Task-specific Atlas Agents investigate threats at machine speed with full transparency, expert validation, and explainable outcomes you can trust.
Atlas Extended Detection and ResponseOpen XDR with Agentic AI & machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Atlas User ExperienceSee what our SOC sees, review investigations, and see how we are protecting your business.
Atlas Platform IntegrationsSeamless integrations and threat investigation that adapts to your tools and evolves with your business.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Threat Response Unit (TRU)Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Cyber Resilience TeamExtend your team capabilities and prevent business disruption with expertise from eSentire.
Response and RemediationWe balance automated blocks with rapid human-led investigations to manage threats.
Combine AI-driven security operations, multi-signal attack surface coverage and 24/7 Elite Threat Hunters to help you take your security program to the next level.
Get unlimited Incident Response with threat suppression guarantee - anytime, anywhere.
CTEM and advisory programs that identify security gaps and build proactive strategies to address them.
Flexible MDR pricing and packages that fit your unique security requirements.
Entry level foundational MDR coverage
Comprehensive Next Level eSentire MDR
Next Level eSentire MDR with Cyber Risk Advisors to continuously advance your security program
Stop ransomware before it spreads.
Identity ResponseStop identity-based cyberattacks.
Zero Day AttacksDetect and respond to zero-day exploits.
Cybersecurity ComplianceMeet regulatory compliance mandates.
Third-Party RiskDefend third-party and supply chain risk.
Cloud MisconfigurationEnd misconfigurations and policy violations.
Cyber RiskAdopt a risk-based security approach.
Mid-Market SecurityMid-market security essentials to prioritize.
Sensitive Data SecurityProtect your most sensitive data.
Cyber InsuranceMeet insurability requirements with MDR.
Cyber Threat IntelligenceOperationalize cyber threat intelligence.
Security LeadershipBuild a proven security program.
On April 11th, 2026, Adobe published a security advisory addressing a previously reported zero-day vulnerability impacting multiple versions of Acrobat Reader. The flaw, tracked as…
On March 31st, 2026, threat actors compromised the Axios npm (Node Package Manager) package, publishing two malicious versions, 1.14.1 and 0.30.4, to the npm registry. This supply chain…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
About Us Leadership Careers Event Calendar → Newsroom → Aston Villa Football Club →We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Search our site
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
We offer three flexible MDR pricing packages that can be customized to your unique needs.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
How Project Glasswing Changes the Threat Landscape, and What It Means for You
Last month, Anthropic disclosed that its Claude Mythos model had autonomously discovered thousands of zero-day vulnerabilities across every major operating system and web browser, many of which had gone undetected for one to two decades. Not a red team, or a nation-state. It is a frontier AI model, running at machine speed.
This is Project Glasswing, a defensive initiative backed by up to $100 million in Anthropic usage credits, deploying Mythos to scan the software infrastructure that modern enterprise runs on: Microsoft, Cisco, Apple, Palo Alto, CrowdStrike, and Google. The named launch partners are platform and infrastructure vendors whose code is being scanned, so vulnerabilities get patched before attackers can exploit them. That is genuinely good news.
The hard truth is the consequence: if a frontier AI model can find and chain complex zero-day exploits at this scale, so can the attacker. The window between vulnerability discovery and weaponization, once measured in months is now measured in hours and minutes. Periodic pen tests, quarterly scans, and detect-monitor-alert-respond models built for human attacker speed do not close that gap.
Attackers have always chosen when and where to strike. AI supercharges that asymmetry. Autonomous agents can now identify exploitable vulnerabilities at scale, chain multi-stage exploits, reverse-engineer patches to find bypass vectors, and launch coordinated attacks before your team reads the advisory.
The CSA–SANS briefing said it plainly: organizations need to introduce AI agents across their security operations and fundamentally re-evaluate their risk tolerance for shorter attacker timelines. The question is not whether that assessment is correct. The question is whether your security program is built for it.
eSentire is not a Glasswing launch partner. We are not scanning software codebases for vulnerabilities; that is the role of the platform vendors in the coalition. Our role is what happens after the vulnerability exists: when it is in your environment, when an attacker finds it, when the clock starts. That is where eSentire operates.
eSentire’s operating model includes penetration testing that can persistently probe your environment for exploitable threat vectors. This is a recommended approach to incorporate a living, breathing offensive simulation that extends existing vulnerability management and feeds directly into two outcomes: new or refined detection rules so Atlas knows what exploitation of that gap actually looks like in your environment and can detect if they are hit, and prioritized remediation guidance based on confirmed exploitability rather than generic CVSS scores. Attack-informed detections monitor the gaps while patching programs catch up, or better yet, integrate into orchestrated or autonomous remediation.
When Glasswing accelerates the volume of vulnerability disclosures, this is the model that absorbs it.
eSentire’s detection and investigation pipeline is AI-led by design. Atlas AI operatives triage, correlate, and investigate alerts at machine speed by performing autonomous investigations 43x deeper than traditional approaches, with 95% alignment to senior, tier 3 analyst decision-making. For well-understood threat patterns, investigation and response execute autonomously. No ticket queue, shift handoff or lag. The system continuously evolves to understand new patterns as the threat landscape shifts and eSentire’s Threat Response Unit (TRU) drives detection engineering and identifies leading indicators of compromise.
Not every threat can or should be handled autonomously. Where investigations are ambiguous, inconclusive, or carry blast radius that demands human judgment, Atlas escalates, calibrated by severity, your operational preferences, and confidence thresholds you define. AI agents on the front line, expert humans managing complexity, with the balance configurable as the threat landscape and AI investigation capability evolve. Using this model, eSentire achieves 99.99% threat containment at the initial host.
When NetScaler CVE-2026-3055 emerged, eSentire identified exploitation attempts across customer environments six days before industry-standard network detection rules were published. Our Threat Response Unit (TRU) correlated 28+ attacker IPs and pushed protections across all customers, blocking the activity before it could progress.
When Glasswing disclosures surface new vulnerabilities in the platforms you rely on, eSentire integrates that intelligence immediately: updated Atlas detection rules, proactive TRU advisories, exploit-informed remediation prioritization, and direct escalation from your named SOC team if a disclosure materially changes your risk profile. No action required from you.
Mythos found thousands of zero-days. Attackers have access to similar AI capabilities. The speed asymmetry that has always favored the attacker just got significantly wider. Security programs built on periodic assessments, reactive patching, and human-speed response are structurally mismatched to what is coming.
eSentire’s operating model - offensive testing, AI-led detection, controlled autonomy, machine-speed response, is built for this environment. The attack surface is getting harder to defend. The question is whether your security program is setting the pace, or if the attacker is.
Project Glasswing is a defensive cybersecurity initiative funded by Anthropic, deploying its unreleased Claude Mythos Preview model - a frontier AI system that has demonstrated the ability to surpass all but the most skilled humans at finding and exploiting software vulnerabilities. In its initial deployment, Mythos identified thousands of zero-day vulnerabilities, including critical flaws in every major operating system and web browser, many of which had gone undetected for one to two decades. Anthropic has committed up to $100 million in usage credits to support these efforts. The 12 named launch partners are primarily platform and infrastructure vendors - Amazon, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux Foundation, Microsoft, NVIDIA, and Palo Alto Networks - whose own software products are being scanned. An additional 40+ organizations with critical software infrastructure have been granted extended access.
Yes, meaningfully. AI models capable of discovering zero-day vulnerabilities at scale also compress the attacker’s timeline. When vulnerability discovery accelerates, exploitation follows. The practical implication is that periodic security assessments and reactive response models become increasingly inadequate as the gap between “vulnerability exists” and “vulnerability is exploited” shrinks from weeks to days or hours. eSentire addresses this shift through continuous offensive testing, AI-led autonomous investigation (43x deeper, 95% alignment to senior analyst decision-making), and multi-signal detection spanning endpoint, network, identity, cloud, email, browser, and logs. Full realization of an attack usually requires more than a single vulnerability or exploit, multi-signal coverage ensures detection across multiple surfaces.
eSentire’s Threat Response Unit (TRU) is actively tracking all vulnerability disclosures emerging from Glasswing and related AI-driven discovery efforts. When Glasswing partners disclose and patch vulnerabilities in platforms our customers use, TRU incorporates those findings into detection logic, threat hunting operations, and Atlas AI operative behavior immediately. Sentire’s role is different: we are the operational layer that detects and responds to the exploitation of vulnerabilities, including those that Glasswing and similar AI-driven efforts surface across your environment. The NetScaler CVE-2026-3055 response, where eSentire detected active exploitation six days before industry-wide advisories, is a concrete example of this model in action.
As Glasswing-discovered vulnerabilities are disclosed and patched by the affected vendors, you should expect: immediate integration of new vulnerability intelligence into Atlas detection rules and TRU threat hunting operations; proactive TRU advisories when disclosures are relevant to your specific technology stack; exploit-informed remediation prioritization so your team focuses on what is actually exploitable; and ongoing monitoring for exploitation attempts across all signal sources. If a disclosure materially changes the risk profile for platforms you rely on, your named eSentire SOC team will escalate directly with specific containment recommendations. No action is required to activate these protections — they are part of the continuous operating model already in place.
To learn how your organization can build cyber resilience and prevent business disruption with eSentire’s Next Level MDR, connect with an eSentire Security Specialist now.
GET STARTED
Mark Gillett is Vice President, Product Management at eSentire. He has nearly 25 years experience in the cybersecurity industry, driving the evolution of detection, investigation, and response from the early days of SIEM to modern-day Managed Detection and Response (MDR) and Extended Detection and Response (XDR). In his current leadership role at eSentire, Mark leads the product management function for the company's core MDR services, with a specific focus on in-house developed technologies that assist in delivering those services to customers. Mark holds a Bachelor of Science degree from Laurier University in Waterloo, Canada.