CINXE.COM

eSentire | Managed Detection and Response for Retail Companies

<!doctype html> <html lang="en-US"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <meta name="robots" content="noodp,noydir"> <!-- Google Tag Manager --> <script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-57Z6ZWR'); </script> <!-- End Google Tag Manager --> <script> (function () { var zi = document.createElement('script'); zi.type = 'text/javascript'; zi.async = true; zi.src = 'https://ws.zoominfo.com/pixel/3k8XsFBkOniCq5dTRwpV'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(zi, s); })(); </script> <link rel="stylesheet" href="/style.css?v=4.12.91"> <link rel="stylesheet" href="https://unpkg.com/aos@2.3.1/dist/aos.css"> <link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/swiper@9/swiper-bundle.min.css"/> <link rel="shortcut icon" href="https://esentire-dot-com-assets.s3.ca-central-1.amazonaws.com/assetsV4/External/blue_favicon_48x48.ico?v=2024"> <link rel="stylesheet" href="https://use.typekit.net/evh1ctd.css"> <link rel="stylesheet" href="https://use.typekit.net/amm2djb.css"> <!-- Start VWO SmartCode --> <script referrerPolicy="no-referrer-when-downgrade" src="https://dev.visualwebsiteoptimizer.com/lib/780243.js" id="vwoCode"></script> <!-- End VWO SmartCode --> <title>eSentire | Managed Detection and Response for Retail Companies</title><meta name="generator" content="SEOmatic"> <meta name="description" content="See how eSentire proactively detects, disrupts, and remediates retail industry cybersecurity threats before they impact your business and your customers."> <meta name="referrer" content="no-referrer-when-downgrade"> <meta name="robots" content="all"> <meta content="https://www.facebook.com/eSentireMDR/" property="fb:profile_id"> <meta content="en_US" property="og:locale"> <meta content="eSentire" property="og:site_name"> <meta content="website" property="og:type"> <meta content="https://www.esentire.com/how-we-do-it/industries/retail-cybersecurity" property="og:url"> <meta content="Managed Detection and Response for Retail Companies" property="og:title"> <meta content="See how eSentire proactively detects, disrupts, and remediates retail industry cybersecurity threats before they impact your business and your customers." property="og:description"> <meta content="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/External/SEO/eSentire_retail_meta-100.jpg" property="og:image"> <meta content="eSentire - The Authority in Managed Detection and Response" property="og:image:alt"> <meta name="twitter:card" content="summary_large_image"> <meta name="twitter:site" content="@eSentire"> <meta name="twitter:creator" content="@eSentire"> <meta name="twitter:title" content="Managed Detection and Response for Retail Companies"> <meta name="twitter:description" content="See how eSentire proactively detects, disrupts, and remediates retail industry cybersecurity threats before they impact your business and your customers."> <meta name="twitter:image" content="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/External/SEO/eSentire_retail_meta-100.jpg"> <meta name="twitter:image:alt" content="eSentire - The Authority in Managed Detection and Response"> <link href="https://www.esentire.com/how-we-do-it/industries/retail-cybersecurity" rel="canonical"> <link href="https://www.esentire.com" rel="home"></head> <body class="no-sidebar industry"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-57Z6ZWR" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Set Cookie for GCLID tracking --> <script type="text/javascript"> function readCookie(c_name) { var c_value = document.cookie; var c_start = c_value.indexOf(" " + c_name + "="); if (c_start == -1) { c_start = c_value.indexOf(c_name + "="); } if (c_start == -1) { c_value = null; } else { c_start = c_value.indexOf("=", c_start) + 1; var c_end = c_value.indexOf(";", c_start); if (c_end == -1) { c_end = c_value.length; } c_value = unescape(c_value.substring(c_start, c_end)); } return c_value; } function setCookie(a, d, b) { var c = new Date; c.setTime(c.getTime() + 864E5 * b); b = "; expires=" + c.toGMTString(); document.cookie = a + "=" + d + b } function getParam(a) { return (a = RegExp("[?&]" + a + "=([^&]*)").exec(window.location.search)) && decodeURIComponent(a[1].replace(/\+/g, " ")) } if (getParam("gclid")) { setCookie("gclid", getParam("gclid"), 270); }; if (getParam("utm_source")) { setCookie("utm_source", getParam("utm_source"), 270); }; if (getParam("utm_medium")) { setCookie("utm_medium", getParam("utm_medium"), 270); }; if (getParam("utm_campaign")) { setCookie("utm_campaign", getParam("utm_campaign"), 270); }; if (getParam("utm_content")) { setCookie("utm_content", getParam("utm_content"), 270); }; if (getParam("kpid")) { setCookie("kpid", getParam("kpid"), 270); }; if (getParam("sfcampaignid")) { setCookie("sfcampaignid", getParam("sfcampaignid"), 270) }; if (getParam("msclkid")) { setCookie("msclkid", getParam("msclkid"), 270) }; if (getParam("li_fat_id")) { setCookie("li_fat_id", getParam("li_fat_id"), 270) }; </script> <!-- Block: NavBar --> <div class="NavBar"> <div class="NavBar__Content"> <div class="NavBar__Left"> <a class="NavBar__Logo" href="https://www.esentire.com"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 230 32" xml:space="preserve"><path d="M55.8 22c0 1.6-.3 3-1 4.2-.6 1.2-1.5 2.3-2.6 3.1-1.1.9-2.4 1.5-3.8 1.9-1.5.4-3 .6-4.6.6-2.4 0-4.5-.3-6.5-.9-1.9-.6-3.7-1.7-5.3-3.3l4.9-4.9c.8.8 1.9 1.4 3.1 1.7 1.2.3 2.5.5 3.8.5 3 0 4.4-.9 4.4-2.8 0-.8-.2-1.4-.6-1.8-.4-.4-1.1-.7-2-.8l-3.7-.5c-2.8-.4-4.8-1.3-6.2-2.8-1.4-1.5-2.1-3.6-2.1-6.3 0-1.4.2-2.7.8-4 .5-1.2 1.3-2.3 2.2-3.1 1-.9 2.2-1.6 3.5-2.1 1.4-.5 3-.7 4.7-.7 2.2 0 4.2.3 5.9.8 1.7.6 3.3 1.6 4.5 2.9l-4.8 4.8c-.4-.5-1-.8-1.6-1.1-.5-.2-1.1-.4-1.6-.5-.5-.1-1-.2-1.5-.2h-1.2c-.6 0-1.2.1-1.7.3-.4.2-.8.4-1.2.7-.3.3-.5.6-.7.9-.1.3-.2.7-.2 1 0 .2.1.5.1.7.1.3.3.5.5.7.2.2.5.4.8.6.4.2.9.3 1.3.4l3.7.5c2.7.4 4.8 1.2 6.1 2.6.8.8 1.4 1.8 1.8 2.9.6 1.4.8 2.7.8 4m7.4 9.6V.3h21v6.9H70.8v5.2h11.5v6.9H70.8v5.5h13.4v6.8h-21zm46.4 0-9.9-15.7v15.7h-7.6V.3h6.6l9.9 15.8V.3h7.6v31.3h-6.6zm28.8-24.5v24.4h-7.6V7.1h-7.6V.2H146v6.9h-7.6zm14.5 24.5V.3h7.6v31.3h-7.6zm31.9 0L179.3 20h-2.6v11.6h-7.6V.3h12.3c1.6 0 3.1.3 4.5.9 1.2.5 2.4 1.3 3.3 2.3.9.9 1.6 2 2 3.2.4 1.2.7 2.5.7 3.7 0 1-.1 2-.4 2.9-.3.8-.7 1.6-1.2 2.3-.5.7-1 1.2-1.6 1.7-.6.5-1.2.9-1.8 1.2l6.7 13.1h-8.8zm-.4-21.2c0-.8-.3-1.6-.9-2.2-.6-.6-1.4-1-2.4-1h-4.3v6.3h4.3c1 0 1.9-.3 2.4-1 .6-.5.9-1.3.9-2.1M200 31.6V.3h21v6.9h-13.4v5.2h11.5v6.9h-11.5v5.5H221v6.9l-21-.1zM22.7 3.9C19.8.2 14.9.2 14.9.2H10S5.1.2 2.2 3.9C.4 6.2 0 8.4 0 9.9V22c0 1.5.4 3.7 2.2 5.9C5 31.6 10 31.6 10 31.6h14.9v-7H11.4s-2 0-3.1-1.5c-.5-.7-.8-1.5-.9-2.4v-1.4h17.3V9.9c.1-1.5-.3-3.7-2-6M7.5 10.6c0-.9.3-1.7.9-2.4 1.2-1.5 3.1-1.5 3.1-1.5h2s2 0 3.1 1.5c.5.7.8 1.5.9 2.4v1.8h-10v-1.8zm218.3 15.7c1.5 0 2.7 1.2 2.7 2.7s-1.2 2.7-2.7 2.7c-1.5 0-2.7-1.2-2.7-2.7 0-1.5 1.2-2.7 2.7-2.7zm0 4.7c1.1 0 2.1-.9 2.1-2.1 0-1.1-.9-2.1-2.1-2.1-1.1 0-2.1.9-2.1 2.1 0 1.2.9 2.1 2.1 2.1zm-1.1-.7v-2.7h1.1c.8 0 1 .5 1 .8 0 .4-.2.7-.6.8l.7 1.1h-.6l-.7-1h-.4v1h-.5zm1-1.5c.4 0 .6-.1.6-.4 0-.3-.2-.4-.5-.4h-.5v.8h.4z" style="fill:#19234d"></path></svg> </a> </div> <div class="NavBar__Right"> <div class="NavBar__MobileGetStarted"> <a href="/get-started">Get Started</a> </div> <div class="NavBar__MainItems"> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="whatWeDo">What We Do</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="howWeDo">How We Do It</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="resources">Resources</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="company">Company</div> </div> <div class="NavBar__ButtonSubtleTriggerContainer"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleTrigger" data-nav="partners">Partners</div> </div> </div> <div class="NavBar__SecondaryItems"> <div class="NavBar__ButtonSubtleTriggerContainer NavBar__ButtonSubtleTriggerContainer--HideMobile"> <div class="NavBar__ButtonSubtle NavBar__ButtonSubtleSearchIcon NavBar__ButtonSubtleTrigger" data-nav="search"> <svg data-name="New Layer" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" style="width: 26px;"><ellipse cx="12.18" cy="12.42" rx="10.18" ry="10.42" fill="none" stroke="#000" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2.5"></ellipse><path fill="none" stroke="#000" stroke-linecap="round" stroke-miterlimit="10" stroke-width="2.5" d="M20.45 20.23L30 30"></path></svg> </div> </div> <div class="NavBar__ButtonGetStarted"> <div id="NavBar__Button-GetStarted" class="NavBar__ButtonSubtleTrigger NavBar__Button" data-nav="getStarted"> Get Started <svg class="NavBar__Button--Close" xmlns="http://www.w3.org/2000/svg" width="17.081" height="7.498" viewBox="0 0 17.081 7.498"> <path id="Path_34" data-name="Path 34" d="M1156.073,389.624l7.959,5.685,7.959-5.685" transform="translate(-1155.492 -388.811)" fill="none" stroke="#fff" stroke-linejoin="round" stroke-width="2"/> </svg> </div> </div> <button class="NavBar__MobileNavicon" data-mobile-nav-toggle> <span class="navicon"></span> </button> </div> </div> </div> <div class="NavBar__MobileDropdown" data-mobile-nav> <div class="NavBar__MobileButtons"> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="whatWeDo"> What we do <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="howWeDo"> How we do it <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="resources"> Resources <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="company"> Company <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> <div class="NavBar__MobileButton NavBar__ButtonSubtleTrigger" data-nav="partners"> Partners <svg width="8" height="12" viewBox="0 0 8 12" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M0.220703 10.4023L4.62305 6L0.220703 1.59766L1.56836 0.25L7.31836 6L1.56836 11.75L0.220703 10.4023Z" fill="#3C2B77"/> </svg> </div> </div> <div class="NavBar__MobileCTA"> <a href="/get-started" class="NavBar__MobileCTAButton">Get Started</a> </div> </div> </div> <!-- WHAT WE DO --> <div class="WhatWeDo NavBar__SubMenu" data-menu="whatWeDo"> <div class="WhatWeDo__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">What We Do</div> </div> <div class="WhatWeDo__Content"> <div class="WhatWeDo__Links"> <h6>ESENTIRE SERVICES</h6> <a href="/what-we-do/esentire-managed-detection-and-response" class="WhatWeDo__LinksIconBox WhatWeDo__LinksIconBox--WithSubLinks"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/mdr_nav_1.png" alt="MDR Icon"> <div> <h5>Managed Detection and Response</h5> <p>Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.</p> </div> </a> <div class="WhatWeDo__LinksIconBoxInner"> <a href="/what-we-do/esentire-managed-detection-and-response"> <h5>All-In-One MDR Solution →</h5> </a> <a href="/what-we-do/esentire-managed-detection-and-response/microsoft-mdr"> <h5>MDR for Microsoft →</h5> </a> <a href="/what-we-do/esentire-managed-detection-and-response/mdr-for-genai"> <h5>MDR for GenAI →</h5> </a> </div> <a href="/what-we-do/digital-forensics-and-incident-response" class="WhatWeDo__LinksIconBox"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/dfir_nav_1.png" alt="DFIR Icon"> <div> <h5>Digital Forensics and Incident Response</h5> <p>Get unlimited Incident Response with threat suppression guarantee - anytime, anywhere.</p> </div> </a> <a href="/what-we-do/exposure-vulnerability-and-risk-management" class="WhatWeDo__LinksIconBox"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/exposure_nav_1.png" alt="Exposure Vulnerability and Risk Management Icon"> <div> <h5>Exposure Management Services</h5> <p>Cyber risk and advisory programs that identify security gaps and build security strategies to address them.</p> </div> </a> </div> <div class="WhatWeDo__Links"> <h6>PLATFORM, PEOPLE AND RESPONSE</h6> <div class="WhatWeDo__LinksBox"> <div class="WhatWeDo__LinksBoxLeft"> <a href="/what-we-do/security-operations-center"> <h5>Security Operations Center (SOC)</h5> <p>24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.</p> </a> <a href="/what-we-do/xdr-extended-detection-and-response"> <h5>Extended Detection and<br> Response (XDR)</h5> <p>XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.</p> </a> <a href="/what-we-do/mdr-integrations"> <h5>Technology Integrations</h5> <p>Seamless integration and threat investigation across your existing tech stack.</p> </a> </div> <div class="WhatWeDo__LinksBoxRight"> <a href="/what-we-do/threat-response-unit"> <h5>Threat Response Unit (TRU)</h5> <p>Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.</p> </a> <a href="/what-we-do/cyber-resilience-team"> <h5>Cyber Resilience Team</h5> <p>Extend your team capabilities and prevent business disruption with expertise from eSentire.</p> </a> <a href="/what-we-do/esentire-managed-detection-and-response/response-and-remediation"> <h5>Response and Remediation</h5> <p>We balance automated blocks with rapid human-led investigations to manage threats.</p> </a> </div> </div> </div> </div> </div> </div> <!-- HOW WE DO IT --> <div class="HowWeDo NavBar__SubMenu" data-menu="howWeDo"> <div class="HowWeDo__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">How We Do</div> </div> <div class="HowWeDo__Content"> <div class="HowWeDo__Links HowWeDo__Links-Icons"> <h6>24/7 MDR SIGNALS</h6> <a href="/how-we-do-it/signals/mdr-for-endpoint"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 58 58"><defs><style>.cls-endpointherosv1{fill:#fff}</style></defs><g id="Layer_2"><g id="Layer_2-2"><g id="Component_2459_7"><path id="Path_5133" d="M29 0c16 0 29 13 29 29S45 58 29 58 0 45 0 29 13 0 29 0Z" style="fill:#7f4ee5"/><g id="Group_1494"><g id="Group_1493"><path id="Path_5109" d="M45 38.6c-.4 0-.8-.4-.8-.8V16.7c0-.2-.2-.4-.4-.4H14.3c-.2 0-.4.2-.4.4v21.1c0 .4-.3.8-.7.9s-.8-.3-.9-.7V16.7c0-1.1.9-2 2-2h29.5c1.1 0 2 .9 2 2v21.1c0 .4-.4.8-.8.8" class="cls-endpointherosv1"/><path id="Path_5110" d="M24.1 38.6H10.6c-.4 0-.8-.4-.7-.9 0-.4.3-.7.7-.7h13.5c.4 0 .8.3.9.7s-.3.8-.7.9h-.2" class="cls-endpointherosv1"/><path id="Path_5111" d="M47.4 38.6H33.9c-.4 0-.8-.4-.7-.9 0-.4.3-.7.7-.7h13.5c.4 0 .8.3.9.7s-.3.8-.7.9h-.2" class="cls-endpointherosv1"/><path id="Path_5112" d="M46.1 43.4H11.9c-1.1 0-2-.9-2-2v-3.6c0-.4.3-.8.7-.9s.8.3.9.7v3.8c0 .2.2.4.4.4h34.3c.2 0 .4-.2.4-.4v-3.6c0-.4.4-.8.9-.7.4 0 .7.3.7.7v3.6c0 1.1-.9 2-2 2" class="cls-endpointherosv1"/><path id="Path_5113" d="M33.8 40.2h-9.6c-.4 0-.8-.4-.8-.8v-1.6c0-.4.3-.8.7-.9s.8.3.9.7v1h8v-.8c0-.4.4-.8.9-.7.4 0 .7.3.7.7v1.6c0 .4-.4.8-.8.8" class="cls-endpointherosv1"/><path id="Path_5114" d="M18.6 24.2c-.4 0-.8-.4-.8-.8v-3.2c0-.4.3-.8.7-.9.4 0 .8.3.9.7v3.3c0 .4-.4.8-.8.8" class="cls-endpointherosv1"/></g></g></g></g></g></svg><div> <h5>Endpoint</h5> <p>Guard endpoints by isolating and remediating threats to prevent lateral spread.</p> </div> </a> <a href="/how-we-do-it/signals/mdr-for-network"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 58 58"><defs><path d="M15.6 13.7h26.9v30.7H15.6z" style="fill:none"/><style>.cls-Networkherosv2{fill:#fff}</style></defs><g id="Layer_2"><g id="Layer_2-2"><g id="Component_2459_8"><path id="Path_5133-2" d="M29 0c16 0 29 13 29 29S45 58 29 58 0 45 0 29 13 0 29 0Z" style="fill:#6c67d5"/><g id="Group_1502"><g id="Group_1501"><path id="Path_5139" d="M40.8 44.3H17.3c-.9 0-1.7-.8-1.7-1.7V15.3c0-.9.8-1.7 1.7-1.7h23.5c.9 0 1.7.8 1.7 1.7v27.3c0 .9-.8 1.7-1.7 1.7M17.2 15.1c-.2 0-.3.1-.3.3v27.3c0 .2.1.3.3.3h23.5c.2 0 .3-.1.3-.3V15.3c0-.2-.1-.3-.3-.3H17.2Z" class="cls-Networkherosv2"/><path id="Path_5140" d="M41.7 24.6H16.2c-.4 0-.7-.3-.7-.7 0-.4.3-.7.7-.7h25.5c.4 0 .7.3.7.7 0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5141" d="M20.1 21.4c-.4 0-.7-.3-.7-.7v-2.5c0-.4.3-.7.7-.7s.7.3.7.7v2.5c0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5142" d="M20.1 31c-.4 0-.7-.3-.7-.7v-2.5c0-.4.3-.7.7-.7s.7.3.7.7v2.5c0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5143" d="M20.1 40.5c-.4 0-.7-.3-.7-.7v-2.5c0-.4.3-.7.7-.7s.7.3.7.7v2.5c0 .4-.3.7-.7.7" class="cls-Networkherosv2"/><path id="Path_5144" d="M41.7 34.8H16.2c-.4 0-.7-.3-.7-.7 0-.4.3-.7.7-.7h25.5c.4 0 .7.3.7.7s-.3.7-.7.7" class="cls-Networkherosv2"/></g></g></g></g></g></svg> <div> <h5>Network</h5> <p>Defend brute force attacks, active intrusions and unauthorized scans.</p> </div> </a> <a href="/how-we-do-it/signals/mdr-for-log"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><path d="M16 0c8.84 0 16 7.16 16 16s-7.16 16-16 16S0 24.84 0 16 7.16 0 16 0Z" style="stroke-width:0;fill:#687dd5"/><path d="M22.16 12.23a.278.278 0 0 0-.07-.23l-4.17-4.17a.235.235 0 0 0-.25-.06c-.03 0-.05-.01-.08-.01H12.4a.476.476 0 0 0-.48.47v13.46a.476.476 0 0 0 .48.48h9.29a.476.476 0 0 0 .48-.48V12.24m-4.18-3.6 3.29 3.29H18V8.64Zm3.66 13.01h-9.21V8.27h5.04v3.91c0 .14.12.26.26.26h3.91v9.22Zm-2.06 2.6h-9.28a.476.476 0 0 1-.48-.48V10.31c0-.26.21-.48.47-.48h.47c.14 0 .26.11.26.26s-.11.26-.26.26h-.43v13.38h9.2v-.44c0-.14.11-.26.26-.26s.26.11.26.26v.48a.476.476 0 0 1-.48.48m.24-4.52c-.14 0-.26-.12-.26-.26v-1.39c0-.14.11-.26.26-.26s.26.11.26.26v1.39c0 .14-.12.26-.26.26" style="fill:#fff;stroke-width:0"/></svg> <div> <h5>Log</h5> <p>Investigation and threat detection across multi-cloud or hybrid environments.</p> </div> </a> <a href="/how-we-do-it/signals/cloud"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><path d="M16 0c8.84 0 16 7.16 16 16s-7.16 16-16 16S0 24.84 0 16 7.16 0 16 0Z" style="stroke-width:0;fill:#40C3D9"/><path d="M20.52 21.64h-9.68c-2.06 0-3.72-1.69-3.72-3.75 0-1.52.93-2.88 2.34-3.45-.02-.2-.04-.39-.04-.59a5.416 5.416 0 0 1 5.34-5.49 5.423 5.423 0 0 1 5.14 3.5h.12c2.69 0 4.86 2.2 4.85 4.89 0 2.42-1.5 4.88-4.35 4.89ZM14.84 8.87c-2.71 0-4.91 2.2-4.91 4.91v.06c0 .24.02.48.06.72.02.12-.05.24-.17.28-1.69.57-2.59 2.4-2.03 4.09a3.204 3.204 0 0 0 3.04 2.19h9.66c2.54 0 3.87-2.21 3.87-4.38 0-2.41-1.94-4.37-4.35-4.38-.09 0-.17 0-.26.02a.262.262 0 0 1-.27-.17c-.67-2-2.55-3.34-4.66-3.34m6.64 8.91v-1.53c0-.14-.11-.25-.25-.25s-.25.11-.25.25v1.53c0 .14.11.25.25.25s.25-.11.25-.25" style="fill:#fff;stroke-width:0"/></svg> <div> <h5>Cloud</h5> <p>Remediate misconfigurations, vulnerabilities and policy violations.</p> </div> </a> <a href="/how-we-do-it/signals/identity"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" data-name="Layer 2" version="1.1" viewBox="0 0 58 58"><defs><clipPath id="clippath"><path d="M12.9 14.8h32.3v28.5H12.9z" style="stroke-width:0;fill:none"/></clipPath><style>.clsInsider-threat-4{stroke-width:0;fill:#fff}</style></defs><g id="Layer_2-2" data-name="Layer 2-2"><g id="Component_2459_11" data-name="Component 2459 11"><path id="Path_5133-5" d="M29 0c16 0 29 13 29 29S45 58 29 58 0 45 0 29 13 0 29 0Z" data-name="Path 5133-5" style="fill:#2cb1e2;stroke-width:0"/><g id="Group_1790" data-name="Group 1790" style="clip-path:url(#clippath)"><g id="Group_1789" data-name="Group 1789"><path id="Path_5151" d="M43.4 43.2H14.6c-1 0-1.8-.8-1.8-1.8V20.7c0-1 .8-1.8 1.8-1.8h28.7c1 0 1.8.8 1.8 1.8v20.7c0 1-.8 1.8-1.8 1.8M14.6 20.5c-.2 0-.3.1-.3.3v20.7c0 .2.1.3.3.3h28.7c.2 0 .3-.1.3-.3V20.8c0-.2-.1-.3-.3-.3H14.6Z" class="clsInsider-threat-4" data-name="Path 5151"/><path id="Path_5152" d="M44.4 29.2H13.6c-.4 0-.7-.3-.7-.7s.3-.7.7-.7h30.8c.4 0 .7.3.7.7s-.3.7-.7.7" class="clsInsider-threat-4" data-name="Path 5152"/><path id="Path_5153" d="M34.4 20.5c-.4 0-.7-.3-.7-.7v-2.1c0-.8-.6-1.4-1.4-1.4h-6.4c-.8 0-1.4.6-1.4 1.4v2.1c0 .4-.3.7-.7.7s-.7-.3-.7-.7v-2.1c0-1.6 1.3-2.9 2.9-2.9h6.4c1.6 0 2.9 1.3 2.9 2.9v2.1c0 .4-.3.7-.7.7" class="clsInsider-threat-4" data-name="Path 5153"/><path id="Path_5154" d="M29 26.4c-.4 0-.7-.3-.7-.7V23c0-.4.3-.7.7-.7s.7.3.7.7v2.7c0 .4-.3.7-.7.7" class="clsInsider-threat-4" data-name="Path 5154"/></g></g></g></g></svg> <div> <h5>Identity</h5> <p>Investigate and respond to compromised identities and insider threats.</p> </div> </a> </div> <div class="HowWeDo__RightLinks"> <div class="HowWeDo__Links"> <h6>INDUSTRIES</h6> <a href="/how-we-do-it/industries/insurance-cybersecurity"> <h5>Insurance</h5> </a> <a href="/how-we-do-it/industries/construction-cybersecurity"> <h5>Construction</h5> </a> <a href="/how-we-do-it/industries/financial-services-cybersecurity"> <h5>Finance</h5> </a> <a href="/how-we-do-it/industries/legal-cybersecurity"> <h5>Legal</h5> </a> <a href="/how-we-do-it/industries/manufacturing-cybersecurity"> <h5>Manufacturing</h5> </a> <a href="/how-we-do-it/industries/private-equity-cybersecurity"> <h5>Private Equity</h5> </a> <a href="/how-we-do-it/industries/healthcare-cybersecurity"> <h5>Healthcare</h5> </a> <a href="/how-we-do-it/industries/retail-cybersecurity"> <h5>Retail</h5> </a> <a href="/how-we-do-it/industries/food-supply-cybersecurity"> <h5>Food Supply</h5> </a> <a href="/how-we-do-it/industries/state-local-governments-cybersecurity"> <h5>Government and Education</h5> </a> <a href="/how-we-do-it/industries/automotive-dealerships"> <h5>Automotive Dealerships</h5> </a> </div> <div class="HowWeDo__Links"> <h6>USE CASES</h6> <div class="HowWeDo__Links-2"> <a href="/how-we-do-it/use-cases/ransomware"> <h5>Ransomware</h5> <p>Stop ransomware before it spreads.</p> </a> <a href="/how-we-do-it/use-cases/cybersecurity-compliance"> <h5>Cybersecurity Compliance</h5> <p>Meet regulatory compliance mandates.</p> </a> <a href="/how-we-do-it/use-cases/zero-day-exploits"> <h5>Zero Day Attacks</h5> <p>Detect and respond to zero-day exploits.</p> </a> <a href="/how-we-do-it/use-cases/cloud-misconfiguration-breaches"> <h5>Cloud Misconfiguration</h5> <p>End misconfigurations and policy violations.</p> </a> <a href="/how-we-do-it/use-cases/third-party-cyber-risk"> <h5>Third-Party Risk</h5> <p>Defend third-party and supply chain risk.</p> </a> <a href="/how-we-do-it/use-cases/mdr-outsourcing"> <h5>Do More With Less</h5> <p>Prevent disruption by outsourcing MDR.</p> </a> <a href="/how-we-do-it/use-cases/cyber-risk-management"> <h5>Cyber Risk</h5> <p>Adopt a risk-based security approach.</p> </a> <a href="/how-we-do-it/use-cases/meet-cyber-insurance-requirements"> <h5>Cyber Insurance</h5> <p>Meet insurability requirements with MDR.</p> </a> <a href="/how-we-do-it/use-cases/sensitive-data"> <h5>Sensitive Data Security</h5> <p>Protect your most sensitive data.</p> </a> <a href="/how-we-do-it/use-cases/security-leadership"> <h5>Security Leadership</h5> <p>Build a proven security program.</p> </a> <a href="/how-we-do-it/use-cases/cyber-threat-intelligence"> <h5>Cyber Threat Intelligence</h5> <p>Operationalize timely, accurate, and actionable cyber threat intelligence.</p> </a> </div> </div> </div> </div> <div class="HowWeDo__Box"> <div class="HowWeDo__BoxInner"> <div class="HowWeDo__BoxLeft"> <div class="HowWeDo__Links"> <a href="/how-we-do-it/mdr-pricing-packaging"> <h5>MDR Pricing</h5> <p>Three MDR package tiers are available based on per-user pricing and level of risk tolerance to enhance your existing defenses and resources.</p> </a> </div> </div> <div class="HowWeDo__BoxRight"> <a href="/how-we-do-it/mdr-pricing-packaging">EXPLORE MDR PACKAGES <span>→</span></a> </div> </div> </div> </div> </div> <!-- Resources --> <div class="Resources NavBar__SubMenu" data-menu="resources"> <div class="Resources__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Resources</div> </div> <div class="Resources__Content"> <div class="Resources__BlogResources"> <div class="Resources__Links Resources__Links-Blogs"> <div> <h6>From The Blog</h6> <a href="https://www.esentire.com/blog/unraveling-the-many-stages-and-techniques-used-by-redcurl-earthkapre-apt"> <span class="Resources__Eyebrow">Feb 13, 2025</span> <h5>Unraveling the Many Stages and Techniques Used by RedCurl/EarthKapre APT </h5> </a> <a href="https://www.esentire.com/blog/deepseek-ai-what-security-leaders-need-to-know-about-its-security-risks"> <span class="Resources__Eyebrow">Feb 11, 2025</span> <h5>DeepSeek AI: What Security Leaders Need to Know About Its Security Risks </h5> </a> <a href="https://www.esentire.com/blog/threat-actors-use-cve-2019-18935-to-deliver-reverse-shells-and-juicypotatong-privilege-escalation-tool"> <span class="Resources__Eyebrow">Jan 29, 2025</span> <h5>Threat Actors Use CVE-2019-18935 to Deliver Reverse Shells and…</h5> </a> </div> <div class="Resources__BoxCTA"> <a href="/resources/blog"> VIEW ARTICLES <span>→</span> </a> </div> </div> <div class="Resources__Links"> <div class="Resources__Links Resources__Links-Library"> <h6>Resources</h6> <a href="/resources/mdr-and-cybersecurity-case-studies"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsCaseStudiesIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1940"><circle id="Ellipse_16" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1906"><path id="Path_5883" d="M20.3 22.37c-1.12 0-2.03-.91-2.03-2.03 0-1.12.91-2.03 2.03-2.03s2.03.91 2.03 2.03c0 1.12-.91 2.03-2.03 2.03m0-3.47c-.8 0-1.44.64-1.44 1.44s.64 1.44 1.44 1.44 1.44-.64 1.44-1.44c0-.79-.65-1.44-1.44-1.44" class="clsCaseStudiesIcon-2"/><path id="Path_5884" d="M22.62 22.95c-.08 0-.15-.03-.21-.09l-1.09-1.09c-.1-.14-.06-.32.07-.42.1-.07.24-.07.35 0l1.09 1.09a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08" class="clsCaseStudiesIcon-2"/><path id="Path_5885" d="M17.41 22.95h-5.48c-.33 0-.6-.27-.6-.6V9.65c0-.33.27-.6.6-.6h5.78c.16-.03.32.08.35.24s-.08.32-.24.35H11.95v12.71h5.48c.16-.03.32.08.35.24s-.08.32-.24.35h-.1" class="clsCaseStudiesIcon-2"/><path id="Path_5886" d="M21.46 17.45c-.17 0-.3-.13-.3-.3V13.1c-.03-.16.08-.32.24-.35.16-.03.32.08.35.24V17.14c0 .17-.13.3-.3.3" class="clsCaseStudiesIcon-2"/><path id="Path_5887" d="M21.46 13.4H17.7c-.17 0-.3-.13-.3-.3V9.34c0-.17.15-.29.31-.29.07 0 .13.03.19.08l3.76 3.76a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08m-3.46-.59h2.75l-2.75-2.75v2.75Z" class="clsCaseStudiesIcon-2"/></g></g></svg> <h5>Case Studies</h5> </a> <a href="/resources/tru-intelligence-center"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32"><defs><clipPath id="a"><path d="M8 7h15.75v18.17H8z" style="stroke-width:0;fill:none"/></clipPath></defs><circle cx="16" cy="16" r="16" style="fill:#19234d;stroke-width:0"/><g style="clip-path:url(#a)"><path d="M15.5 21.37h1.25v.4H15.5v-.4Zm4.78-.02v.44h1.27v1.69h.44v-1.69h.37v.88h.44v-.88h.37v1.31h.44v-1.31h.14v-.44h-3.47Zm-8.27 0h-1.47a.844.844 0 0 0-1.49-.79c-.03.05-.05.11-.07.17-.46-.08-.9.23-.98.69a.849.849 0 0 0 .98.98c.12.45.58.72 1.03.59s.72-.58.59-1.03a.865.865 0 0 0-.07-.17H12v-.44Zm5.46 1.95a5.85 5.85 0 0 1-.82 1.59c-.12.17-.31.27-.52.28-.21 0-.41-.11-.53-.28a5.85 5.85 0 0 1-.82-1.59c.09 0 .17-.03.26-.06.38-.16.63-.54.61-.96h.95c-.01.42.23.8.61.96.08.03.17.05.26.06m-1.2-4.36-.33 1.8h-.3a.908.908 0 0 0-.54-.93c-.38-.12-.79-.14-1.18-.06 0 0-.36-.9-.94-2.77-.35-1.1-.54-2.25-.56-3.41.39.46.97.71 1.57.67.69.02 1.38-.15 1.97-.51l-.9 2.36.95-.15-.55 3.15.81-.15Zm3-1.96c-.58 1.87-.94 2.77-.94 2.77-.39-.08-.8-.06-1.18.06-.33.14-.55.47-.54.84v.09h-.37l.93-2.66-.95.15.97-3.15-1.19.13.3-1.46c.59.35 1.27.52 1.95.5.6.05 1.19-.2 1.57-.67-.02 1.16-.21 2.31-.56 3.41m-.28 2.98c1.12-2.28 1.7-4.78 1.71-7.31 0 0 2.81 3.66-1.71 7.31m-5.71 0c-4.52-3.66-1.72-7.32-1.72-7.32 0 2.54.59 5.04 1.71 7.31m5.72-12.02-.07.03c-.99.3-1.92.8-2.72 1.47l-.02.03-.02-.03a8.165 8.165 0 0 0-2.82-1.5l-.08-.03s.1-.09.25-.19c.79-.48 1.7-.73 2.63-.73 1 0 1.97.32 2.79.9l.07.05ZM13.03 20.8v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.08 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.07 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m2.6 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.08 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m1.07 0v1.48c.01.19-.13.36-.32.38a.363.363 0 0 1-.38-.32v-1.53c-.01-.19.13-.36.32-.38.19-.01.36.13.38.32v.05m.5-10c-.11-.73-.31-1.45-.59-2.14l-.02-.03c.14-.22.27-.46.38-.7l-.06-.04c-.48.41-1.01.75-1.58 1.02-.88.3-1.69.77-2.38 1.39-.04.03-.09.03-.13 0-.68-.6-1.46-1.06-2.32-1.35-.59-.28-1.14-.63-1.64-1.06l-.05.04c.1.23.22.45.36.66l-.02.03c-.24.64-.42 1.3-.53 1.98s0 .03 0 .04a2.238 2.238 0 0 0 2.17 2.75c.47.02.93-.13 1.28-.44-.15-.32-.26-.66-.33-1.01-.21.21-.51.32-.81.3-.74 0-1.34-.6-1.34-1.34.01-.47.1-.94.25-1.39.23.27.47.53.74.77a.59.59 0 0 0 .06.84.59.59 0 0 0 .92-.18c.24.13.47.26.68.39.03.64.24 1.27.62 1.79l.02.03.02-.03c.38-.52.59-1.15.62-1.79.21-.14.45-.27.7-.4.14.3.5.42.79.28s.42-.5.28-.79c-.03-.05-.06-.1-.1-.15.26-.23.5-.49.72-.76.15.45.23.92.25 1.39 0 .74-.6 1.34-1.34 1.34-.3.02-.6-.09-.81-.3-.07.35-.18.68-.33 1.01.36.3.82.46 1.28.44a2.232 2.232 0 0 0 2.2-2.59" style="fill:#fff;stroke-width:0"/></g></svg> <h5>TRU Intelligence Center</h5> </a> <a href="/cybersecurity-tools"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsDisplayCybersecurityIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1934"><circle id="Ellipse_47" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1911"><path id="Path_6011" d="M12.47 13.21h-1.43a.26.26 0 0 1-.17-.07l-1.8-1.8a.23.23 0 0 1 0-.34l1.47-1.43c.09-.09.25-.09.34 0l1.76 1.77s.07.11.07.17v1.47c0 .13-.11.24-.24.24m-1.33-.49h1.09V11.6l-1.52-1.52-1.12 1.09 1.56 1.56Z" class="clsDisplayCybersecurityIcon-2"/><g id="Group_1910"><path id="Path_6012" d="M15.11 15.86a.26.26 0 0 1-.17-.07l-2.64-2.64c-.09-.1-.09-.25.01-.34.09-.09.24-.09.33 0l2.64 2.64c.09.09.09.25 0 .34-.05.05-.11.07-.17.07" class="clsDisplayCybersecurityIcon-2"/><path id="Path_6013" d="M12.21 23.51c-.36 0-.72-.06-1.07-.17a.24.24 0 0 1-.1-.4l1.28-1.28-.74-.74s-.02-.02-.03-.04l-.7-.7-1.29 1.28c-.1.09-.25.09-.34 0a.207.207 0 0 1-.06-.1c-.36-1.02-.12-2.15.62-2.94a2.18 2.18 0 0 1 2.64-.46l5.04-5.03c-.47-.88-.28-1.96.46-2.63.79-.75 1.93-1 2.97-.65a.24.24 0 0 1 .1.4l-1.28 1.28.74.74.03.03.71.71 1.29-1.28c.1-.09.25-.09.34 0 .03.03.05.06.06.1.33 1.06.06 2.22-.7 3.03-.69.68-1.75.83-2.6.37l-5.04 5.03c.48.89.31 2-.42 2.71-.51.49-1.19.76-1.9.74m-.53-.53c.74.17 1.51-.04 2.07-.55.62-.61.73-1.57.26-2.3a.26.26 0 0 1 .04-.29l5.28-5.28c.08-.07.19-.09.28-.04.69.44 1.59.35 2.19-.21.54-.57.79-1.35.67-2.13l-1.15 1.15c-.09.09-.25.09-.34 0l-.91-.91-.03-.03-.88-.88c-.09-.09-.1-.25 0-.34l1.15-1.15c-.75-.13-1.52.1-2.07.63-.63.56-.76 1.5-.3 2.22.05.09.03.21-.04.29l-5.28 5.28a.23.23 0 0 1-.28.04 1.74 1.74 0 0 0-2.23.3c-.52.54-.74 1.31-.6 2.04l1.16-1.15c.09-.09.25-.09.34 0l.91.91s.02.02.03.04l.88.88c.09.09.1.25 0 .34l-1.15 1.15Z" class="clsDisplayCybersecurityIcon-2"/><path id="Path_6014" d="M20.99 23.49a.26.26 0 0 1-.17-.07l-4.11-4.11s-.03-.04-.05-.06l-.59-1.17a.23.23 0 0 1 .05-.28l1.17-1.17c.07-.07.19-.09.28-.04l1.17.59s.04.03.06.04l4.11 4.11c.09.09.09.25 0 .34l-1.76 1.76s-.11.07-.17.07m-3.9-4.5 3.91 3.91 1.42-1.42-3.91-3.91-.98-.49-.93.93.49.98Z" class="clsDisplayCybersecurityIcon-2"/></g></g></g></svg> <h5>Cybersecurity Tools</h5> </a> <a href="/resources/video-library"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsVicoIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1935"><circle id="Ellipse_43" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1912"><path id="Path_6009" d="M16.15 22.9C12.2 22.9 9 19.7 9 15.75s3.2-7.15 7.15-7.15 7.15 3.2 7.15 7.15-3.2 7.15-7.15 7.15m0-13.83c-3.68 0-6.67 2.99-6.67 6.67s2.99 6.67 6.67 6.67 6.67-2.99 6.67-6.67c0-3.68-2.99-6.67-6.67-6.67" class="clsVicoIcon-2"/><path id="Path_6010" d="M14.35 18.99c-.13 0-.24-.11-.24-.24v-6.01a.243.243 0 0 1 .36-.21l5.11 3.01c.11.07.15.22.08.33-.02.04-.05.06-.08.08l-5.11 3s-.08.03-.12.03m.24-5.82v5.17l4.39-2.58-4.39-2.58Z" class="clsVicoIcon-2"/></g></g></svg> <h5>Videos</h5> </a> <a href="/resources/library?resourceType%5B%5D=Report"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsReportIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1936"><circle id="Ellipse_44" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1895"><path id="Path_5961" d="M21.42 22.95h-9.24c-.33 0-.6-.27-.6-.6V9.65c0-.33.27-.6.6-.6h5.77c.16-.03.32.08.35.24.03.16-.08.32-.24.35H12.19v12.71h9.24v-9.26c-.03-.16.08-.32.24-.35s.32.08.35.24v9.35c0 .33-.27.59-.59.59" class="clsReportIcon-2"/><path id="Path_5962" d="M21.71 13.4h-3.76c-.17 0-.3-.13-.3-.3V9.34c0-.17.15-.29.31-.29.07 0 .13.03.19.08l3.76 3.76a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08m-3.46-.59h2.75l-2.75-2.75v2.75Z" class="clsReportIcon-2"/><path id="Path_5963" d="M16.79 21.21c-1.92 0-3.48-1.56-3.48-3.48s1.56-3.48 3.48-3.48 3.48 1.56 3.48 3.48-1.56 3.48-3.48 3.48m0-6.36c-1.59 0-2.89 1.29-2.89 2.89s1.29 2.89 2.89 2.89 2.89-1.29 2.89-2.89c0-1.59-1.29-2.89-2.89-2.89" class="clsReportIcon-2"/><path id="Path_5964" d="M19.98 18.03H16.8c-.17 0-.3-.13-.3-.3v-3.18c.03-.16.18-.27.35-.24.12.02.22.12.24.24v2.89h2.89c.16-.03.32.08.35.24.03.16-.08.32-.24.35h-.1" class="clsReportIcon-2"/><path id="Path_5965" d="M14.67 20.15c-.17 0-.29-.15-.29-.31 0-.07.03-.13.08-.19l2.12-2.12c.1-.14.28-.17.42-.07.14.1.17.28.07.42-.02.03-.04.05-.07.07l-2.12 2.12c-.06.05-.13.09-.21.09" class="clsReportIcon-2"/></g></g></svg> <h5>Reports</h5> </a> <a href="/resources/library?resourceType%5B%5D=Webinar"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsWebinarIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1937"><path id="Path_6008" d="M16 0c8.84 0 16 7.16 16 16s-7.16 16-16 16S0 24.84 0 16 7.16 0 16 0Z" style="stroke-width:0;fill:#19234d"/><g id="Group_1896"><path id="Path_5966" d="M15.95 11.33c-.17 0-.3-.13-.3-.3V9.29c.03-.16.18-.27.35-.24.12.02.22.12.24.24v1.74c0 .17-.13.3-.3.3" class="clsWebinarIcon-2"/><path id="Path_5967" d="M20 22.9c-.1 0-.19-.05-.24-.13l-1.83-2.6a.29.29 0 0 1 0-.42.29.29 0 0 1 .42 0c.03.02.05.05.06.09l1.83 2.6a.307.307 0 0 1-.25.47" class="clsWebinarIcon-2"/><path id="Path_5968" d="M11.9 22.9c-.17 0-.3-.14-.29-.31 0-.06.02-.11.05-.16l1.83-2.6c.07-.15.25-.22.4-.14.15.07.22.25.14.4-.01.03-.04.06-.06.09l-1.83 2.6c-.06.08-.15.13-.24.12" class="clsWebinarIcon-2"/><path id="Path_5969" d="M21.73 20.29H10.16c-.17 0-.3-.13-.3-.3v-8.68c-.03-.16.08-.32.24-.35s.32.08.35.24v8.48h10.99v-.86c-.03-.16.08-.32.24-.35s.32.08.35.24v1.26c0 .17-.13.3-.3.3" class="clsWebinarIcon-2"/><path id="Path_5970" d="M21.73 15.38c-.17 0-.3-.13-.3-.3v-3.76c-.03-.16.08-.32.24-.35s.32.08.35.24v3.86c0 .17-.13.3-.3.3" class="clsWebinarIcon-2"/><path id="Path_5971" d="M22.6 11.33H9.3a.299.299 0 0 1-.24-.35c.02-.12.12-.22.24-.24h13.3c.16.03.27.18.24.35-.02.12-.12.22-.24.24" class="clsWebinarIcon-2"/><path id="Path_5972" d="M22.6 17.4s-.07 0-.1-.02l-8.1-2.89a.306.306 0 0 1-.11-.41c.06-.11.19-.17.31-.15l8.1 2.89c.15.07.22.25.15.4-.04.1-.14.17-.25.18" class="clsWebinarIcon-2"/></g></g></svg> <h5>Webinars</h5> </a> <a href="/resources/library?resourceType%5B%5D=Data%20Sheet%20/%20Solution%20Brief"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsdatasheetIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1938"><circle id="Ellipse_46" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/><g id="Group_1893"><path id="Path_5952" d="M20.84 22.9H11.6c-.33 0-.6-.27-.6-.6V9.6c0-.33.27-.6.6-.6h5.77c.16-.03.32.08.35.24.03.16-.08.32-.24.35H11.61v12.72h9.24v-9.25c-.03-.16.08-.32.24-.35s.32.08.35.24v9.35c0 .33-.27.59-.59.59" class="clsdatasheetIcon-2"/><path id="Path_5953" d="M21.13 13.35h-3.76c-.17 0-.3-.13-.3-.3V9.29c0-.17.15-.29.31-.29.07 0 .13.03.19.08l3.76 3.76a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08m-3.46-.59h2.75L17.66 10v2.75Z" class="clsdatasheetIcon-2"/><path id="Path_5954" d="M17.46 16.06c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.45c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5955" d="M16.3 18.66c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.45c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5956" d="M13.7 20.1c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.44c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5957" d="M18.9 21.26c-.56 0-1.02-.46-1.02-1.02s.46-1.02 1.02-1.02 1.02.46 1.02 1.02-.46 1.02-1.02 1.02m0-1.44c-.24 0-.43.19-.43.43s.19.43.43.43.43-.19.43-.43-.19-.43-.43-.43" class="clsdatasheetIcon-2"/><path id="Path_5958" d="M18.39 20.03c-.08 0-.15-.03-.21-.09l-1.58-1.58a.294.294 0 0 1-.07-.42c.1-.14.28-.17.42-.07.03.02.05.04.07.07l1.58 1.58a.3.3 0 0 1-.02.42c-.05.05-.12.07-.19.08" class="clsdatasheetIcon-2"/><path id="Path_5959" d="M14.33 19.03c-.17 0-.29-.15-.28-.32 0-.1.06-.19.14-.24l1.34-.74a.3.3 0 0 1 .28.52l-1.34.74s-.09.04-.14.04" class="clsdatasheetIcon-2"/><path id="Path_5960" d="M16.58 17.27s-.08 0-.12-.03a.301.301 0 0 1-.15-.39l.58-1.28c.09-.14.28-.17.42-.08.1.07.15.2.12.32l-.58 1.28c-.05.11-.15.17-.27.17" class="clsdatasheetIcon-2"/></g></g></svg> <h5>Data Sheets</h5> </a> <a href="/esentire-mdr-vs-everyone"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 32 32"><defs><style>.clsRealVsFakeIcon-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1933"><g id="Group_1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" style="stroke-width:0;fill:#19234d"/></g><g id="Group_1924"><path id="Path_6040" d="M16.15 17.96c-.18 0-.32-.15-.32-.32 0-.15.11-.28.25-.31.04 0 1.05-.26 1.13-1.86-.45-.2-.88-.46-1.27-.77-.14-.11-.16-.31-.05-.45s.31-.16.45-.05c.39.31.83.56 1.3.74.13.04.22.16.22.3 0 2.34-1.58 2.69-1.65 2.7h-.06" class="clsRealVsFakeIcon-2"/><path id="Path_6041" d="M16.15 17.96h-.06c-.07-.01-1.65-.36-1.65-2.7 0-.14.09-.26.22-.3.47-.18.91-.43 1.3-.74.14-.11.34-.09.45.05s.09.34-.05.45c-.39.31-.82.56-1.27.77.09 1.63 1.12 1.86 1.13 1.86.17.04.28.21.25.38-.03.15-.16.25-.31.25" class="clsRealVsFakeIcon-2"/><path id="Path_6042" d="M10.38 21.55c-.18 0-.32-.14-.32-.32 0-.08.03-.16.09-.22l3.54-3.54c.13-.12.33-.12.45.01.12.12.12.32 0 .44l-3.54 3.54c-.06.06-.14.09-.23.09" class="clsRealVsFakeIcon-2"/><path id="Path_6043" d="M13.96 20.69c-.18 0-.32-.14-.32-.32v-2.36h-2.36c-.18 0-.33-.12-.34-.3s.12-.33.3-.34h2.72c.18 0 .32.14.32.32v2.68c0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6044" d="M18.18 14.14c-.18 0-.32-.14-.32-.32 0-.08.03-.16.09-.22l3.54-3.54c.13-.12.33-.12.45.01.12.12.12.32 0 .44l-3.54 3.54c-.06.06-.14.09-.23.09" class="clsRealVsFakeIcon-2"/><path id="Path_6045" d="M20.72 14.28h-2.68c-.18 0-.32-.14-.32-.32v-2.68c0-.18.12-.33.3-.34.18 0 .33.12.34.3v2.4h2.36c.18 0 .33.12.34.3 0 .18-.12.33-.3.34h-.04" class="clsRealVsFakeIcon-2"/><path id="Path_6046" d="M16 25.03c-.18 0-.32-.14-.32-.32v-1.74c0-.18.12-.33.3-.34.18 0 .33.12.34.3v1.78c0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6047" d="M16 9.35c-.18 0-.32-.14-.32-.32V7.29c0-.18.12-.33.3-.34.18 0 .33.12.34.3v1.78c0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6048" d="M24.71 16.32h-1.74c-.18 0-.33-.12-.34-.3s.12-.33.3-.34h1.78c.18 0 .33.12.34.3s-.12.33-.3.34h-.04" class="clsRealVsFakeIcon-2"/><path id="Path_6049" d="M9.03 16.32H7.29c-.18 0-.33-.12-.34-.3s.12-.33.3-.34h1.78c.18 0 .33.12.34.3s-.12.33-.3.34h-.04" class="clsRealVsFakeIcon-2"/><path id="Path_6050" d="M9.72 18.97a.32.32 0 0 1-.29-.19c-1.53-3.63.18-7.82 3.81-9.35 1.77-.75 3.77-.75 5.54 0 .17.06.25.24.19.41-.06.17-.24.25-.41.19 0 0-.02 0-.03-.01-3.31-1.4-7.12.15-8.52 3.46a6.53 6.53 0 0 0 0 5.06c.07.16 0 .35-.17.42-.04.02-.08.02-.12.03" class="clsRealVsFakeIcon-2"/><path id="Path_6051" d="M16 23.14c-.95 0-1.9-.19-2.77-.56a.315.315 0 0 1-.19-.41c.06-.17.24-.25.41-.19 0 0 .02 0 .03.01a6.499 6.499 0 0 0 8.66-8.15.31.31 0 0 1 .22-.39c.15-.04.31.03.38.18 1.31 3.72-.64 7.8-4.36 9.11-.76.27-1.56.41-2.37.41" class="clsRealVsFakeIcon-2"/><path id="Path_6052" d="M12.21 15.94c-.18 0-.32-.14-.32-.32a3.73 3.73 0 0 1 3.73-3.73c.18 0 .31.16.3.34 0 .16-.14.29-.3.3-1.71 0-3.09 1.38-3.09 3.09 0 .18-.14.32-.32.32" class="clsRealVsFakeIcon-2"/><path id="Path_6053" d="M16.38 20.11c-.18 0-.31-.16-.3-.34 0-.16.14-.29.3-.3 1.71 0 3.09-1.38 3.09-3.09 0-.18.12-.33.3-.34.18 0 .33.12.34.3v.04a3.73 3.73 0 0 1-3.73 3.73" class="clsRealVsFakeIcon-2"/></g></g></svg> <h5>Real vs. Fake MDR</h5> </a> <a href="/esentire-mdr-vs-everyone/compare"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" version="1.1" viewBox="0 0 32 32"><defs><style>.cls-Comparison-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_1933" data-name="Group 1933"><g id="Group_1932" data-name="Group 1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" data-name="Ellipse 48" style="stroke-width:0;fill:#19234d"/></g><path d="M18.2 18.2c.2 0 .3-.1.3-.3v-7.1h3v7.1c0 .2.1.3.3.3s.3-.1.3-.3v-7.4c0-.2-.1-.3-.3-.3h-3.7c-.2 0-.3.1-.3.3v7.4c0 .2.1.3.3.3Z" class="cls-Comparison-2"/><path d="M20.1 24.1c.1 0 .2 0 .3-.1l4.4-5.9v-.3c0-.1-.2-.2-.3-.2h-2.6c-.2 0-.3.1-.3.3s.1.3.3.3h1.9l-3.8 5-3.8-5h1.9c.2 0 .3-.1.3-.3s-.1-.3-.3-.3h-2.6c-.1 0-.2 0-.3.2v.3l4.4 5.9s.2.1.3.1ZM10.1 21.9h3.7c.2 0 .3-.1.3-.3v-7.4c0-.2-.1-.3-.3-.3s-.3.1-.3.3v7.1h-3v-7.1c0-.2-.1-.3-.3-.3s-.3.1-.3.3v7.4c0 .2.1.3.3.3Z" class="cls-Comparison-2"/><path d="M7.5 14.5h2.6c.2 0 .3-.1.3-.3s-.1-.3-.3-.3H8.2l3.8-5 3.8 5h-1.9c-.2 0-.3.1-.3.3s.1.3.3.3h2.6c.1 0 .2 0 .3-.2V14l-4.4-5.9s-.2-.1-.3-.1c-.1 0-.2 0-.3.1L7.4 14v.3c0 .1.2.2.3.2Z" class="cls-Comparison-2"/></g></svg> <h5>Compare MDR Vendors</h5> </a> <a class="Resources__Links--Mobile" href="/resources/blog"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 32 32"><defs><clipPath id="clippath"><path d="M9.09 7.71H22.9v16.58H9.09z" style="stroke-width:0;fill:none"/></clipPath><style>.clsBlogNavIcon-4{stroke-width:0;fill:#fff}</style></defs><g id="Layer_1-2"><g id="Group_2087"><g id="Group_1933"><g id="Group_1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" style="fill:#172143;stroke-width:0"/></g><g id="Group_2091" style="clip-path:url(#clippath)"><g id="Group_2090"><path id="Path_6299" d="M15.14 18.51c-.19 0-.34-.15-.34-.34 0-.09.04-.17.1-.24l5.63-5.63c.14-.12.35-.11.48.02.12.13.12.32 0 .45l-5.63 5.63a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/><path id="Path_6300" d="M16.6 19.96c-.19 0-.34-.15-.34-.34 0-.09.04-.17.1-.24l5.63-5.63c.14-.12.35-.11.48.02.12.13.12.32 0 .45l-5.63 5.63a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/><path id="Path_6301" d="M22.27 14.29c-.19 0-.34-.15-.34-.34 0-.09.04-.17.1-.24.27-.27.27-.71 0-.98a.713.713 0 0 0-.98 0c-.12.14-.34.15-.48.02a.335.335 0 0 1-.02-.48l.02-.02c.52-.55 1.38-.58 1.93-.06s.58 1.38.06 1.93l-.06.06a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/><path id="Path_6302" d="M14.27 20.83c-.19 0-.34-.15-.34-.34 0-.04 0-.08.02-.12l.87-2.33c.06-.18.25-.28.42-.22s.28.25.22.42c0 .01 0 .02-.01.03l-.61 1.63 1.63-.61c.18-.05.37.05.42.22a.34.34 0 0 1-.19.41l-2.33.87s-.08.02-.12.02" class="clsBlogNavIcon-4"/><path id="Path_6303" d="M21.18 10.46c-.19 0-.34-.15-.34-.33V8.59c0-.11-.09-.19-.2-.19H13.7a.335.335 0 0 1-.32-.35c0-.17.15-.31.32-.32h6.95c.48 0 .87.39.87.87v1.54c0 .19-.15.34-.33.34" class="clsBlogNavIcon-4"/><path id="Path_6304" d="M20.65 24.29H9.96a.87.87 0 0 1-.87-.87V12.29a.33.33 0 0 1 .32-.35c.19-.01.34.13.35.32v11.17c0 .11.09.19.2.19h10.68c.11 0 .2-.09.2-.19v-5.35a.33.33 0 0 1 .32-.35c.19-.01.34.13.35.32v5.39c0 .48-.39.87-.87.87" class="clsBlogNavIcon-4"/><path id="Path_6305" d="M13.58 12.53H9.43c-.19 0-.34-.15-.33-.34 0-.09.04-.17.1-.24l4.15-4.15c.13-.13.34-.13.48 0 .06.06.1.15.1.24v4.15c0 .19-.15.34-.33.34m-3.36-.67h3v-3l-3 3Z" class="clsBlogNavIcon-4"/><path id="Path_6306" d="M21.53 14.95a.35.35 0 0 1-.24-.1l-1.38-1.38a.335.335 0 0 1-.02-.48c.12-.14.34-.15.48-.02l.02.02 1.38 1.38c.13.13.13.35 0 .48a.35.35 0 0 1-.24.1" class="clsBlogNavIcon-4"/></g></g></g></g></g></svg> <h5>Blogs</h5> </a> <a class="Resources__Links--Mobile" href="/resources/security-advisories"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 32 32"><defs><clipPath id="clippath"><path d="M8.48 6.97h15.04v18.06H8.48z" style="stroke-width:0;fill:none"/></clipPath><style>.clsSANavIconTop-4{stroke-width:0;fill:#fff}</style></defs><g id="Layer_1-2"><g id="Group_2086"><g id="Group_1933"><g id="Group_1932"><circle id="Ellipse_48" cx="16" cy="16" r="16" style="fill:#172143;stroke-width:0"/></g><g id="Group_2089" style="clip-path:url(#clippath)"><g id="Group_2088"><path id="Path_6292" d="M16 25.03c-.19 0-.34-.16-.34-.34 0-.14.09-.27.23-.32 6.93-2.44 6.95-10.6 6.95-10.68 0-.19.15-.34.34-.34.19 0 .34.15.34.34 0 .09-.01 8.73-7.41 11.33-.04.01-.07.02-.11.02" class="clsSANavIconTop-4"/><path id="Path_6293" d="M23.18 14.03c-.19 0-.34-.15-.34-.34V9.93h-1.41c-.19 0-.34-.15-.34-.34s.15-.34.34-.34h1.53c.31 0 .57.26.57.57v3.88c0 .19-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6294" d="M16 25.03s-.08 0-.11-.02c-7.39-2.6-7.41-11.24-7.41-11.33 0-.18.14-.34.33-.34h.02c.19 0 .34.16.34.34 0 .08.02 8.24 6.95 10.68a.346.346 0 0 1-.11.67" class="clsSANavIconTop-4"/><path id="Path_6295" d="M8.82 14.03c-.19 0-.34-.15-.34-.34V9.81c0-.31.26-.57.57-.57h1.53c.19 0 .34.15.34.34s-.15.34-.34.34H9.16v3.76c0 .19-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6296" d="M21.4 9.92c-2.02.12-3.99-.64-5.4-2.08a6.978 6.978 0 0 1-5.4 2.08c-.19 0-.34-.15-.34-.34s.15-.34.34-.34c1.39.04 2.76-.33 3.94-1.05.45-.28.84-.63 1.15-1.06.06-.1.17-.16.29-.16h.04c.12 0 .22.06.29.16.32.42.71.78 1.16 1.05 1.18.73 2.55 1.1 3.94 1.05.19 0 .34.15.34.34s-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6297" d="M16 17.97c-.19 0-.34-.15-.34-.34v-5.4c0-.19.15-.34.34-.34.19 0 .34.15.34.34v5.4c0 .19-.15.34-.34.34" class="clsSANavIconTop-4"/><path id="Path_6298" d="M16.53 19.78c0 .29-.24.53-.53.53s-.53-.24-.53-.53c0-.29.24-.53.53-.53.29 0 .53.24.53.53" class="clsSANavIconTop-4"/></g></g></g></g></g></svg> <h5>Security Advisories</h5> </a> </div> <div class="Resources__BoxCTA"> <a href="/resources/library"> EXPLORE LIBRARY <span>→</span> </a> </div> </div> </div> <div class="Resources__SecurityBox"> <div class="Resources__Links"> <div class="Resources__SecurityBoxAdvisories"> <h6>SECURITY ADVISORIES</h6> <a href="https://www.esentire.com/security-advisories/netsupport-rat-clickfix-distribution"> <span class="Resources__Eyebrow">Feb 06, 2025</span> <h5>NetSupport RAT Clickfix Distribution</h5> <p> THE THREAT Beginning in early January 2025, eSentire Threat Response Unit (TRU) observed an increase in the number of incidents involving the NetSupport Remote Access Trojan…</p> </a> <a href="https://www.esentire.com/security-advisories/ongoing-email-bombing-campaigns-leading-to-remote-access-and-post-exploitation"> <span class="Resources__Eyebrow">Jan 30, 2025</span> <h5>Ongoing Email Bombing Campaigns leading to Remote Access and Post-Exploitation</h5> <p> The Threat In recent weeks, eSentire has observed multiple Email Bombing attacks, which involve threat actors using phishing techniques to gain remote access to a host in…</p> </a> </div> <div class="Resources__BoxCTA"> <a href="/resources/security-advisories"> View Advisories <span>→</span> </a> </div> </div> </div> </div> </div> </div> <!-- Company --> <div class="Company NavBar__SubMenu" data-menu="company"> <div class="Company__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Company</div> </div> <div class="Company__Content"> <div class="Company__About"> <div class="Company__Links"> <h6>ABOUT ESENTIRE</h6> <p>eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.</p> <a href="/company/about-us"><h5>About Us <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a href="/company/leadership"><h5>Leadership <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a href="/company/careers"><h5>Careers <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a class="Company__Links--Mobile" href="/company/event-calendar"><h5>Event Calendar <span class="Resources__LinksArrow"><em>→</em></span></h5></a> <a class="Company__Links--Mobile" href="/company/newsroom"><h5>Newsroom <span class="Resources__LinksArrow"><em>→</em></span></h5></a> </div> </div> <div class="Company__Calendar"> <div class="Company__Links"> <h6>EVENT CALENDAR</h6> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Feb</div> <div class="Company__Day">25</div> </div> <h5>Tribal Cyber Security Summit</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Feb</div> <div class="Company__Day">25</div> </div> <h5>Healthcare Cybersecurity Summit</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Feb</div> <div class="Company__Day">26</div> </div> <h5>FutureCon Detroit</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Mar</div> <div class="Company__Day">05</div> </div> <h5>Denver Cybersecurity Summit</h5> </div> <div class="Company__Event"> <div class="Company__CalendarDate"> <div class="Company__Month">Mar</div> <div class="Company__Day">11</div> </div> <h5>CISO Strategy Virtual Meetings Detroit</h5> </div> </div> <div class="Company__BoxCTA"> <a href="/company/event-calendar"> View Calendar <span>→</span> </a> </div> </div> <div class="Company__PressRelease"> <div class="Company__Links"> <h6>LATEST PRESS RELEASE</h6> <a href="https://www.esentire.com/news-releases/aston-villa-football-club-takes-its-cyber-protection-to-the-next-level-announcing-esentire-as-its-official-cybersecurity-partner"> <span class="Resources__Eyebrow">Feb 04, 2025</span> <h5>Aston Villa Football Club Takes its Cyber Protection to the Next Level Announcing eSentire as its Official Cybersecurity Partner</h5> <p> Waterloo, Ontario and Birmingham, England, February 4, 2025 — Aston Villa Football Club is pleased to announce eSentire as its new Official Cybersecurity Partner. eSentire will provide an all-in-one solution to the club’s cybersecurity needs, which will combine 24/7 security…</p> </a> </div> <div class="Company__BoxCTA"> <a href="/company/newsroom"> View Newsroom <span>→</span> </a> </div> </div> </div> </div> </div> <!-- Partners --> <div class="Partners NavBar__SubMenu" data-menu="partners"> <div class="Partners__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Partners</div> </div> <div class="Partners__Content"> <div class="Partners__PartnerProgram"> <div class="Partners__Links"> <h6>PARTNER PROGRAM</h6> <div class="Partners__E3Logo"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 119 81.99"><defs><style>.clsEcosystemICON-1{fill:#19234d;stroke-width:0}</style></defs><path d="M39.47 6.27C34.44-.18 25.91-.12 25.91-.12h-8.54S8.84-.18 3.81 6.27C.73 10.21.06 13.97.06 16.59v20.98c0 2.62.67 6.39 3.74 10.32 5.04 6.45 13.56 6.39 13.56 6.39H43.2V42.17H19.95s-3.4.02-5.41-2.55c-1.22-1.57-1.49-3.07-1.49-4.11v-2.45H43.2V16.59c0-2.62-.67-6.39-3.74-10.32M13.04 17.91c0-1.04.27-2.55 1.49-4.11 2-2.57 5.41-2.55 5.41-2.55h3.4s3.4-.02 5.41 2.55c1.22 1.57 1.49 3.07 1.49 4.11v3.2h-17.2v-3.2Z" class="clsEcosystemICON-1"/><path d="m75.52 49.25 7.45-10.32c1.97 1.69 3.87 2.95 5.67 3.77 1.8.82 3.75 1.23 5.84 1.23s4.02-.55 5.63-1.65 2.41-2.86 2.41-5.29c0-1.64-.64-3.14-1.91-4.53-1.27-1.38-3.06-2.07-5.37-2.07-1.3 0-2.47.13-3.51.38-1.04.26-1.76.5-2.16.72l-3.22-5.25 13.54-12.53H80.17V1.6h35.12v9.82l-10.32 11.17c3.72.96 6.64 2.82 8.76 5.58 2.12 2.76 3.18 6.23 3.18 10.41 0 2.82-.61 5.33-1.82 7.53s-2.85 4.05-4.91 5.54-4.35 2.64-6.85 3.43a25.41 25.41 0 0 1-7.66 1.19c-4.01 0-7.74-.61-11.21-1.82-3.47-1.21-6.45-2.95-8.93-5.2Z" style="fill:#40c3d9;stroke-width:0"/><path d="M59.98 0h.76v54.89h-.76z" style="fill:#9ea1aa;stroke-width:0"/><path d="m7.59 76.12.62.53c-.39.48-.92.86-1.59 1.15s-1.35.43-2.05.43c-.88 0-1.67-.2-2.36-.59S.97 76.69.59 75.98s-.58-1.53-.58-2.45c0-.87.18-1.66.55-2.37s.87-1.28 1.52-1.7c.66-.42 1.4-.63 2.25-.63s1.55.19 2.2.56c.65.38 1.15.93 1.52 1.66.37.73.55 1.64.55 2.71H.97c.03.67.19 1.29.5 1.84.3.55.72.99 1.25 1.32s1.15.5 1.85.5c.56 0 1.12-.12 1.7-.35.58-.23 1.01-.55 1.31-.93Zm-6.6-3.13h6.65c-.12-1.09-.47-1.92-1.06-2.5-.59-.58-1.35-.87-2.26-.87-.64 0-1.2.15-1.68.46-.48.3-.87.71-1.15 1.22-.29.51-.45 1.07-.49 1.69ZM21.68 76.12l.62.55c-.36.45-.85.83-1.47 1.12-.62.29-1.31.44-2.07.44-.87 0-1.64-.21-2.31-.62s-1.2-.98-1.59-1.69c-.39-.71-.58-1.51-.58-2.39s.2-1.69.59-2.4c.4-.71.93-1.27 1.61-1.68.68-.42 1.44-.62 2.28-.62.79 0 1.46.14 2.01.42.55.28 1.02.66 1.41 1.15l-.66.51c-.3-.39-.67-.7-1.12-.92s-.99-.34-1.64-.34c-.69 0-1.3.18-1.84.53s-.96.82-1.26 1.41c-.3.59-.46 1.24-.46 1.95s.16 1.35.47 1.94.74 1.06 1.27 1.42c.54.36 1.14.53 1.82.53s1.22-.12 1.72-.35c.5-.23.9-.55 1.2-.93ZM31.81 78.22c-.84 0-1.61-.21-2.31-.63a4.693 4.693 0 0 1-2.29-4.07c0-.87.21-1.66.62-2.37.42-.71.97-1.28 1.67-1.7s1.47-.63 2.31-.63 1.63.21 2.32.63c.69.42 1.25.99 1.66 1.7s.62 1.5.62 2.37-.21 1.66-.62 2.37c-.42.71-.97 1.28-1.66 1.7s-1.47.63-2.32.63Zm0-.8c.7 0 1.33-.18 1.89-.53.56-.35 1-.82 1.32-1.42s.48-1.25.48-1.96-.16-1.35-.5-1.93c-.33-.59-.77-1.07-1.33-1.43s-1.18-.55-1.87-.55-1.33.18-1.89.53c-.56.35-1 .82-1.32 1.41-.32.59-.48 1.25-.48 1.97s.16 1.35.5 1.94.78 1.07 1.34 1.43c.56.36 1.18.55 1.86.55ZM41.99 76.86l.56-.62c.38.38.81.66 1.29.87s1.06.3 1.72.3c.48 0 .92-.06 1.33-.18s.74-.31.98-.55c.25-.25.37-.56.37-.93 0-.44-.11-.77-.34-1-.23-.22-.57-.41-1.02-.55-.45-.14-1.01-.28-1.67-.44a8.86 8.86 0 0 1-1.45-.46c-.42-.18-.75-.42-1-.75-.25-.32-.37-.76-.37-1.3s.16-1 .47-1.36c.31-.36.72-.63 1.22-.81s1.03-.26 1.6-.26c.69 0 1.3.13 1.85.39s.98.59 1.32.99l-.6.55c-.31-.34-.67-.61-1.08-.82s-.9-.31-1.47-.31c-.38 0-.75.04-1.12.13-.37.08-.68.25-.92.49-.25.24-.37.59-.37 1.06 0 .38.14.67.41.9s.62.4 1.05.53.87.25 1.32.35c.49.1.98.24 1.46.42s.88.43 1.2.76c.32.33.48.79.48 1.39s-.18 1.09-.53 1.48c-.35.39-.8.67-1.34.85-.55.18-1.11.27-1.69.27-.83 0-1.54-.12-2.14-.37s-1.1-.58-1.52-.99ZM54.2 81.5l.45-.62c.12.12.28.22.48.31.21.09.43.14.68.14.39 0 .69-.14.9-.41s.42-.66.61-1.17l.74-1.89-3.99-8.82h.99l3.44 7.76 2.97-7.76h.95L58.03 80.1c-.1.26-.24.55-.42.85-.18.31-.41.58-.7.81-.29.22-.66.34-1.12.34-.36 0-.67-.06-.93-.18s-.49-.26-.68-.43ZM67.15 76.86l.56-.62c.38.38.81.66 1.29.87s1.06.3 1.72.3c.48 0 .92-.06 1.33-.18.41-.12.74-.31.98-.55.25-.25.37-.56.37-.93 0-.44-.11-.77-.34-1-.23-.22-.57-.41-1.02-.55s-1.01-.28-1.67-.44a8.86 8.86 0 0 1-1.45-.46c-.42-.18-.75-.42-1-.75s-.37-.76-.37-1.3.16-1 .47-1.36c.31-.36.72-.63 1.22-.81s1.03-.26 1.6-.26c.69 0 1.3.13 1.85.39s.98.59 1.32.99l-.6.55c-.31-.34-.67-.61-1.08-.82-.41-.21-.9-.31-1.47-.31-.38 0-.75.04-1.12.13s-.68.25-.92.49c-.25.24-.37.59-.37 1.06 0 .38.14.67.41.9s.62.4 1.05.53.87.25 1.32.35c.49.1.98.24 1.46.42s.88.43 1.2.76c.32.33.48.79.48 1.39s-.18 1.09-.53 1.48c-.35.39-.8.67-1.34.85-.55.18-1.11.27-1.69.27-.83 0-1.54-.12-2.14-.37s-1.1-.58-1.52-.99ZM81.36 75.24v-5.39h-1.79v-.82h1.79v-2.95h.87v2.95h2.95v.82h-2.95v5.17c0 .7.07 1.22.21 1.57s.34.57.57.67c.24.1.51.16.83.16s.6-.06.83-.18c.23-.12.47-.32.7-.6l.55.53c-.26.34-.55.59-.88.78s-.76.27-1.29.27c-.47 0-.88-.08-1.24-.25s-.64-.47-.85-.9c-.2-.43-.3-1.04-.3-1.83ZM98 76.12l.62.53c-.39.48-.92.86-1.59 1.15s-1.35.43-2.05.43c-.88 0-1.67-.2-2.36-.59s-1.24-.95-1.62-1.66-.58-1.53-.58-2.45c0-.87.18-1.66.55-2.37.36-.71.87-1.28 1.52-1.7.66-.42 1.4-.63 2.25-.63s1.55.19 2.2.56 1.16.93 1.52 1.66.55 1.64.55 2.71h-7.62c.03.67.19 1.29.5 1.84.3.55.72.99 1.25 1.32s1.15.5 1.85.5c.56 0 1.12-.12 1.7-.35.58-.23 1.01-.55 1.31-.93Zm-6.59-3.13h6.65c-.12-1.09-.47-1.92-1.06-2.5-.59-.58-1.35-.87-2.26-.87-.64 0-1.2.15-1.68.46-.48.3-.87.71-1.15 1.22-.29.51-.45 1.07-.49 1.69ZM105.17 77.98v-8.16c0-.23-.01-.49-.04-.78h.82c.03.29.04.54.05.77s.01.59.01 1.1c.14-.27.35-.57.63-.9s.64-.61 1.1-.85 1-.36 1.65-.36c.87 0 1.53.18 1.98.55s.77.88.95 1.54c.13-.24.35-.53.66-.85s.71-.61 1.19-.87c.48-.25 1.04-.38 1.67-.38.8 0 1.43.16 1.89.48s.79.77.97 1.36c.19.59.28 1.29.28 2.09v5.25h-.87v-4.96c0-.9-.1-1.59-.28-2.08-.19-.49-.46-.83-.81-1.03s-.79-.29-1.3-.29c-.58 0-1.12.15-1.6.46s-.87.7-1.17 1.19-.44 1.01-.44 1.57v5.15h-.88v-4.96c0-.9-.09-1.59-.27-2.08s-.45-.83-.8-1.03-.79-.29-1.3-.29c-.71 0-1.31.19-1.79.58s-.84.87-1.08 1.45c-.24.58-.36 1.15-.36 1.72v4.61h-.88Z" class="clsEcosystemICON-1"/></svg> <div class="Partners__E3LogoInner"> <p>We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.</p> <div class="Partners__BoxCTA"> <a href="/partners"> LEARN MORE <span>→</span> </a> </div> </div> </div> </div> </div> <div class="Partners__Box"> <div class="Partners__BoxInner"> <div class="Partners__BoxLeft"> <div class="Partners__Links"> <a href="/partners/become-a-partner"> <p>Apply to become an e3 ecosystem partner with eSentire today.</p> </a> </div> </div> <div class="Partners__BoxRight"> <a href="/partners/become-a-partner">APPLY NOW <span>→</span></a> </div> </div> <div class="Partners__BoxInner"> <div class="Partners__BoxLeft"> <div class="Partners__Links"> <a href="https://esentire.channeltivity.com/Login" target="_blank"> <p>Login to the Partner Portal for resources and content for current partners.</p> </a> </div> </div> <div class="Partners__BoxRight"> <a href="https://esentire.channeltivity.com/Login" target="_blank">LOGIN NOW <span>→</span></a> </div> </div> </div> </div> </div> </div> <!-- SEARCH --> <div class="Search NavBar__SubMenu" data-menu="search"> <div class="Search__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Search</div> </div> <div class="Search__Content"> <h3>Search our site</h3> <form action="/search/results" class="filter"> <div class="Search__TopField"> <svg xmlns="http://www.w3.org/2000/svg" width="24.417" height="24.416"><g data-name="Group 92" fill="none" stroke="#000" stroke-linecap="round" stroke-linejoin="round" stroke-width="2"><path data-name="Path 4" d="M19.7 10.351a9.352 9.352 0 1 0-9.349 9.349 9.353 9.353 0 0 0 9.349-9.349Z"/><path data-name="Line 1" d="m17.723 17.722 5.28 5.28"/></g></svg> <input id="searchField" type="search" name="q" placeholder="Enter a keyword" class="Search__SearchField" autofocus> <input type="submit" value="Search" class="Search__SubmitButton"> </div> </form> <h4>Quick Links</h4> <div class="Search__QuickLinks"> <a class="Search__QuickLink" href="/what-we-do/esentire-managed-detection-and-response"> <h5>ALL-IN-ONE MDR SERVICE <span>→</span></h5> <p>Multi-Signal MDR with 300+ technology integrations to support your existing investments.</p> </a> <a class="Search__QuickLink" href="/what-we-do/security-operations-center"> <h5>24/7 SOC SUPPORT <span>→</span></h5> <p>24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.</p> </a> <a class="Search__QuickLink" href="/how-we-do-it/mdr-pricing-packaging"> <h5>ESENTIRE MDR PRICING <span>→</span></h5> <p>Three MDR package tiers are available based on per-user pricing and level of risk tolerance.</p> </a> <a class="Search__QuickLink" href="/resources/tru-intelligence-center"> <h5>TRU INTELLIGENCE CENTER <span>→</span></h5> <p>The latest security advisories, blogs, reports, industry publications and webinars published by TRU.</p> </a> <a class="Search__QuickLink" href="/esentire-mdr-vs-everyone/compare"> <h5>MDR VENDOR COMPARISONS <span>→</span></h5> <p>Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.</p> </a> <a class="Search__QuickLink" href="/resources/mdr-and-cybersecurity-case-studies"> <h5>MDR CASE STUDIES <span>→</span></h5> <p>See why 2000+ organizations globally have chosen eSentire for their MDR Solution.</p> </a> </div> </div> </div> </div> <!-- Get Started Nav --> <div class="GetStartedNav NavBar__SubMenu" data-menu="getStarted"> <div class="GetStartedNav__Wrapper"> <div class="MobileDropdownNav"> <button class="MobileDropdownNav__BackButton" type="button"> <svg width="6" height="9" viewBox="0 0 6 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M5.92383 7.75391L4.92773 8.75L0.677734 4.5L4.92773 0.25L5.92383 1.24609L2.66992 4.5L5.92383 7.75391Z" fill="#3C2B77"/> </svg> <span>Back</span> </button> <div class="MobileDropdownNav__Title">Get Started</div> </div> <div class="GetStartedNav__Content"> <div class="GetStartedNav__Links"> <a href="/get-started"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 51 51"><path d="M5 0h46v51H5c-2.76 0-5-2.24-5-5V5c0-2.76 2.24-5 5-5Z" style="fill:#263c91;stroke-width:0"/><path d="M33.11 16.61a7.879 7.879 0 0 0-5.79-2.73h-3.65a7.879 7.879 0 0 0-5.79 2.73 7.08 7.08 0 0 0-1.6 4.41v8.96c.02 1.61.58 3.16 1.6 4.41a7.879 7.879 0 0 0 5.79 2.73H34.7v-5.17h-9.92c-.89-.02-1.73-.42-2.31-1.09a2.81 2.81 0 0 1-.64-1.75v-1.05h12.86v-7.03a7.102 7.102 0 0 0-1.6-4.41m-11.26 4.97c0-.64.23-1.26.64-1.76.58-.67 1.42-1.07 2.31-1.09h1.45c.89.02 1.72.41 2.3 1.09.41.5.63 1.12.64 1.76v1.36h-7.34v-1.36Z" style="fill:none;stroke:#fff;stroke-linecap:round;stroke-linejoin:round"/></svg> <h5>Get Started <span class="GetStartedNav__LinksArrow"><em>&rarr;</em></span></h5> </a> <a href="/build-a-quote"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 51 51"><defs><style>.clsNavBAQ-1{fill:#fff;stroke-width:0}</style></defs><g id="Group_2081"><path id="Rectangle_3064" d="M5 0h46v51H5c-2.76 0-5-2.24-5-5V5c0-2.76 2.24-5 5-5Z" style="fill:#696de3;stroke-width:0"/><g id="Group_2077"><path id="Path_1056" d="M19.7 22.53a1.14 1.14 0 1 1 1.14-1.14c0 .63-.51 1.14-1.14 1.14m-.04-1.14s.02.04.03.04l-.04-.04Z" class="clsNavBAQ-1"/><path id="Path_1057" d="M19.7 26.93a1.14 1.14 0 1 1 1.14-1.14c0 .63-.51 1.14-1.14 1.14m-.04-1.14s.02.04.03.04l-.04-.04Z" class="clsNavBAQ-1"/><path id="Path_1058" d="M26.29 39.01H15.88c-.32 0-.59-.26-.59-.59V14.8c0-.32.26-.59.58-.59h4.56a.591.591 0 0 1 0 1.18h-3.98v22.46h9.83a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1059" d="M34.56 29.68c-.32 0-.59-.26-.59-.59v-13.7H30a.591.591 0 0 1 0-1.18h4.56c.32 0 .59.26.59.59v14.29c0 .32-.26.59-.59.59" class="clsNavBAQ-1"/><path id="Path_1060" d="M27.86 17.04h-5.28c-1.26.03-2.31-.97-2.35-2.24v-1.65a.591.591 0 0 1 1.18 0v1.65c.03.62.56 1.09 1.17 1.06h5.27c.62.03 1.15-.44 1.18-1.06v-1.65a.591.591 0 0 1 1.18 0v1.65a2.306 2.306 0 0 1-2.35 2.24" class="clsNavBAQ-1"/><path id="Path_1061" d="M29.59 13.74h-8.77a.591.591 0 0 1 0-1.18h8.77a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1062" d="M31.27 21.99h-7.72a.591.591 0 0 1 0-1.18h7.72a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1063" d="M31.27 26.38h-7.72a.591.591 0 0 1 0-1.18h7.72a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1064" d="M19.7 31.32a1.14 1.14 0 1 1 1.14-1.14c0 .63-.51 1.14-1.14 1.14m-.04-1.13s.02.04.03.04l-.04-.04Z" class="clsNavBAQ-1"/><path id="Path_1065" d="M31.27 30.77h-7.72a.591.591 0 0 1 0-1.18h7.72a.591.591 0 0 1 0 1.18" class="clsNavBAQ-1"/><path id="Path_1066" d="M31.41 39.02c-.15 0-.29-.06-.4-.16l-3.44-3.23a.595.595 0 0 1 .02-.83c.22-.2.55-.21.78-.03l2.93 2.75 3.87-6c.18-.27.54-.35.81-.17.27.18.35.54.17.81l-4.25 6.59c-.09.15-.25.24-.42.26h-.07" class="clsNavBAQ-1"/></g></g></svg> <h5>Build A Quote <span class="GetStartedNav__LinksArrow"><em>&rarr;</em></span></h5> </a> <a href="/partners/become-a-partner"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 51 51"><defs><style>.clsBecomePartner-2{stroke-width:0;fill:#fff}</style></defs><g id="Group_2082"><path id="Path_6059" d="M5 0h46v51H5c-2.76 0-5-2.24-5-5V5c0-2.76 2.24-5 5-5Z" style="stroke-width:0;fill:#40c3d9"/><g id="Group_2079"><path id="Path_1068" d="M33.34 34.79c-1.12-.1-2.12-.75-2.67-1.73l-3.12-4.12a.633.633 0 0 1 .12-.88c.27-.21.66-.16.87.12l3.16 4.18c.07.12.97 1.57 2.14 1.06.5-.22.81-.73.76-1.28-.03-.42-.17-.82-.41-1.16l-6.78-9.69c-.73.55-1.52 1.03-2.35 1.42-2.03.97-3.61 1.12-4.68.44-.75-.5-1.18-1.36-1.14-2.26 0-.69.56-1.07 1.41-1.65a19.46 19.46 0 0 0 3.03-2.47c.45-.45.83-.84 1.15-1.18 1.39-1.43 1.91-1.97 3.21-1.97h1.51c1.67-.14 3.34.35 4.66 1.39l.26.18c2.35 1.57 3.14 2.14 3.14 2.14.16.12.26.31.26.51v11.77c0 .35-.28.63-.62.63h-2.07l.02.04c.4.55.62 1.21.65 1.89.05 1.05-.55 2.01-1.52 2.43-.31.14-.66.22-1 .22m.99-5.85h2.32V18.15c-.39-.27-1.25-.87-2.84-1.93l-.26-.18a5.42 5.42 0 0 0-3.97-1.17h-1.51c-.75 0-.99.23-2.31 1.59-.33.34-.71.73-1.17 1.19-.98.98-2.06 1.85-3.21 2.62-.32.19-.61.42-.88.68 0 .45.21.88.57 1.14.38.24 1.34.5 3.47-.51.94-.44 1.81-1 2.6-1.66a.624.624 0 0 1 .93.1l6.25 8.94Z" class="clsBecomePartner-2"/><path id="Path_1069" d="M29.79 36.38c-.15 0-.31-.02-.46-.05-.74-.19-1.38-.65-1.81-1.28l-3.57-5.1a.625.625 0 0 1 1.02-.72l3.58 5.12c.35.68 1.19.94 1.86.58.03-.01.05-.03.08-.04.53-.35.52-.86.45-1.4v-.13c-.04-.34.21-.65.55-.68.34-.04.65.21.68.55v.01l-.62.06.64.04c.21.99-.18 2.01-1.01 2.59-.41.28-.9.44-1.4.45" class="clsBecomePartner-2"/><path id="Path_1070" d="M25.76 36.87c-.66.01-1.3-.25-1.76-.73l-3.62-5.17a.625.625 0 0 1 1.02-.72l3.58 5.11c.48.35 1.13.36 1.62.02.35-.19.58-.54.63-.93.08-.34.42-.54.76-.46.34.08.54.42.46.76v.02c-.14.74-.61 1.38-1.29 1.73-.44.22-.92.35-1.41.35" class="clsBecomePartner-2"/><path id="Path_1071" d="M21.81 37.38c-.78-.01-1.51-.41-1.93-1.06l-2.95-4.2c-.39-.65-1.41-1.9-2.17-1.9h-1.02c-.35 0-.63-.28-.62-.63V17.83c0-.35.28-.63.62-.63h3.07c.69-.04 1.37-.2 2-.49 1.8-.74 3.73-1.09 5.67-1.04.35-.01.64.26.65.6s-.26.64-.6.65h-.05c-1.79-.05-3.57.28-5.22.96-.77.35-1.6.55-2.45.58h-2.44v10.51h.4c1.67 0 3.06 2.22 3.21 2.47l2.95 4.19c.34.53 1.05.68 1.58.34a.55.55 0 0 0 .09-.07c.34-.16.6-.43.75-.77a.622.622 0 1 1 1.18.4c-.24.64-.71 1.16-1.32 1.47-.42.25-.9.39-1.39.4" class="clsBecomePartner-2"/></g></g></svg> <h5>Become A Partner <span class="GetStartedNav__LinksArrow"><em>&rarr;</em></span></h5> </a> </div> </div> </div> </div> <script> let buttonSubtles = document.querySelectorAll('.NavBar__ButtonSubtleTrigger'); let subMenus = document.querySelectorAll('.NavBar__SubMenu'); let mobileHamburgers = document.querySelectorAll('.NavBar__MobileNavicon'); let mobileHamburgerBacks = document.querySelectorAll('.MobileDropdownNav__BackButton'); function closeNavigation() { subMenus.forEach(subMenu => { subMenu.classList.remove('active'); }); buttonSubtles.forEach(buttonSubtleparent => { buttonSubtleparent.parentNode.classList.remove("active"); }); } buttonSubtles.forEach(buttonSubtle => { buttonSubtle.addEventListener('click', (e) => { e.preventDefault(); const id = buttonSubtle.getAttribute('data-nav'); if(document.querySelector(`.NavBar__SubMenu[data-menu="${id}"]`).classList.contains('active')) { document.querySelector(`.NavBar__SubMenu[data-menu="${id}"]`).classList.remove('active'); buttonSubtle.parentNode.classList.remove("active"); } else { closeNavigation(); document.querySelector(`.NavBar__SubMenu[data-menu="${id}"]`).classList.add('active'); buttonSubtle.parentNode.classList.add("active"); } }); }); mobileHamburgers.forEach(mobileHamburger => { mobileHamburger.addEventListener('click', (e) => { e.preventDefault(); if(document.getElementsByClassName("NavBar__MobileDropdown")[0].classList.contains("NavBar__MobileDropdown--Visible")) { subMenus.forEach(subMenu => { subMenu.classList.remove('active'); }); } mobileHamburger.parentNode.classList.toggle("NavBar__MobileNavicon--Close"); document.getElementsByClassName("NavBar__MobileDropdown")[0].classList.toggle("NavBar__MobileDropdown--Visible"); }); }); mobileHamburgerBacks.forEach(mobileHamburgerBack => { mobileHamburgerBack.addEventListener('click', (e) => { e.preventDefault(); closeNavigation(); }); }); let navigation = document.getElementsByClassName("NavBar")[0]; // Event listener for clicking outside the navigation document.addEventListener('click', (event) => { if (!navigation.contains(event.target)) { if(!event.target.matches('.Search__SearchField')) { if(!event.target.matches('.Search__TopField svg')) { closeNavigation(); } } } }); </script> <section class="industryHeading industryHeading__Retail"> <div class="Breadcrumb__Container"> <div class="Breadcrumb Breadcrumb__Light"> <a href="/">Home</a> <a href="/how-we-do-it">How We Do It</a> <a href="/how-we-do-it/industries">Industries</a> <a href="">Retail</a> </div> </div> <div class="industryHeading__Content"> <div class="industryHeading__Left"> <h3>RETAIL INDUSTRY</h3> <h1>Multi-Signal Managed Detection and Response for Retail Companies</h1> <p>Retailers face a complex set of challenges when it comes to protecting their consumer and business data from cyber threats as the retail segment has undergone significant digital transformation due to cloud adoption and the growth of e-commerce. See how eSentire proactively detects, disrupts, and remediates cyber threats affecting retail companies before they impact your supply chain, your business, and your customers.</p> <a href="/get-started" class="industryHeading__LeftBtn">Get Started</a> </div> </div> </section> <section class="industryNavyBlock Finance"> <div class="industryNavyBlock__Content Finance"> <div class="industryNavyBlock__Top"> <div class="industryNavyBlock__TopInner"> <h2>From producer to consumer - prevent critical operational disruption with 24/7 protection across your supply chain</h2> </div> </div> <div class="industryNavyBlock__Bottom"> <p>Expanding digital platforms, valuable PCI data, third-party vendor & supply chain access, and operational exposure are only some of the factors that contribute to cyber risk for retailers. Data breaches in the retail sector have been highly publicized and financial implications are growing.</p> <p>Unfortunately, margin pressures, rising competition, and an uncertain economic outlook create an uphill battle to obtain the funding and resources required to protect your environment from cyber threats. Although cybersecurity awareness is growing at the executive and board level, retail cybersecurity leaders continue to find themselves under-resourced against today’s cyber threat landscape - where attackers are striking with increased speed and precision.</p> <p>Common retail cyberattacks include:</p> <div class="industryNavyBlock__RetailIcons"> <div class="industryNavyBlock__IconBox"> <img src="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV4/Common/Industries/retail-credential-phish.svg" alt="credential phishing icon"/> <p class="IconCaption">Credential phishing</p> </div> <div class="industryNavyBlock__IconBox"> <img src="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV4/Common/Industries/retail-malware.svg" alt="malware icon"/> <p class="IconCaption">Malware</p> </div> <div class="industryNavyBlock__IconBox"> <img src="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV4/Common/Industries/retail-ransomware.svg" alt="ransomware icon"/> <p class="IconCaption">Ransomware</p> </div> <div class="industryNavyBlock__IconBox"> <img src="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV4/Common/Industries/retail-ddos.svg" alt="ddos icon"/> <p class="IconCaption">Distributed denial-of-service (DDoS) attacks</p> </div> </div> <p>Whether your organization is a brick-and-mortar or ecommerce retailer, threat actors are going to capitalize on vulnerable systems and human nature to achieve their objectives. Your retail cybersecurity teams need to be able to:</p> <ul> <li>Protect your network 24/7</li> <li>Meet the PCI DSS and other industry compliance requirements</li> <li>Protect point-of-sale systems and cardholder data</li> <li>Implement strong access control measures, especially for privileged users</li> <li>Defend against attackers targeting your supply chain or third-party vendors</li> </ul> <p>Ultimately, protection of your consumer and business data will come down to the speed at which you can identify and contain an attack. Retail companies need 24/7 threat hunting services including Managed Detection and Response (MDR) in order to quickly detect malicious activity, stop breaches, simplify security and minimize their business risk.</p> </div> </div> </section> <section class="SecureWithMDR Retail"> <div class="SecureWithMDR__Content"> <div class="SecureWithMDR__Container"> <h2>How eSentire Managed Detection and Response Can Help Retail Businesses</h2> <p>We are recognized globally as the Authority in Managed Detection and Response (MDR) because we hunt, investigate and stop cyber threats before they become business-disrupting events. In fact, eSentire was founded in 2001 to secure the environments of the world’s most targeted industry - financial services. Now with over 2000+ customers, across 80+ countries globally, we have scaled to deliver cybersecurity services across highly regulated industries, with a proven track record of success in securing the retail sector. Today we protect over 77,000 employees in over 55 retail chains and franchises.</p> <p>We know cybersecurity in the retail industry. Our team of 24/7 Cyber Analysts and Elite Threat Hunters don’t drown you in alerts. We have a successful track record of identifying new threats, stopping nation-state attacks, and preventing ransomware gangs from shutting down business operations & creating damaging public incidents. </p> <p>At eSentire, we are proud to provide the world’s most complete response capability. We support your retail industry cybersecurity program with a combination of cutting-edge machine learning Extended Detection and Response (XDR) technology, 24/7 Threat Hunting expertise and security operations leadership to mitigate your business risk, enable security at scale and drive your cyber program forward.</p> </div> <div class="SecureWithMDR__Cta"> <div class="SecureWithMDR__CtaLeft"> <h3>Ready to get started?</h3> </div> <div class="SecureWithMDR__CtaRight"> <a href="/build-a-quote">BUILD A QUOTE</a> </div> </div> </div> </section> <section class="YouExpectServices"> <div class="YouExpectServices__Content"> <h2>How eSentire Protects Retail Organizations</h2> <div class="YouExpectServices__Tabs"> <div class="YouExpectServices__TabsLeft"> <div class="YouExpectServices__TabCell selected" data-tab-id="1"><h3>Access to Confidential Information</h3></div> <div class="YouExpectServices__TabCell" data-tab-id="2"><h3>Operational Disruption</h3></div> <div class="YouExpectServices__TabCell" data-tab-id="3"><h3>Protecting Against Supply Chain and Third-Party Vendor Risk</h3></div> <div class="YouExpectServices__TabCell" data-tab-id="4"><h3>Preventing Ransomware Attacks</h3></div> <div class="YouExpectServices__TabCell" data-tab-id="5"><h3>Avoiding Regulatory and Compliance Violations</h3></div> </div> <div class="YouExpectServices__TabsRight"> <div class="YouExpectServices__TabCopy selected" data-tab="1"> <h4 class="eyebrow">KEY RETAIL INDUSTRY CHALLENGES</h4> <h3>Access to Confidential Information</h3> <h4 class="eyebrow">HOW ESENTIRE MANAGED DETECTION AND RESPONSE HELPS</h4> <p>Our 24/7 Elite Threat Hunters and SOC Cyber Analysts actively hunt for threats across your environment. We detect intrusions and contain attacks before data can be exfiltrated.</p> </div> <div class="YouExpectServices__TabCopy" data-tab="2"> <h4 class="eyebrow">KEY RETAIL INDUSTRY CHALLENGES</h4> <h3>Operational Disruption</h3> <h4 class="eyebrow">HOW ESENTIRE MANAGED DETECTION AND RESPONSE HELPS</h4> <p>We detect malicious administrative activity through remote access tools and stop intrusions before malware can be deployed throughout your environment.</p> </div> <div class="YouExpectServices__TabCopy" data-tab="3"> <h4 class="eyebrow">KEY RETAIL INDUSTRY CHALLENGES</h4> <h3>Protecting Against Supply Chain and Third-Party Vendor Risk</h3> <h4 class="eyebrow">HOW ESENTIRE MANAGED DETECTION AND RESPONSE HELPS</h4> <p>We can assist with protecting against supply chain and third&#8209;party vendor risk for retail businesses.</p> <ul> <li>eSentire Exposure Management Service experts support in security assessments, testing and make strategic recommendations to offset risks for the retail sector.</li> <li>Our Managed Detection and Response services have repeatedly caught and stopped vendor compromises before the vendor reported the vulnerability.</li> </ul> </div> <div class="YouExpectServices__TabCopy" data-tab="4"> <h4 class="eyebrow">KEY RETAIL INDUSTRY CHALLENGES</h4> <h3>Preventing Ransomware Attacks</h3> <h4 class="eyebrow">HOW ESENTIRE MANAGED DETECTION AND RESPONSE HELPS</h4> <p>We monitor your attack surface 24/7 to discover intrusion attempts, preventing the pervasive deployment of malware and ransomware.</p> <ul> <li>We support multi-signal coverage ensuring visibility across endpoint, network, log, cloud, and other data sources for deep investigation and response capabilities.</li> <li>We offer endpoint protection to prevent your defenses from being disabled.</li> </ul> </div> <div class="YouExpectServices__TabCopy" data-tab="5"> <h4 class="eyebrow">KEY RETAIL INDUSTRY CHALLENGES</h4> <h3>Avoiding Regulatory and Compliance Violations</h3> <h4 class="eyebrow">HOW ESENTIRE MANAGED DETECTION AND RESPONSE HELPS</h4> <p>Our Security Operations Center (SOC) leverages proven run books which include detectors mapped to requirements and reporting measures for PCI DSS, CCPA, GLBA, SOX, NYCRR, HIPAA, GDPR, as well as state level regulations.</p> </div> </div> </div> </div> <div class="FAQPopup__CTAContent"> <div class="FAQPopup__CTA"> <h3>Retail Cybersecurity FAQ</h3> <a class="FAQPopup__CTATrigger" data-modal-id="FAQPopup">View Now <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 15"><path d="M1 6.5a1 1 0 0 0 0 2v-2Zm12.707 1.707a.999.999 0 0 0 0-1.414L7.343.429a.999.999 0 1 0-1.414 1.414L11.586 7.5l-5.657 5.657a.999.999 0 1 0 1.414 1.414l6.364-6.364ZM1 8.5h12v-2H1v2Z" style="fill:#263c91"/></svg></a> </div> </div> </section> <section id="FAQPopupID" class="FAQPopup" data-modal-id="FAQPopup"> <div class="FAQPopup__Content"> <div class="FAQPopup__Close" data-modal-id="FAQPopup"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 10 10"><defs><style>.ClostBlack1{fill:#000000}</style></defs><g id="Layer_2-2"><path class="ClostBlack1" d="M5 10c-2.76 0-5-2.24-5-5s2.24-5 5-5 5 2.24 5 5-2.24 5-5 5ZM5 .59C2.57.59.59 2.57.59 5S2.57 9.41 5 9.41 9.41 7.43 9.41 5 7.43.59 5 .59Z"></path><path class="ClostBlack1" d="M6.64 6.93c-.08 0-.15-.03-.21-.09L3.16 3.57c-.11-.11-.11-.3 0-.42s.3-.11.42 0l3.27 3.27c.11.11.11.3 0 .42-.06.06-.13.09-.21.09Z"></path><path class="ClostBlack1" d="M3.36 6.93c-.08 0-.15-.03-.21-.09a.308.308 0 0 1 0-.42l3.27-3.27c.11-.11.3-.11.42 0s.11.3 0 .42L3.57 6.84c-.06.06-.13.09-.21.09Z"></path></g></svg> </div> <div class="FAQPopup__Container"> <h2>Retail Cybersecurity FAQ</h2> <div class="FAQPopup__List"> <div class="FAQPopup__ListItem" data-drawer-id="1"> <div class="FAQPopup__ListItemTop"> <h4>What is a retail cybersecurity program?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="1"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>Whether your organization is a brick-and-mortar or e-commerce retailer, threat actors are going to capitalize on vulnerable systems and human nature to achieve their objectives. A retail cybersecurity program should:</p> <ul> <li>Protect your network 24/7</li> <li>Meet PCI DSS and other industry compliance requirements </li> <li>Protect point-of-sale systems and cardholder data</li> <li>Implement strong access control measures, especially for privileged users</li> <li>Defend against attackers targeting your supply chain through third-party vendors</li> </ul> <p>A retail cybersecurity program should include a multi-layered defense strategy that encompasses a comprehensive <a href="/what-we-do/exposure-vulnerability-and-risk-management/managed-vulnerability-service">Vulnerability Management program</a>, <a href="/what-we-do/exposure-vulnerability-and-risk-management/technical-testing/security-awareness-training-managed-phishing-training">Phishing and Security Awareness Training (PSAT)</a>, <a href="/what-we-do/exposure-vulnerability-and-risk-management/technical-testing/security-awareness-training-managed-phishing-training">24/7 Managed Detection and Response (MDR)</a>, and <a href="/cybersecurity-fundamentals-defined/what-is-dfir">Digital Forensics and Incident Response (DFIR)</a> support.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="2"> <div class="FAQPopup__ListItemTop"> <h4>Why is retail cybersecurity important?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="2"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>Retailers are a top target for cybercriminals because of the expanding attack surface, the ever-revolving door of retail employees that must be trained, and the number of players in a retail supply chain. Retailers face an increasingly complex set of challenges when it comes to protecting sensitive consumer and business data including:</p> <ul> <li>Protecting confidential information </li> <li>Preventing operational disruption </li> <li>Protecting against supply chain and third-party vendor risk </li> <li>Preventing ransomware attacks</li> <li>Avoiding regulatory and compliance violations </li> </ul> <p>You need a retail cybersecurity program that allows you to quickly detect malicious activity, stop breaches, simplify your security and minimize your business risk.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="3"> <div class="FAQPopup__ListItemTop"> <h4>What is PCI DSS compliance?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="3"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>The Payment Card Industry Data Security Standard (PCI DSS) was designed to enhance the security of cardholder account data and encourage the adoption of consistent data security measures globally by providing a baseline of technical and operational requirements.</p> <p>However, preparing for, conducting, and reporting the results of a PCI DSS assessment while mitigating cyber risk with constrained resources can be challenging. Find out how to adhere to PCI DSS compliance requirements with 24/7 cybersecurity services in our <a href="/resources/library/pci-dss-3-2-1-checklist-for-protecting-payment-account-data">PCI DSS Compliance Checklist</a>.</p> </div> </div> <div class="FAQPopup__ListItem" data-drawer-id="4"> <div class="FAQPopup__ListItemTop"> <h4>How does eSentire protect retail organizations?</h4> <div class="FAQPopup__ListItemTopIcon" data-drawer-id="4"> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M15.99 25.06a1.514 1.514 0 0 1-1.511-1.511V8.45c0-.833.678-1.512 1.511-1.512.834 0 1.512.679 1.512 1.512V23.55a1.51 1.51 0 0 1-1.492 1.512"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> <svg xmlns="http://www.w3.org/2000/svg" width="32" height="32" fill="none"><mask id="a" width="32" height="32" x="0" y="0" maskUnits="userSpaceOnUse" style="mask-type:luminance"><path fill="#fff" d="M32 0H0v32h32V0Z"/></mask><g fill="#19234D" mask="url(#a)"><path d="M16.01 32C7.17 32 0 24.829 0 15.99 0 7.152 7.171 0 16.01 0 24.848 0 32 7.171 32 16.01c0 8.838-7.171 16.01-16.01 16.01m.02-29.016C8.838 3.004 3.024 8.82 3.024 15.99c0 7.172 5.814 12.986 12.986 12.986 7.171 0 12.986-5.814 12.986-12.986 0-7.171-5.815-12.986-12.986-12.986Z"/><path d="M23.55 17.502H8.45A1.514 1.514 0 0 1 6.94 15.99c0-.833.678-1.511 1.512-1.511h15.098c.834 0 1.512.678 1.512 1.511 0 .834-.678 1.512-1.512 1.512Z"/></g></svg> </div> </div> <div class="FAQPopup__ListItemBottom"> <p>At eSentire, we support retailers by:</p> <ul> <li>Preventing operational disruption of internal and consumer-facing retail services through a combination of <a href="/what-we-do/esentire-managed-detection-and-response">24/7 MDR Services</a>, <a href="/what-we-do/exposure-vulnerability-and-risk-management">Continuous Threat Exposure Management Services</a>, and <a href="/what-we-do/digital-forensics-and-incident-response">Incident Response Services</a></li> <li>Ensuring that any regulatory penalties and third-party costs associated with data breaches are minimized</li> <li>Ensuring your retail business remains compliant to regulatory frameworks such as PCI DSS, GDPR, and CCPA</li> <li>Protecting your business data and customer data from ransomware attacks, data theft or exposure, and insider threats</li> </ul> <p><a href="/get-started">Contact us</a> to learn how we can help build your retail cybersecurity program today.</p> </div> </div> </div> </div> </div> </section> <script> let popUpFAQ = document.getElementById('FAQPopupID'); let popUpFAQModals = document.querySelectorAll('.FAQPopup'); function closePopUp() { popUpFAQModals.forEach(popUpFAQModal => { popUpFAQModal.classList.remove('active'); }); document.getElementsByTagName("body")[0].style.overflow = "auto"; } // Event listener for clicking outside the Popup document.addEventListener('click', (event) => { if(event.target.matches('#FAQPopupID')) { closePopUp(); } }); </script> <script> let FAQPopUpCtas = document.querySelectorAll('.FAQPopup__CTATrigger'); let FAQPopUpCloseBtns = document.querySelectorAll('.FAQPopup__Close'); let FAQPopUpCloseBtnsInline = document.querySelectorAll('.FAQPopup__CloseInline'); FAQPopUpCtas.forEach(FAQPopUpCta => { FAQPopUpCta.addEventListener('click', (e) => { e.preventDefault(); const id = FAQPopUpCta.getAttribute('data-modal-id'); document.querySelector(`.FAQPopup[data-modal-id="${id}"]`).classList.add('active'); document.getElementsByTagName("body")[0].style.overflow = "hidden"; }); }); FAQPopUpCloseBtns.forEach(FAQPopUpCloseBtn => { FAQPopUpCloseBtn.addEventListener('click', (e) => { e.preventDefault(); const id = FAQPopUpCloseBtn.getAttribute('data-modal-id'); document.querySelector(`.FAQPopup[data-modal-id="${id}"]`).classList.remove('active'); document.getElementsByTagName("body")[0].style.overflow = "auto"; }); }); FAQPopUpCloseBtnsInline.forEach(FAQPopUpCloseBtn => { FAQPopUpCloseBtn.addEventListener('click', (e) => { const id = FAQPopUpCloseBtn.getAttribute('data-modal-id'); document.querySelector(`.FAQPopup[data-modal-id="${id}"]`).classList.remove('active'); document.getElementsByTagName("body")[0].style.overflow = "auto"; }); }); </script> <script> let FAQPopupDrawerTriggers = document.querySelectorAll('.FAQPopup__ListItemTopIcon'); let FAQPopupDrawers = document.querySelectorAll('.FAQPopup__ListItem'); FAQPopupDrawerTriggers.forEach(FAQPopupDrawerTrigger => { FAQPopupDrawerTrigger.addEventListener('click', (e) => { e.preventDefault(); const drawerId = FAQPopupDrawerTrigger.getAttribute('data-drawer-id'); document.querySelector(`.FAQPopup__ListItem[data-drawer-id="${drawerId}"]`).classList.toggle('FAQPopup__ListItem--Open'); }); }); </script> <script> let YouExpectServices = document.querySelectorAll('.YouExpectServices__TabCell'); YouExpectServices.forEach(YouExpectService => { YouExpectService.addEventListener('click', (e) => { document.querySelectorAll('.YouExpectServices__TabCopy').forEach((TabCopy) => { TabCopy.classList.remove('selected'); }); document.querySelectorAll('.YouExpectServices__TabCell').forEach((TabCell) => { TabCell.classList.remove('selected'); }); YouExpectService.classList.add('selected'); document.querySelector(`.YouExpectServices__TabCopy[data-tab="${YouExpectService.getAttribute('data-tab-id')}"]`).classList.add('selected'); }); }); </script> <section class="IndustryServices"> <div class="IndustryServices__Content"> <div class="IndustryServices__Container"> <h2>eSentire Retail Cybersecurity Services</h2> <p>At eSentire, we go beyond the market’s capability in threat response. eSentire’s multi-signal MDR approach ingests endpoint, network, log, cloud, asset and vulnerability data that enables complete attack surface visibility. Enriched detections from the eSentire Threat Response Unit (TRU) are applied to captured data identifying known & unknown threats including suspicious activity and zero-day attacks. With two 24/7 Security Operations Centers staffed with cyber experts and Elite Threat Hunters, an industry-leading XDR Platform, and refined security operations processes, eSentire can detect and respond with a Mean Time to Contain of 15 minutes.</p> <div class="IndustryServices__Cards"> <div class="IndustryServices__Card"> <div class="IndustryServices__CardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" viewBox="0 0 55 55"><defs><style>.MDRcls-1{fill:none;stroke:#5063f9;stroke-linecap:round;stroke-linejoin:round}</style></defs><circle id="Ellipse_6" cx="27.5" cy="27.5" r="27.5" data-name="Ellipse 6" style="fill:#d4d8e9"/><g id="Group_600" data-name="Group 600"><path id="Path_988" d="M27.76 24.81c.74.58 1.56 1.05 2.43 1.39 0 3.68-2.43 4.17-2.43 4.17" class="MDRcls-1" data-name="Path 988"/><path id="Path_989" d="M27.76 24.81c-.74.58-1.56 1.05-2.43 1.39 0 3.68 2.43 4.17 2.43 4.17" class="MDRcls-1" data-name="Path 989"/><path id="Line_26" d="m17.68 36.63 6.18-6.19" class="MDRcls-1" data-name="Line 26"/><path id="Path_990" d="M19.26 30.45h4.68v4.68" class="MDRcls-1" data-name="Path 990"/><path id="Line_27" d="m37.49 17.51-6.18 6.18" class="MDRcls-1" data-name="Line 27"/><path id="Path_991" d="M35.74 23.93h-4.68v-4.68" class="MDRcls-1" data-name="Path 991"/><path id="Line_28" d="M27.5 39.67v3.04" class="MDRcls-1" data-name="Line 28"/><path id="Line_29" d="M27.5 12.29v3.04" class="MDRcls-1" data-name="Line 29"/><path id="Line_30" d="M42.71 27.5h-3.04" class="MDRcls-1" data-name="Line 30"/><path id="Line_31" d="M15.33 27.5h-3.04" class="MDRcls-1" data-name="Line 31"/><path id="Path_992" d="M16.53 32.13c-2.56-6.06.29-13.04 6.35-15.6 2.96-1.25 6.29-1.25 9.25 0" class="MDRcls-1" data-name="Path 992"/><path id="Path_993" d="M38.72 23.53c2.19 6.2-1.07 13-7.27 15.19-2.79.98-5.85.89-8.58-.26" class="MDRcls-1" data-name="Path 993"/><path id="Path_994" d="M20.89 26.84c0-3.29 2.66-5.95 5.95-5.95h0" class="MDRcls-1" data-name="Path 994"/><path id="Path_995" d="M34.11 28.16c0 3.29-2.66 5.95-5.95 5.95h0" class="MDRcls-1" data-name="Path 995"/></g></svg> <h3>Managed Detection & Response</h3> <p>We deliver Response + Remediation you can trust. By combining our cutting-edge XDR platform, 24/7 SOC support, around the clock threat hunting and security operations leadership, we hunt and stop known & unknown threats before they disrupt your business. </p> </div> <a href="/what-we-do/esentire-managed-detection-and-response">LEARN MORE →</a> </div> <div class="IndustryServices__Card"> <div class="IndustryServices__CardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" viewBox="0 0 55 55"><defs><style>.clsMRS-1{fill:none;stroke:#5063f9;stroke-linecap:round;stroke-linejoin:round}</style></defs><circle id="Ellipse_6" cx="27.5" cy="27.5" r="27.5" data-name="Ellipse 6" style="fill:#d4d8e9"/><g id="Group_601" data-name="Group 601"><path id="Line_32" d="M33.97 35.89v-4.12" class="clsMRS-1" data-name="Line 32"/><path id="Path_996" d="M41.85 41.02H26.09l7.88-14.39 7.88 14.39Z" class="clsMRS-1" data-name="Path 996"/><path id="Path_997" d="M34.6 38.33c0 .35-.28.64-.64.64s-.64-.28-.64-.63.28-.64.64-.64c.35 0 .63.28.64.63Z" data-name="Path 997" style="fill:#5063f9"/><path id="Path_998" d="M36.19 23.31v-5.66c0-.19-.16-.35-.35-.35h-2.22" class="clsMRS-1" data-name="Path 998"/><path id="Path_999" d="M22.9 38.14c-7.83-4.71-7.75-14.83-7.75-14.83" class="clsMRS-1" data-name="Path 999"/><path id="Path_1000" d="M15.15 23.31v-5.66c0-.19.16-.35.35-.35h2.22" class="clsMRS-1" data-name="Path 1000"/><path id="Path_1001" d="M17.75 17.3c5.75 0 7.89-3.32 7.89-3.32h.05s2.14 3.32 7.89 3.32" class="clsMRS-1" data-name="Path 1001"/></g></svg> <h3>Exposure Management Services</h3> <p>Strategic services including Managed Vulnerability Assessments, vCISO and Managed Phishing & Security Awareness Training to identify gaps, build defensive strategies, operationalize risk mitigation and continuously advance your security program.</p> </div> <a href="/what-we-do/exposure-vulnerability-and-risk-management">LEARN MORE →</a> </div> <div class="IndustryServices__Card"> <div class="IndustryServices__CardTop"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" data-name="Layer 1" viewBox="0 0 55 55"><defs><style>.clsDFIR-1{fill:none;stroke:#5063f9;stroke-linecap:round;stroke-linejoin:round}</style></defs><circle id="Ellipse_6" cx="27.5" cy="27.5" r="27.5" data-name="Ellipse 6" style="fill:#d4d8e9"/><g id="Group_602" data-name="Group 602"><path id="Path_973" d="M32.58 20.53c.4.82.64 1.71.7 2.62" class="clsDFIR-1" data-name="Path 973"/><path id="Path_974" d="M21.03 16.33c1.21-.6 2.55-.91 3.91-.91a8.26 8.26 0 0 1 6.71 3.44" class="clsDFIR-1" data-name="Path 974"/><path id="Path_975" d="M16.76 32.42c1.44-4.47.83-6.57.83-8.53 0-3.47.34-4.92 1.82-6.38" class="clsDFIR-1" data-name="Path 975"/><path id="Path_976" d="M25.13 18.26c2.57.11 4.75 1.94 5.31 4.45" class="clsDFIR-1" data-name="Path 976"/><path id="Path_977" d="M20.18 25.45a9.05 9.05 0 0 1-.14-1.56c-.12-3.14.9-4.66 3.2-5.43" class="clsDFIR-1" data-name="Path 977"/><path id="Path_978" d="M19 34.28c.51-1.23.88-2.52 1.1-3.84.14-1.02.22-2.04.22-3.07" class="clsDFIR-1" data-name="Path 978"/><path id="Path_979" d="M27.09 22.12c.38.55.68 1.15.87 1.79" class="clsDFIR-1" data-name="Path 979"/><path id="Path_980" d="M21.51 34.88c.87-1.89 1.37-3.92 1.47-5.99 0-3.4-.41-2.73-.41-4.97 0-1.72.84-2.87 2.37-2.87.19-.01.38.02.56.09" class="clsDFIR-1" data-name="Path 980"/><path id="Path_981" d="M25.69 26.19c.04-.81-.17-1.61-.6-2.3" class="clsDFIR-1" data-name="Path 981"/><path id="Path_982" d="M24.29 35.34s.64-1.56 1.02-2.7" class="clsDFIR-1" data-name="Path 982"/><path id="Path_983" d="M32.06 15.41c2.67 1.99 3.72 5.36 3.72 9" class="clsDFIR-1" data-name="Path 983"/><path id="Path_984" d="M15.17 20.86c.08-.91.31-1.81.67-2.65 1.71-3.7 4.91-5.31 9.09-5.31 1.97-.04 3.92.46 5.63 1.43" class="clsDFIR-1" data-name="Path 984"/><path id="Path_985" d="M14.82 29.72c.3-1.43.41-2.88.32-4.34-.05-.84-.09-1.73-.08-2.62" class="clsDFIR-1" data-name="Path 985"/><path id="Line_24" d="m36.03 34.84 1.07 1.08" class="clsDFIR-1" data-name="Line 24"/><path id="Path_986" d="m41.15 42.3-3.89-3.89c-.64-.64-.64-1.69 0-2.33s1.69-.64 2.33 0l3.89 3.89c.64.64.64 1.69 0 2.33-.64.64-1.69.64-2.33 0Z" class="clsDFIR-1" data-name="Path 986"/><path id="Path_987" d="M38.17 29.7c0-3.72-3.02-6.74-6.74-6.74s-6.74 3.02-6.74 6.74 3.02 6.74 6.74 6.74h0c3.72 0 6.74-3.02 6.74-6.74Z" class="clsDFIR-1" data-name="Path 987"/><path id="Line_25" d="M31.44 30.34v-4.53" class="clsDFIR-1" data-name="Line 25"/><circle id="Ellipse_56" cx="31.44" cy="32.89" r=".37" class="clsDFIR-1" data-name="Ellipse 56"/></g></svg> <h3>Digital Forensics and Incident Response</h3> <p>Stop attackers in their tracks with our unlimited incident response with threat suppression guarantee. eSentire Digital Forensics and Incident Response services are available as IR Readiness, Incident Response Retainer or Emergency Incident Response Services.</p> </div> <a href="/what-we-do/digital-forensics-and-incident-response">LEARN MORE →</a> </div> </div> </div> </div> </section> <section class="ComplianceCallout"> <div class="ComplianceCallout__Content"> <h2>Meet Your PCI DSS Compliance Requirements</h2> <div class="ComplianceCallout__Grids"> <div class="ComplianceCallout__Grid"> <p>The Payment Card Industry (PCI) Security Standards Council is focused on protection of payment account data throughout the payment lifecycle through the Payment Card Industry Data Security Standard (PCI DSS). Any retailer that transacts with any one of the major credit card companies must adhere to the PCI Data Security Standards.</p> <p>PCI DSS directs how organizations should securely manage credit card account numbers and payment card data to best protect the collection, storage, and transmission of cardholder data from e-commerce transactions.</p> <p>Compliance with PCI DSS may seem challenging but we are here to help you navigate these requirements. Download this checklist to see how eSentire’s services map to PCI DSS 3.2.1 and find out how we can support you in adhering to compliance requirements.</p> </div> <div class="ComplianceCallout__Grid"> <div class="ComplianceCallout__GridBox"> <div class="ComplianceCallout__GridBoxTop"> <img src="https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assetsV4/Common/Industries/pci-dss-compliant-logo.png" alt="PCI DSS Compliant Logo"> </div> <div class="ComplianceCallout__GridBoxBottom"> <p>eSentire has achieved the most stringent certification in PCI DSS compliance conducted by an independent auditor to demonstrate:</p> <ul> <li>A proactive approach to security and industry compliance requirements</li> <li>Sensitivity to our clients' specific needs and business objectives</li> <li>Ability to help our clients meet the global PCI DSS compliance standards</li> </ul> <a href="/resources/library/pci-dss-3-2-1-checklist-for-protecting-payment-account-data">DOWNLOAD THE PCI DSS 3.2.1. CHECKLIST</a> </div> </div> </div> </div> </div> </section> <script src="https://cdn.jsdelivr.net/npm/swiper@9/swiper-bundle.min.js"></script> <section class="TestimonialsSliderV2 TestimonialsSlider__V2 TestimonialsSliderV2__Retail"> <div class="TestimonialsSliderV2__Content"> <h2>Why Retail Organizations Choose eSentire</h2> <div class="swiper TestimonialsSliderV2__Slides"> <div class="swiper-wrapper"> <div class="TestimonialsSliderV2__SlideContainer swiper-slide"> <div class="TestimonialsSliderV2__Slide"> <div class="TestimonialsSliderV2__SlideIcon"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 59 59"><defs><clipPath id="a"><path d="M0 0h59v59H0z" style="stroke-width:0;fill:none"/></clipPath></defs><path d="M0 0h59v59H0z" style="fill:#40c3d9;stroke-width:0"/><g><path d="M18.44 42.03c-2.5 0-4.33-.57-5.47-1.71a5.819 5.819 0 0 1-1.71-4.3v-1.75c0-1.65.24-3.3.71-4.89.95-3.29 2.58-6.33 4.8-8.93a25.06 25.06 0 0 1 3.59-3.47h7.77a37.277 37.277 0 0 0-4.72 5.09 18.88 18.88 0 0 0-2.97 5.76c1.55.2 2.95.99 3.93 2.21a6.378 6.378 0 0 1 1.25 3.88v2.09c.05 1.61-.57 3.16-1.71 4.3-1.14 1.14-2.97 1.71-5.47 1.71m19.62.01c-2.51 0-4.33-.57-5.47-1.71a5.819 5.819 0 0 1-1.71-4.3v-1.75c0-1.65.25-3.3.71-4.89.95-3.29 2.58-6.33 4.8-8.93 1.08-1.27 2.28-2.43 3.59-3.47h7.76c-1.72 1.55-3.3 3.25-4.72 5.09a18.969 18.969 0 0 0-2.96 5.76c1.55.2 2.96.99 3.93 2.21a6.378 6.378 0 0 1 1.25 3.88v2.09c.05 1.61-.57 3.16-1.71 4.3-1.14 1.14-2.97 1.71-5.47 1.71" style="fill:#0e142b;stroke-width:0"/></g></svg> </div> <div class="TestimonialsSliderV2__SlideTop TestimonialsSliderV2__SlideTop--Long TestimonialsSliderV2__SlideTop--VeryLong"> <blockquote>The one thing I always tell my superiors when they ask about why we're spending money with eSentire is that the support team is head and shoulders above the rest. Especially the people who proactively reach out, they are some of the smartest, most capable folks we talk to. Normally, you have to escalate to their tier three before you get somebody like that. You Know, when I get a call at three in the morning, the SOC Analyst has already looked at the case. He knows all the notes on it. He's ready to tell me everything about it. What they're going to do next, and all the need is my authorization or my input. So no, I don''t necessarily have feedback for improvement. What my feedback is, you know, you are all knocking it out of the park in terms of being a partner for us. So we're super happy with eSentire. And I tell my boss this all the time: eSentire is the most responsive and capable partner that we've got."</blockquote> <h5>Scott Tucker</h5> <h6>IT Manager | Graphics Solutions Group, Inc.</h6> </div> <div class="TestimonialsSliderV2__SlideBottom"> <img src="https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/Common/Testimonials/gsg-greyscale-quote-logo.png" alt="Gsg greyscale quote logo" /> </div> </div> </div> </div> <button class="TestimonialsSliderV2__SlideBtn TestimonialsSliderV2__SlideBtn-next"><svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsIconNextTestiV2-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_1-2"><g id="Component_1_3"><path id="Path_2972-2" d="M37.22 19.11c0 10-8.11 18.11-18.11 18.11S1 29.11 1 19.11 9.11 1 19.11 1c0 0 0 0 0 0 10 0 18.11 8.11 18.11 18.11Z" class="clsIconNextTestiV2-1"/><path id="Path_2973-2" d="m15.45 27.41 9.87-8.31h0l-9.87-8.3" class="clsIconNextTestiV2-1"/></g></g></svg></button> <button class="TestimonialsSliderV2__SlideBtn TestimonialsSliderV2__SlideBtn-prev"><svg xmlns="http://www.w3.org/2000/svg" id="Layer_2" viewBox="0 0 38.22 38.22"><defs><style>.clsIconPrevTesti-1{fill:none;stroke:#0e142b;stroke-linecap:round;stroke-linejoin:round;stroke-width:2px}</style></defs><g id="Layer_1-2"><g id="Component_1_1"><path id="Path_2972" d="M1 19.11C1 9.11 9.11 1 19.11 1s18.11 8.11 18.11 18.11-8.11 18.11-18.11 18.11c0 0 0 0 0 0C9.11 37.22 1 29.11 1 19.11Z" class="clsIconPrevTesti-1"/><path id="Path_2973" d="m22.77 10.81-9.87 8.31h0l9.87 8.3" class="clsIconPrevTesti-1"/></g></g></svg></button> </div> <a class="TestimonialsSlider__Cta" href="/resources/mdr-and-cybersecurity-case-studies">Read more case studies and reviews →</a> </div> </section> <!-- Initialize Swiper --> <script> var swiper = new Swiper(".TestimonialsSliderV2__Slides", { slidesPerView: 1, spaceBetween: 10, loop: true, centeredSlides: true, navigation: { nextEl: ".TestimonialsSliderV2__SlideBtn-next", prevEl: ".TestimonialsSliderV2__SlideBtn-prev", }, autoplay: { delay: 5000, }, breakpoints: { // when window width is >= 767px 767: { loop: false, spaceBetween: 30, }, } }); </script> <section class="Recommended"> <div class="Recommended__Top"> <h2>Retail Cybersecurity Resources</h2> <p>Learn how eSentire proactively detects, disrupts, and remediates cyber threats before they impact your business</p> </div> <div class="Recommended__Bottom"> <a href="/resources/library/multi-signal-managed-detection-and-response-for-retail" class="Recommended__Block" data-aos="fade-up" data-aos-duration="1000" data-aos-delay="150"> <div class="Recommended__BlockTop"> <div class="Recommended__BlockTitle">SOLUTION BRIEF</div> <div class="Recommended__BlockSummary">Multi-Signal Managed Detection and Response for Retail</div> </div> <div class="Recommended__BlockFooter">READ NOW →</div> </a> <a href="/resources/library/securing-the-retail-supply-chain" class="Recommended__Block" data-aos="fade-up" data-aos-duration="1000" data-aos-delay="150"> <div class="Recommended__BlockTop"> <div class="Recommended__BlockTitle">WHITE PAPER</div> <div class="Recommended__BlockSummary">Securing the Retail Supply Chain</div> </div> <div class="Recommended__BlockFooter">DOWNLOAD NOW →</div> </a> <a href="/resources/library/pci-dss-3-2-1-checklist-for-protecting-payment-account-data" class="Recommended__Block" data-aos="fade-up" data-aos-duration="1000" data-aos-delay="150"> <div class="Recommended__BlockTop"> <div class="Recommended__BlockTitle">CHECKLIST</div> <div class="Recommended__BlockSummary">PCI DSS 3.2.1 Checklist for Protecting Payment Account Data</div> </div> <div class="Recommended__BlockFooter">DOWNLOAD NOW →</div> </a> </div> <div class="Recommended__Cta"> <div class="Recommended__CtaLeft"> <h3>View our resources to learn more about how cyber threats impact the retail industry.</h3> </div> <div class="Recommended__CtaRight"> <a href="/resources/library?industries%5B%5D=Retail">VIEW ALL RESOURCES</a> </div> </div> </section> <section class="GetStartedLong"> <div class="GetStartedLong__Content"> <div class="GetStartedLong__Grid"> <div class="GetStartedLong__GridLeft"> <h2>Ready to<br>Get Started?</h2> <p>We’re here to help! Submit your information and an eSentire representative will be in touch to help you build a more resilient security operation for your retail organization.</p> </div> <div class="GetStartedLong__GridRight"> <iframe id="GetStarted__IframeEmbed" class="GetStartedLong__GridForm" scrolling="no" src="https://mdr.esentire.com/l/651833/2022-01-11/lsxf7"></iframe> </div> </div> </div> </section> <script> var getStartedFrame = document.getElementById("GetStarted__IframeEmbed"); var URLWithParametersAdded = new URL(getStartedFrame.src+window.location.search); if (!window.location.search.includes('gclid') && readCookie('gclid') != null) { URLWithParametersAdded.searchParams.append('gclid', readCookie('gclid')); } if (!window.location.search.includes('kpid') && readCookie('kpid') != null) { URLWithParametersAdded.searchParams.append('kpid', readCookie('kpid')); } if (!window.location.search.includes('sfcampaignid') && readCookie('sfcampaignid') != null) { URLWithParametersAdded.searchParams.append('sfcampaignid', readCookie('sfcampaignid')); } if (!window.location.search.includes('msclkid') && readCookie('msclkid') != null) { URLWithParametersAdded.searchParams.append('msclkid', readCookie('msclkid')); } if (!window.location.search.includes('li_fat_id') && readCookie('li_fat_id') != null) { URLWithParametersAdded.searchParams.append('li_fat_id', readCookie('li_fat_id')); } if (!window.location.search.includes('utm_source') && readCookie('utm_source') != null) { URLWithParametersAdded.searchParams.append('utm_source', readCookie('utm_source')); } if (!window.location.search.includes('utm_medium') && readCookie('utm_medium') != null) { URLWithParametersAdded.searchParams.append('utm_medium', readCookie('utm_medium')); } if (!window.location.search.includes('utm_campaign') && readCookie('utm_campaign') != null) { URLWithParametersAdded.searchParams.append('utm_campaign', readCookie('utm_campaign')); } if (!window.location.search.includes('utm_content') && readCookie('utm_content') != null) { URLWithParametersAdded.searchParams.append('utm_content', readCookie('utm_content')); } getStartedFrame.src = URLWithParametersAdded; </script> <div id="cookie-consent" class="CookieConsent"> <div class="CookieConsent__Content"> <div class="CookieConsent__Row"> <div class="CookieConsent__Left"> <p>Cookies allow us to deliver the best possible experience for you on our website - by continuing to use our website or by closing this box, you are consenting to our use of cookies. Visit our <a href="/legal/privacy-policy" target="_blank">Privacy Policy</a> to learn more.</p> </div> <div class="CookieConsent__Right"> <a onclick="acceptCookieConsent();">Accept</a> </div> </div> </div> </div> <!-- Block: Footer --> <div class="Footer"> <div class="Footer__Contact"> <div class="Footer__ContactMessage">ARE YOU EXPERIENCING A SECURITY INCIDENT OR HAVE YOU BEEN BREACHED?</div> <a class="Footer__ContactNumber" href="tel:1-866-579-2200">Call 1-866-579-2200</a> </div> <div class="Footer__Content"> <div class="Footer__Top"> <div class="Footer__TopContent"> <div class="Footer__TopLeft"> <div class="Footer__TopLeftLogo"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 27.12 27.12"><circle cx="13.56" cy="13.56" r="13.56" style="fill:#263c91"/><path d="M17.82 8.59c-1.2-1.54-3.24-1.53-3.24-1.53h-2.04S10.5 7.05 9.3 8.59c-.73.94-.89 1.84-.89 2.47v5.01c0 .63.16 1.53.89 2.47 1.2 1.54 3.24 1.53 3.24 1.53h6.17v-2.89h-5.55s-.81 0-1.29-.61c-.29-.37-.36-.73-.36-.98V15h7.2v-3.93c0-.63-.16-1.53-.89-2.47Zm-6.31 2.78c0-.25.06-.61.36-.98.48-.61 1.29-.61 1.29-.61h.82s.81 0 1.29.61c.29.37.36.73.36.98v.76h-4.11v-.76Z" style="fill:#fff"/></svg> </div> <div class="Footer__TopLeftCopy"> <h3>The Proven Choice for <br>Managed Detection and Response</h3> <div class="Footer__TopLeftCopyCTAs"> <a href="/get-started">GET STARTED <span>→</span></a> <a href="https://esentire.channeltivity.com/Login" target="_blank">PARTNER LOGIN <span>→</span></a> </div> </div> </div> <div class="Footer__TopRight"> <div class="Footer__TopRightCopy"> <h3>Sales and <br>Customer Support</h3> </div> <div class="Footer__TopRightLinks"> <a href="tel:1-866-579-2200" class="Footer__TopRightLink"> <span>NORTH AMERICA</span> <span>1-866-579-2200</span> </a> <a href="tel:+44(0)8000 443242" class="Footer__TopRightLink"> <span>EMEA</span> <span>(0)8000-443242</span> </a> <a href="tel:+1 519 651 2200" class="Footer__TopRightLink"> <span>ANZ/APAC</span> <span>1-519-651-2200</span> </a> </div> </div> </div> </div> <div class="Footer__Middle"> <div class="Footer__MiddleContent"> <div class="Footer__MiddleSocialForm"> <div class="Footer__MiddleSocial"> <a href="https://ca.linkedin.com/company/esentire-inc-" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" id="Layer_1" viewBox="0 0 34.62 35.53"><defs><style>.clsLinkedFooterIcon-1{fill:#172143;stroke-width:0}</style></defs><g id="Component_61_4"><path id="Rectangle_602" d="M2.96 12.68h6.21v19.79H2.96z" class="clsLinkedFooterIcon-1"/><path id="Path_1036" d="M25.95 12.24c-.23-.03-.47-.04-.72-.05-2.38-.13-4.66.92-6.12 2.8-.1.12-.19.25-.27.39v-2.65H12.9v19.79h6.21v-9.3c-.15-1.36.04-2.74.57-4 .56-.99 1.62-1.59 2.76-1.55a3.29 3.29 0 0 1 3.5 3.06V32.61h6.21V19.7c0-4.42-2.24-7.03-6.21-7.46" class="clsLinkedFooterIcon-1"/><path id="Path_1037" d="M9.67 6.52c0 1.99-1.61 3.6-3.6 3.6s-3.6-1.61-3.6-3.6 1.61-3.6 3.6-3.6 3.6 1.61 3.6 3.6" class="clsLinkedFooterIcon-1"/></g></svg> </a> <a href="https://twitter.com/eSentire" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 34.32 35.52"><path d="M25.65 5.92h4.53l-9.89 11.3L31.92 32.6h-9.11l-7.13-9.33-8.16 9.33H2.98l10.58-12.09L2.4 5.91h9.34l6.45 8.53 7.46-8.52ZM24.06 29.9h2.51L10.38 8.49H7.69L24.06 29.9Z" style="fill:#172143;stroke-width:0"/></svg> </a> <a href="https://www.youtube.com/c/eSentireInc" target="_blank"> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 43.64 35.51"><path d="M35.02 8.42H8.63c-3.53 0-6.38 2.86-6.38 6.38v11.42c0 3.53 2.86 6.38 6.38 6.38h26.39c3.53 0 6.38-2.86 6.38-6.38V14.8c0-3.53-2.86-6.38-6.38-6.38ZM17.88 26.37V14.63l10.17 5.87-10.17 5.87Z" style="fill:#172143;stroke-width:0"/></svg> </a> </div> <div class="Footer__MiddleForm"> <iframe id="Footer__IframeEmbed" scrolling="no" src="https://mdr.esentire.com/l/651833/2023-08-01/2pz6mw"></iframe> </div> </div> <div class="Footer__MiddleGrid"> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>What we do</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/what-we-do/esentire-managed-detection-and-response">Managed Detection and Response</a> <a href="/what-we-do/digital-forensics-and-incident-response">Digital Forensics and Incident Response</a> <a href="/what-we-do/exposure-vulnerability-and-risk-management">Exposure Management Services</a> <a href="/what-we-do/xdr-extended-detection-and-response">Extended Detection and Response (XDR)</a> <a href="/what-we-do/security-operations-center">Security Operations Center (SOC)</a> <a href="/what-we-do/mdr-integrations">Technology Integrations</a> <a href="/what-we-do/threat-response-unit">Threat Response Unit (TRU)</a> <a href="/what-we-do/team-esentire">Cyber Resilience Team</a> <a href="/what-we-do/esentire-managed-detection-and-response/microsoft-mdr">MDR for Microsoft</a> <a href="/what-we-do/esentire-managed-detection-and-response/aws-cloud-security">MDR for AWS</a> <a href="/what-we-do/esentire-managed-detection-and-response/mdr-for-genai">MDR for GenAI</a> <a href="/what-we-do/esentire-managed-detection-and-response/response-and-remediation">Response and Remediation</a> <a href="/how-we-do-it/mdr-pricing-packaging">MDR Pricing</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>How we do it</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/how-we-do-it/signals/mdr-for-endpoint">Endpoint</a> <a href="/how-we-do-it/signals/mdr-for-network">Network</a> <a href="/how-we-do-it/signals/mdr-for-log">Log</a> <a href="/how-we-do-it/signals/cloud">Cloud</a> <a href="/how-we-do-it/signals/identity">Identity</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Industries</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/how-we-do-it/industries/insurance-cybersecurity">Insurance</a> <a href="/how-we-do-it/industries/construction-cybersecurity">Construction</a> <a href="/how-we-do-it/industries/financial-services-cybersecurity">Finance</a> <a href="/how-we-do-it/industries/legal-cybersecurity">Legal</a> <a href="/how-we-do-it/industries/manufacturing-cybersecurity">Manufacturing</a> <a href="/how-we-do-it/industries/private-equity-cybersecurity">Private Equity</a> <a href="/how-we-do-it/industries/healthcare-cybersecurity">Healthcare</a> <a href="/how-we-do-it/industries/retail-cybersecurity">Retail</a> <a href="/how-we-do-it/industries/food-supply-cybersecurity">Food Supply</a> <a href="/how-we-do-it/industries/state-local-governments-cybersecurity">Government and Education</a> <a href="/how-we-do-it/industries/automotive-dealerships">Automotive Dealerships</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Use Cases</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/how-we-do-it/use-cases/ransomware">Ransomware</a> <a href="/how-we-do-it/use-cases/third-party-cyber-risk">Third-Party Risk</a> <a href="/how-we-do-it/use-cases/sensitive-data">Sensitive Data Security</a> <a href="/how-we-do-it/use-cases/cloud-misconfiguration-breaches">Cloud Misconfiguration</a> <a href="/how-we-do-it/use-cases/zero-day-exploits">Zero Day Attacks</a> <a href="/how-we-do-it/use-cases/cyber-risk-management">Cyber Risk</a> <a href="/how-we-do-it/use-cases/cybersecurity-compliance">Cybersecurity Compliance</a> <a href="/how-we-do-it/use-cases/mdr-outsourcing">Do More With Less</a> <a href="/how-we-do-it/use-cases/meet-cyber-insurance-requirements">Cyber Insurance</a> <a href="/how-we-do-it/use-cases/security-leadership">Security Leadership</a> <a href="/how-we-do-it/use-cases/cyber-threat-intelligence">Cyber Threat Intelligence</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Resources</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/resources/security-advisories">Security Advisories</a> <a href="/resources/blog">Blog</a> <a href="/resources/library">Resource Library</a> <a href="/resources/video-library">Video Library</a> <a href="/resources/tru-intelligence-center">TRU Intelligence Center</a> <a href="/resources/mdr-and-cybersecurity-case-studies">Case Studies</a> <a href="/switch-to-esentire">Switch to eSentire</a> <a href="/consolidate-and-save">Consolidate & Save</a> <a href="/next-level-mdr">Experience Next Level MDR</a> <a href="/esentire-mdr-vs-everyone">Real vs. Fake MDR</a> <a href="/esentire-mdr-vs-everyone/compare">Compare MDR Vendors</a> <a href="/cybersecurity-fundamentals-defined">Cybersecurity Glossary</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Tools</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/cybersecurity-assessment-tool">Cybersecurity Assessment</a> <a href="/mdr-roi-calculator">MDR ROI Calculator</a> <a href="/security-operations-center-pricing-calculator">SOC Calculator</a> <a href="/mitre-attck-framework-tool">MITRE ATT&CK® Tool</a> </nav> </div> <div class="Footer__LinksGroup"> <div class="Footer__LinksGroupHeader"> <h5>Company</h5> <svg viewBox="0 0 15 9" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M14.24 0.75L7.49 7.49L0.75 0.75" stroke="currentColor" stroke-width="1.5" stroke-miterlimit="10" stroke-linecap="round" stroke-linejoin="round"/> </svg> </div> <nav> <a href="/company/about-us">About Us</a> <a href="/company/leadership">Leadership</a> <a href="/company/newsroom">Newsroom</a> <a href="/company/event-calendar">Event Calendar</a> <a href="/company/careers">Careers</a> <a href="/partners">Partners</a> <a href="/en-au-nz/switch-to-esentire">Australia & New Zealand</a> <a href="/en-gb/switch-to-esentire">United Kingdom</a> </nav> </div> </div> </div> </div> <div class="Footer__Legal"> <p>2025 eSentire, Inc. All Rights Reserved.</p> <nav class="Footer__LegalNav"> <a href="/sitemap">Sitemap</a> <a href="/legal/terms-and-conditions">Terms and Conditions</a> <a href="/legal/privacy-policy">Privacy Policy</a> <a href="/legal/accessibility">Accessibility</a> <a href="/legal/documents">Legal</a> </nav> </div> </div> </div> <script> // Create cookie function setCookie(cname, cvalue, exdays) { const d = new Date(); d.setTime(d.getTime() + (exdays*24*60*60*1000)); let expires = "expires="+ d.toUTCString(); document.cookie = cname + "=" + cvalue + ";" + expires + ";path=/"; } // Delete cookie function deleteCookie(cname) { const d = new Date(); d.setTime(d.getTime() + (24*60*60*1000)); let expires = "expires="+ d.toUTCString(); document.cookie = cname + "=;" + expires + ";path=/"; } // Read cookie function getCookie(cname) { let name = cname + "="; let decodedCookie = decodeURIComponent(document.cookie); let ca = decodedCookie.split(';'); for(let i = 0; i <ca.length; i++) { let c = ca[i]; while (c.charAt(0) == ' ') { c = c.substring(1); } if (c.indexOf(name) == 0) { return c.substring(name.length, c.length); } } return ""; } // Set cookie consent function acceptCookieConsent(){ deleteCookie('user_cookie_consent'); setCookie('user_cookie_consent', 1, 30); document.getElementById("cookie-consent").classList.remove('show'); } let cookie_consent = getCookie("user_cookie_consent"); if(cookie_consent != ""){ }else{ document.getElementById("cookie-consent").classList.add('show'); } </script> <script> var getStartedFrame = document.getElementById("Footer__IframeEmbed"); var URLWithParametersAdded2 = new URL(getStartedFrame.src+window.location.search); if (!window.location.search.includes('gclid') && readCookie('gclid') != null) { URLWithParametersAdded2.searchParams.append('gclid', readCookie('gclid')); } if (!window.location.search.includes('kpid') && readCookie('kpid') != null) { URLWithParametersAdded2.searchParams.append('kpid', readCookie('kpid')); } if (!window.location.search.includes('sfcampaignid') && readCookie('sfcampaignid') != null) { URLWithParametersAdded2.searchParams.append('sfcampaignid', readCookie('sfcampaignid')); } if (!window.location.search.includes('msclkid') && readCookie('msclkid') != null) { URLWithParametersAdded2.searchParams.append('msclkid', readCookie('msclkid')); } if (!window.location.search.includes('li_fat_id') && readCookie('li_fat_id') != null) { URLWithParametersAdded2.searchParams.append('li_fat_id', readCookie('li_fat_id')); } if (!window.location.search.includes('utm_source') && readCookie('utm_source') != null) { URLWithParametersAdded2.searchParams.append('utm_source', readCookie('utm_source')); } if (!window.location.search.includes('utm_medium') && readCookie('utm_medium') != null) { URLWithParametersAdded2.searchParams.append('utm_medium', readCookie('utm_medium')); } if (!window.location.search.includes('utm_campaign') && readCookie('utm_campaign') != null) { URLWithParametersAdded2.searchParams.append('utm_campaign', readCookie('utm_campaign')); } if (!window.location.search.includes('utm_content') && readCookie('utm_content') != null) { URLWithParametersAdded2.searchParams.append('utm_content', readCookie('utm_content')); } getStartedFrame.src = URLWithParametersAdded2; </script> <script type="application/ld+json">{"@context":"http://schema.org","@graph":[{"@type":"WebPage","author":{"@id":"https://www.esentire.com/#identity"},"copyrightHolder":{"@id":"https://www.esentire.com/#identity"},"copyrightYear":"2021","creator":{"@id":"https://www.esentire.com/#creator"},"dateCreated":"2022-05-05T09:14:51-04:00","dateModified":"2024-09-10T10:26:36-04:00","datePublished":"2021-09-15T14:00:00-04:00","description":"See how eSentire proactively detects, disrupts, and remediates retail industry cybersecurity threats before they impact your business and your customers.","headline":"Managed Detection and Response for Retail Companies","image":{"@type":"ImageObject","url":"https://esentire-dot-com-assets.s3.amazonaws.com/assetsV4/External/SEO/eSentire_retail_meta-100.jpg"},"inLanguage":"en-us","mainEntityOfPage":"https://www.esentire.com/how-we-do-it/industries/retail-cybersecurity","name":"Managed Detection and Response for Retail Companies","publisher":{"@id":"https://www.esentire.com/#creator"},"url":"https://www.esentire.com/how-we-do-it/industries/retail-cybersecurity"},{"@id":"https://www.esentire.com/#identity","@type":"LocalBusiness","address":{"@type":"PostalAddress","addressCountry":"CA","addressLocality":"Waterloo","addressRegion":"Ontario","postalCode":"N2L 3X2","streetAddress":"451 Phillip St, Suite 135, ON"},"alternateName":"eSentire Corporate Marketing","description":"eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire’s award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit www.esentire.com and follow @webinars.","email":"info@esentire.com","founder":"Eldon Sprickerhoff","foundingDate":"2001-01-01","foundingLocation":"Waterloo, Ontario","geo":{"@type":"GeoCoordinates","latitude":"43.48356169301266","longitude":"-80.54315326704616"},"image":{"@type":"ImageObject","height":"512","url":"https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assets/eSentire_emblem_512x512.jpg","width":"512"},"logo":{"@type":"ImageObject","height":"60","url":"https://esentire-dot-com-assets.s3.amazonaws.com/assets/_600x60_fit_center-center_82_none/302747/eSentire_emblem_512x512.png?mtime=1709753172","width":"60"},"name":"eSentire Inc.","openingHoursSpecification":[{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Sunday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Monday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Tuesday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Wednesday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Thursday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Friday"],"opens":"09:00:00"},{"@type":"OpeningHoursSpecification","closes":"09:00:00","dayOfWeek":["Saturday"],"opens":"09:00:00"}],"priceRange":"$$$","telephone":"1-866-579-2200","url":"https://www.esentire.com"},{"@id":"https://www.esentire.com/#creator","@type":"ProfessionalService","address":{"@type":"PostalAddress","addressCountry":"CA","addressLocality":"Waterloo","addressRegion":"Ontario","postalCode":"N2L 3X2","streetAddress":"451 Phillip St, Suite 135, ON"},"alternateName":"eSentire Corporate Marketing","email":"info@esentire.com","founder":"Eldon Sprickerhoff","foundingDate":"2001-01-01","foundingLocation":"Waterloo, Ontario","geo":{"@type":"GeoCoordinates","latitude":"43.48356169301266","longitude":"-80.54315326704616"},"image":{"@type":"ImageObject","height":"512","url":"https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assets/eSentire_emblem_512x512.jpg","width":"512"},"logo":{"@type":"ImageObject","height":"60","url":"https://esentire-dot-com-assets.s3.amazonaws.com/assets/_600x60_fit_center-center_82_none/302747/eSentire_emblem_512x512.png?mtime=1709753172","width":"60"},"name":"eSentire Inc.","priceRange":"$$$","telephone":"1-866-579-2200","url":"https://www.esentire.com"},{"@type":"BreadcrumbList","description":"Breadcrumbs list","itemListElement":[{"@type":"ListItem","item":"https://www.esentire.com","name":"Homepage","position":1},{"@type":"ListItem","item":"https://www.esentire.com/how-we-do-it","name":"How We Do It","position":2},{"@type":"ListItem","item":"https://www.esentire.com/how-we-do-it/industries","name":"Industries","position":3},{"@type":"ListItem","item":"https://www.esentire.com/how-we-do-it/industries/retail-cybersecurity","name":"Retail","position":4}],"name":"Breadcrumbs"}]}</script> <script src="/main.js?v=4.12.91"></script> <script src="/style.js"></script> <script type="text/javascript" src="https://unpkg.com/aos@2.3.1/dist/aos.js"></script> <script type="text/javascript"> function readCookie(c_name) { var c_value = document.cookie; var c_start = c_value.indexOf(" " + c_name + "="); if (c_start == -1) { c_start = c_value.indexOf(c_name + "="); } if (c_start == -1) { c_value = null; } else { c_start = c_value.indexOf("=", c_start) + 1; var c_end = c_value.indexOf(";", c_start); if (c_end == -1) { c_end = c_value.length; } c_value = unescape(c_value.substring(c_start, c_end)); } return c_value; } </script> <script> AOS.init(); </script> <noscript> <img src="https://ws.zoominfo.com/pixel/3k8XsFBkOniCq5dTRwpV" alt="ZoomInfo Image for Video" width="1" height="1" style="display: none;" /> </noscript> <script type="text/javascript"> window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.defer = true; mf.src = "//cdn.mouseflow.com/projects/ce788296-8259-4e39-bcae-56ddd5b7e767.js"; document.getElementsByTagName("head")[0].appendChild(mf); })(); </script> </body> </html><!-- Cached by Blitz on 2025-02-14T19:40:29-05:00 --><!-- Served by Blitz on 2025-02-17T02:39:38-05:00 -->

Pages: 1 2 3 4 5 6 7 8 9 10