Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
eSentire is presenting at this event.
eSentire will be hosting a roundtable at the HFM Private Equity…
eSentire is a sponsor at this event.
This blog was originally published on CyFIR.com and has been reposted as-is here following eSentire’s acquisition of CyFIR Inc. in June 2021. As of the date of the acquisition, no changes have been made to the content below.
Today, most corporate information is created and recorded digitally. As a result, Corporate Security Departments need tools that provide visibility and control of a company’s digital environment. The following use case highlights how CyFIR Internal Investigation Services can support Corporate Security needs by safeguarding sensitive materials and providing insight into an employee’s network activity.
As Director of Corporate Security, Sydney had a busy job. The company operated in 14 countries across three continents, which created numerous risks to physical and information security. As a software business, one of the most important goals for her department was safeguarding intellectual property (IP), a task that continued to grow in complexity as the company expanded into new markets.
While many of the threats the company faced were external, Sydney also feared that one day a disgruntled employee might attempt to access and exfiltrate sensitive materials. Many countries in which the company operated lacked robust legal protection, and so it was critical to prevent their IP from leaving the organization.
To reduce the risk of IP theft, Sydney had introduced a system for evaluating risk for employees with access to sensitive materials. Moreover, Sydney knew that employees were more likely to exfiltrate sensitive data after receiving a disciplinary action. Using the CyFIR Enterprise Platform, Sydney implemented a procedure that automatically placed employees on a data monitoring program whenever any disciplinary action was taken against them.
Two months later, an employee working on one of their most sensitive programs was involved in a workplace dispute with a supervisor. Following protocol, Corporate Security placed file tracking filters on the employee’s system. These monitoring systems would alert Corporate Security if the employee attached removable media to his machine or began accessing files that matched several protected keywords. Later that night, Sydney received an alert that the employee was copying data from a network device to a USB drive attached to a company workstation. She immediately dispatched a team of security personnel to the workstation where the employee was caught red-handed. Since Sydney was notified of the activity before he could leave the building, no information was lost.
Sydney’s story demonstrates why Corporate Security Departments need tools to help manage complex, geographically distributed information systems that contain sensitive and proprietary information. By enabling security professionals to monitor access to network systems and even track the activity of targeted employees, CyFIR can significantly improve a company’s security posture. With CyFIR, companies gain the visibility and control necessary to effectively safeguard against potential IP thefts, pilfering of company lists, and other misuses of corporate systems.
Get notified of the latest news, intel and helpful tools & assets. You can unsubscribe anytime.
eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 1200+ organizations in 75+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.