blank">PARTNER LOGIN <span>→</span></a> </div> </div> </div> <div class="Footer__TopRight"> <div class="Footer__TopRightCopy"> <h3>Sales and <br>Customer Support</h3> </div> <div class="Footer__TopRightLinks"> <a href="tel:1-866-579-2200" class="Footer__TopRightLink"> <span>NORTH AMERICA</span> <span>1-866-579-2200</span> </a> <a href="tel:+44(0)8000 443242" class="Footer__TopRightLink"> <span>EMEA</span> <span>(0)8000-443242</span> </a> <a href="tel:+1 519 651 2200" class="Footer__TopRightLink"> <span>ANZ/APAC</span> <span>1-519-651-2200</span> </a> </div> </div> </div> </div> <div class="Footer__Middle"> <div class="Footer__MiddleContent"> <div class="Footer__MiddleSocialForm"> <div class="Footer__MiddleSocial"> <a href="https://ca.linkedin.com/company/esentire-inc-" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 34.62 35.53"><defs><style>.clsLinkedFooterIcon-1{fill:#172143;stroke-width:0}</style></defs><g id="Component_61_4"><path id="Rectangle_602" d="M2.96 12.68h6.21v19.79H2.96z" class="clsLinkedFooterIcon-1"/><path id="Path_1036" d="M25.95 12.24c-.23-.03-.47-.04-.72-.05-2.38-.13-4.66.92-6.12 2.8-.1.12-.19.25-.27.39v-2.65H12.9v19.79h6.21v-9.3c-.15-1.36.04-2.74.57-4 .56-.99 1.62-1.59 2.76-1.55a3.29 3.29 0 0 1 3.5 3.06V32.61h6.21V19.7c0-4.42-2.24-7.03-6.21-7.46" class="clsLinkedFooterIcon-1"/><path id="Path_1037" d="M9.67 6.52c0 1.99-1.61 3.6-3.6 3.6s-3.6-1.61-3.6-3.6 1.61-3.6 3.6-3.6 3.6 1.61 3.6 3.6" class="clsLinkedFooterIcon-1"/></g></svg> </a> <a href="https://twitter.com/eSentire" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34.32 35.52"><path d="M25.65 5.92h4.53l-9.89 11.3L31.92 32.6h-9.11l-7.13-9.33-8.16 9.33H2.98l10.58-12.09L2.4 5.91h9.34l6.45 8.53 7.46-8.52ZM24.06 29.9h2.51L10.38 8.49H7.69L24.06 29.9Z" style="fill:#172143;stroke-width:0"/></svg> </a> <a href="https://www.youtube.com/c/eSentireInc" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 43.64 35.51"><path d="M35.02 8.42H8.63c-3.53 0-6.38 2.86-6.38 6.38v11.42c0 3.53 2.86 6.38 6.38 6.38h26.39c3.53 0 6.38-2.86 6.38-6.38V14.8c0-3.53-2.86-6.38-6.38-6.38ZM17.88 26.37V14.63l10.17 5.87-10.17 5.87Z" style="fill:#172143;stroke-width:0"/></svg> </a> </div> <div class="Footer__MiddleForm"> <iframe id="Footer__IframeEmbed" scrolling="no" src="https://mdr.esentire.com/l/651833/2023-08-01/2pz6mw"></iframe> </div> </div> <div class="Footer__MiddleGrid"> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>What we do</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/what-we-do/esentire-managed-detection-and-response">Managed Detection and Response</a> <a href="/what-we-do/digital-forensics-and-incident-response">Digital Forensics and Incident Response</a> <a href="/what-we-do/exposure-vulnerability-and-risk-management">Exposure Management Services</a> <a href="/what-we-do/xdr-extended-detection-and-response">Extended Detection and Response (XDR)</a> <a href="/what-we-do/security-operations-center">Security Operations Center (SOC)</a> <a href="/what-we-do/mdr-integrations">Technology Integrations</a> <a href="/what-we-do/threat-response-unit">Threat Response Unit (TRU)</a> <a href="/what-we-do/team-esentire">Cyber Resilience Team</a> <a href="/what-we-do/esentire-managed-detection-and-response/microsoft-mdr">MDR for Microsoft</a> <a href="/what-we-do/esentire-managed-detection-and-response/aws-cloud-security">MDR for AWS</a> <a href="/what-we-do/esentire-managed-detection-and-response/mdr-for-genai">MDR for GenAI</a> <a href="/what-we-do/esentire-managed-detection-and-response/response-and-remediation">Response and Remediation</a> <a href="/how-we-do-it/mdr-pricing-packaging">MDR Pricing</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>How we do it</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/how-we-do-it/signals/mdr-for-endpoint">Endpoint</a> <a href="/how-we-do-it/signals/mdr-for-network">Network</a> <a href="/how-we-do-it/signals/mdr-for-log">Log</a> <a href="/how-we-do-it/signals/cloud">Cloud</a> <a href="/how-we-do-it/signals/identity">Identity</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Industries</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/how-we-do-it/industries/insurance-cybersecurity">Insurance</a> <a href="/how-we-do-it/industries/construction-cybersecurity">Construction</a> <a href="/how-we-do-it/industries/financial-services-cybersecurity">Finance</a> <a href="/how-we-do-it/industries/legal-cybersecurity">Legal</a> <a href="/how-we-do-it/industries/manufacturing-cybersecurity">Manufacturing</a> <a href="/how-we-do-it/industries/private-equity-cybersecurity">Private Equity</a> <a href="/how-we-do-it/industries/healthcare-cybersecurity">Healthcare</a> <a href="/how-we-do-it/industries/retail-cybersecurity">Retail</a> <a href="/how-we-do-it/industries/food-supply-cybersecurity">Food Supply</a> <a href="/how-we-do-it/industries/state-local-governments-cybersecurity">Government and Education</a> <a href="/how-we-do-it/industries/automotive-dealerships">Automotive Dealerships</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Use Cases</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/how-we-do-it/use-cases/ransomware">Ransomware</a> <a href="/how-we-do-it/use-cases/third-party-cyber-risk">Third-Party Risk</a> <a href="/how-we-do-it/use-cases/sensitive-data">Sensitive Data Security</a> <a href="/how-we-do-it/use-cases/cloud-misconfiguration-breaches">Cloud Misconfiguration</a> <a href="/how-we-do-it/use-cases/zero-day-exploits">Zero Day Attacks</a> <a href="/how-we-do-it/use-cases/cyber-risk-management">Cyber Risk</a> <a href="/how-we-do-it/use-cases/cybersecurity-compliance">Cybersecurity Compliance</a> <a href="/how-we-do-it/use-cases/mdr-outsourcing">Do More With Less</a> <a href="/how-we-do-it/use-cases/meet-cyber-insurance-requirements">Cyber Insurance</a> <a href="/how-we-do-it/use-cases/security-leadership">Security Leadership</a> <a href="/how-we-do-it/use-cases/cyber-threat-intelligence">Cyber Threat Intelligence</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Resources</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/resources/security-advisories">Security Advisories</a> <a href="/resources/blog">Blog</a> <a href="/resources/library">Resource Library</a> <a href="/resources/video-library">Video Library</a> <a href="/resources/tru-intelligence-center">TRU Intelligence Center</a> <a href="/resources/mdr-and-cybersecurity-case-studies">Case Studies</a> <a href="/switch-to-esentire">Switch to eSentire</a> <a href="/consolidate-and-save">Consolidate & Save</a> <a href="/esentire-mdr-vs-everyone">Real vs. Fake MDR</a> <a href="/esentire-mdr-vs-everyone/compare">Compare MDR Vendors</a> <a href="/cybersecurity-fundamentals-defined">Cybersecurity Glossary</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Tools</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/cybersecurity-assessment-tool">Cybersecurity Assessment</a> <a href="/mdr-roi-calculator">MDR ROI Calculator</a> <a href="/security-operations-center-pricing-calculator">SOC Calculator</a> <a href="/mitre-attck-framework-tool">MITRE ATT&CK® Tool</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Company</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/company/about-us">About Us</a> <a href="/company/leadership">Leadership</a> <a href="/company/newsroom">Newsroom</a> <a href="/company/event-calendar">Event Calendar</a> <a href="/company/careers">Careers</a> <a href="/partners">Partners</a> <a href="/en-au-nz/switch-to-esentire">Australia & New Zealand</a> <a href="/en-gb/switch-to-esentire">United Kingdom</a> </nav> </div> </div> </div> </div> <div class="Footer__Legal"> <p>2024 eSentire, Inc. All Rights Reserved.</p> <nav class="Footer__LegalNav"> <a href="/sitemap">Sitemap</a> <a href="/legal/terms-and-conditions">Terms and Conditions</a> <a href="/legal/privacy-policy">Privacy Policy</a> <a href="/legal/accessibility">Accessibility</a> <a href="/legal/documents">Legal</a> </nav> </div> </div> </div> <script> // Create cookie function setCookie(cname, cvalue, exdays) { const d = new Date(); d.setTime(d.getTime() + (exdays*24*60*60*1000)); let expires = "expires="+ d.toUTCString(); document.cookie = cname + "=" + cvalue + ";" + expires + ";path=/"; } // Delete cookie function deleteCookie(cname) { const d = new Date(); d.setTime(d.getTime() + (24*60*60*1000)); let expires = "expires="+ d.toUTCString(); document.cookie = cname + "=;" + expires + ";path=/"; } // Read cookie function getCookie(cname) { let name = cname + "="; let decodedCookie = decodeURIComponent(document.cookie); let ca = decodedCookie.split(';'); for(let i = 0; i <ca.length; i++) { let c = ca[i]; while (c.charAt(0) == ' ') { c = c.substring(1); } if (c.indexOf(name) == 0) { return c.substring(name.length, c.length); } } return ""; } // Set cookie consent function acceptCookieConsent(){ deleteCookie('user_cookie_consent'); setCookie('user_cookie_consent', 1, 30); document.getElementById("cookie-consent").classList.remove('show'); } let cookie_consent = getCookie("user_cookie_consent"); if(cookie_consent != ""){ }else{ document.getElementById("cookie-consent").classList.add('show'); } </script> <script type="application/ld+json">{"@context":"http://schema.org","@graph":[{"@type":"WebPage","author":{"@id":"https://www.esentire.com/#identity"},"copyrightHolder":{"@id":"https://www.esentire.com/#identity"},"copyrightYear":"2021","creator":{"@id":"https://www.esentire.com/#creator"},"dateCreated":"2024-08-13T10:06:55-04:00","dateModified":"2024-09-05T13:12:40-04:00","datePublished":"2021-07-20T13:21:00-04:00","description":"Go beyond cyber risk management with eSentire. Learn how to build a cybersecurity strategy that reduces cyber risk, builds resilience, and prevents disruption.","headline":"Manage Your Cyber Risk","image":{"@type":"ImageObject","url":"https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV3/External/SEO/Cyber-Risk_meta-image_v1.png"},"inLanguage":"en-us","mainEntityOfPage":"https://www.esentire.com/how-we-do-it/use-cases/cyber-risk-management","name":"Manage Your Cyber Risk","publisher":{"@id":"https://www.esentire.com/#creator"},"url":"https://www.esentire.com/how-we-do-it/use-cases/cyber-risk-management"},{"@id":"https://www.esentire.com/#identity","@type":"LocalBusiness","address":{"@type":"PostalAddress","addressCountry":"CA","addressLocality":"Waterloo","addressRegion":"Ontario","postalCode":"N2L 3X2","streetAddress":"451 Phillip St, Suite 135, ON"},"alternateName":"eSentire Corporate Marketing","description":"eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire’s award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit www.esentire.com and follow @webinars.","email":"info@esentire.com","founder":"Eldon Sprickerhoff","foundingDate":"2001-01-01","foundingLocation":"Waterloo, Ontario","geo":{"@type":"GeoCoordinates","latitude":"43.48356169301266","longitude":"-80.54315326704616"},"image":{"@type":"ImageObject","height":"512","url":"https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assets/eSentire_emblem_512x512.jpg","width":"512"},"logo":{"@type":"ImageObject","height":"60","url":"https://esentire-dot-com-assets.s3.amazonaws.com/assets/_600x60_fit_center-center_82_none/302747/eSentire_emblem_512x512.png?mtime=1709753172","width":"60"},"name":"eSentire Inc.","openingHoursSpecification":[{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Sunday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Monday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Tuesday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Wednesday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Thursday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Friday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Saturday"],"opens":"09:00:00"}],"priceRange":"$$$","telephone":"1-866-579-2200","url":"https://www.esentire.com"},{"@id":"https://www.esentire.com/#creator","@type":"ProfessionalService","address":{"@type":"PostalAddress","addressCountry":"CA","addressLocality":"Waterloo","addressRegion":"Ontario","postalCode":"N2L 3X2","streetAddress":"451 Phillip St, Suite 135, ON"},"alternateName":"eSentire Corporate Marketing","email":"info@esentire.com","founder":"Eldon Sprickerhoff","foundingDate":"2001-01-01","foundingLocation":"Waterloo, Ontario","geo":{"@type":"GeoCoordinates","latitude":"43.48356169301266","longitude":"-80.54315326704616"},"image":{"@type":"ImageObject","height":"512","url":"https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assets/eSentire_emblem_512x512.jpg","width":"512"},"logo":{"@type":"ImageObject","height":"60","url":"https://esentire-dot-com-assets.s3.amazonaws.com/assets/_600x60_fit_center-center_82_none/302747/eSentire_emblem_512x512.png?mtime=1709753172","width":"60"},"name":"eSentire Inc.","priceRange":"$$$","telephone":"1-866-579-2200","url":"https://www.esentire.com"},{"@type":"BreadcrumbList","description":"Breadcrumbs list","itemListElement":[{"@type":"ListItem","item":"https://www.esentire.com","name":"Homepage","position":1},{"@type":"ListItem","item":"https://www.esentire.com/how-we-do-it","name":"How We Do It","position":2},{"@type":"ListItem","item":"https://www.esentire.com/how-we-do-it/use-cases","name":"Use Cases","position":3},{"@type":"ListItem","item":"https://www.esentire.com/how-we-do-it/use-cases/cyber-risk-management","name":"Cyber-Risk","position":4}],"name":"Breadcrumbs"}]}</script> <script src="/main.js?v=4.11.57"></script> <script src="/style.js"></script> <script type="text/javascript" src="https://unpkg.com/aos@2.3.1/dist/aos.js"></script> <script type="text/javascript"> function readCookie(c_name) { var c_value = document.cookie; var c_start = c_value.indexOf(" " + c_name + "="); if (c_start == -1) { c_start = c_value.indexOf(c_name + "="); } if (c_start == -1) { c_value = null; } else { c_start = c_value.indexOf("=", c_start) + 1; var c_end = c_value.indexOf(";", c_start); if (c_end == -1) { c_end = c_value.length; } c_value = unescape(c_value.substring(c_start, c_end)); } return c_value; } </script> <script> AOS.init(); </script> <noscript> <img src="https://ws.zoominfo.com/pixel/3k8XsFBkOniCq5dTRwpV" alt="ZoomInfo Image for Video" width="1" height="1" style="display: none;" /> </noscript> <script type="text/javascript"> window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.defer = true; mf.src = "//cdn.mouseflow.com/projects/ce788296-8259-4e39-bcae-56ddd5b7e767.js"; document.getElementsByTagName("head")[0].appendChild(mf); })(); </script> </body> </html><!-- Cached by Blitz on 2024-11-22T00:35:11-05:00 --><!-- Served by Blitz on 2024-11-27T00:00:55-05:00 -->