What We Do
How we do it
Oct 19, 2021
Hackers Infect Employees of Law Firms, Manufacturing Companies, and Financial Services Orgs. with Increasingly Pervasive Infostealer, SolarMarker
SolarMarker Infects 5X More Corporate Victims Using Over a Million Poisoned WordPress Pages Key Takeaways eSentire has observed a fivefold increase in SolarMarker infections. Prior to September, eSentire’s Threat Response Unit (TRU) detected and shut down one infection per week. Beginning in September, TRU averaged the detection and shutdown of five per week. SolarMarker is a…
Read More
View all Advisories →
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
Oct 12, 2021
eSentire Launches MDR with Microsoft Azure Sentinel Extending Response Capabilities Across Entire Microsoft Security Ecosystem
Waterloo, ON – Oct. 12, 2021 -- eSentire, recognized globally as the Authority in Managed Detection and Response (MDR), today announced the expansion of its award-winning MDR services with Microsoft Azure Sentinel, as part of its integration with the complete Microsoft 365 Defender and Azure Defender product suites supporting Microsoft SIEM, endpoint, identity, email and cloud security services.…
Read More
Our award-winning partner program offers financial rewards, sales and marketing tools and personalized training. Accelerate your business and grow your revenue by offering our world-class Managed Detection and Response (MDR) services.
Learn about our Partner Program
Apply today to partner with the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Blog — Oct 07, 2021

How to Secure Your Multi-Cloud Environment

Over the past few years, we have seen a significant movement towards the adoption of cloud computing and cloud security. In addition to storing critical data assets solely in physical data centers (“on-prem environment”), organizations are utilizing the cloud to store and maintain these critical data assets, largely due to its cost-effectiveness, instant scalability, and reliability.

In fact, while some organizations maintain a strictly cloud environment, many others have chosen to utilize cloud and on-prem environments (“hybrid environment”) to run their applications seamlessly.

However, we have also seen the adoption of multi-cloud, especially given the monumental rise of cloud providers like Microsoft Azure, Google Cloud, and Amazon Web Services (AWS). The 2021 State of the Multicloud report highlights that 92% of organizations have adopted a multi-cloud strategy today, with 62% of organizations utilizing at least two cloud platforms.

A multi-cloud environment simply means that an organization is leveraging more than one cloud service provider (CSP), depending on which provider is the most appropriate solution for each use case. For example, your organization may choose to leverage AWS for infrastructure and Google Workspace for internal team collaboration.

Shared Responsibility Model in the Cloud

Regardless of the CSP chosen by your team, one thing is clear: when it comes to cloud security, every cloud service provider maintains a shared responsibility model. So, although the provider maintains some responsibility for securing their cloud environment, the organization also has to take responsibility over cloud security.

This means that you, as the cloud customer, will always be responsible for the data you store in the cloud and managing who has access to it. This is why cloud misconfigurations are a significant threat for cloud security. For example, if your organization uses AWS for data storage, the onus of securing that data storage and maintaining the integrity of that security will always fall on your organization, not on AWS.

Of course, the shared responsibility differs greatly between the use of IaaS, PaaS, and SaaS:

Simplifying Multi-Cloud Security with MDR for Cloud

One of the most fundamental challenges for securing data assets in the cloud is misconfigurations, which has resulted in multiple high-profile security breaches, such as with CapitalOne and Tesla. Of course, this is complicated further by the fact that each cloud service provider has their own set of best practices and toolsets for proper configuration and access management, known as the CIS benchmark. Therefore, it’s critical to have capabilities for cloud security posture management and 24/7 cloud threat detection and investigations in the cloud.

eSentire’s MDR for Cloud offering provides Cloud Security Posture Management (CSPM) as well as 24/7 Threat Detection and Investigation to ensure you have deep visibility into your cloud environment and that it’s protected from cloud-specific cyber threats.

This means your organization benefits from:

Your organization (alongside your security provider) must be aware of what resources are publicly accessible and what’s “typical behavior” for users and endpoints for those resources. Second, once those typical behaviors are established, your security provider can alert the SOC when there are deviations with any of those publicly accessible resources.

Here’s what a real-world example looks like of eSentire protecting your cloud assets:

Amazon Web Services (AWS)

Azure Sentinel & Azure Active Directory (AD)

Google Cloud Platform (GCP)

The Threat

A threat actor gains access to your AWS Elastic Compute Cloud (EC2) instance to download user data to harvest sensitive information or find additional AWS vulnerabilities.

A threat actor attempts to gain access to a user account by removing important security controls like multi-factor authentication (MFA)..

Threat actors can create cloud instances in unused geographic service regions to avoid detection since GCP users can maintain control over where the data is stored.

How eSentire Investigates and Responds

Our SOC analysts get alerted on suspicious query activity based on the proprietary detectors we have built. The SOC analysts then conduct deeper investigation to identify the source user, determine the exact instances where the downloads took place, and correlate the information with any other suspicious activity found.

A sudden change in MFA requirements is very unusual and a potential indicator of compromise. So, our 24/7 SOC Analysts are alerted via Azure Sentinel whenever MFA requirements are removed and follow a proprietary runbook to streamline the investigation process.

With the right context established and the eSentire Atlas XDR platform’s direct integration with Azure AD, our analyst can suspend the credentials of the user who removed the MFA policy, minimizing the risk of any other important security policies being tampered with

We use our proprietary GCP detector to scan for cloud activity in unused regions and alert our 24/7 SOC Analysts if any such activity is identified immediately.

If a true positive is confirmed, the user credentials are suspended and our analysts will perform additional investigations to determine whether additional malicious admin activities have happened.

Your Outcome

Once our SOC analysts conduct their investigations, you’re alerted on whether the incident is a true or false positive, full support over the incident response and resolution, and a 20-minute SLO for investigations, leading to a drastically reduced threat dwell-time.

It’s very clear that multi-cloud is the next chapter in the cloud adoption story, especially as there is no real need for businesses to rely solely on one platform anymore.

To learn more about eSentire simplifies multi-cloud security with MDR for Cloud offering, book a meeting with a security specialist now.


eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.