Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Cyber risk and advisory programs that identify security gaps and build security strategies to address them.
XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Extend your team capabilities and prevent business disruption with expertise from eSentire.
Stop ransomware before it spreads.
Meet regulatory compliance mandates.
Detect and respond to zero-day exploits.
End misconfigurations and policy violations.
Defend third-party and supply chain risk.
Prevent disruption by outsourcing MDR.
Adopt a risk-based security approach.
Meet insurability requirements with MDR.
Protect your most sensitive data.
Defend brute force attacks, active intrusions and unauthorized scans.
Guard endpoints by isolating and remediating threats to prevent lateral spread.
Investigation and threat detection across multi-cloud or hybrid environments.
Remediate misconfigurations, vulnerabilities and policy violations.
Defend brute force attacks, active intrusions and unauthorized scans.
THE THREAT Beginning on March 24th, 2024, eSentire observed a significant increase in exploitation of CVE-2023-48788 (CVSS: 9.8). CVE-2023-48788 is a SQL injection flaw in FortiClientEMS…
Mar 14, 2024THE THREAT On March 12th, Fortinet issued a warning regarding a critical security flaw in its FortiClientEMS software. The vulnerability, identified as CVE-2023-48788 (CVSS: 9.8), is a SQL…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
We believe a multi-signal approach is paramount to protecting your complete attack surface. See why eSentire MDR means multi-signal telemetry and complete response.
See how our 24/7 SOC Cyber Analysts and Elite Threat Hunters stop even the most advanced cyberattacks before they disrupt your business.
Choose the right mix of Managed Detection and Response, Exposure Management, and Incident Response services to strengthen your cyber resilience.
Try our interactive tools including the MITRE ATT&CK Tool, the SOC Pricing Calculator, the Cybersecurity Maturity Assessment, and our MDR ROI Calculator.
Read the latest security advisories, blogs, reports, industry publications and webinars published by eSentire's Threat Response Unit (TRU).
See why 2000+ organizations count on eSentire to build resilience and prevent business disruption.
On January 4th the marketing firm Octly discovered that, due to a misconfiguration in their Amazon Web Services (AWS) cloud storage, the private information of 12,000 clients was publicly available for anyone to view. This blunder revealed client names, addresses, phone numbers, email addresses, hashed passwords and more. Cloud security mistakes similar to this have become all too common in recent years and have caused both reputational and financial damage for companies. The now infamous Uber breach occurred when two hackers were able to gain entry to a third-party cloud-based service provider where sensitive driver and customer data was stored. In September 2017 it was revealed that the Pentagon had left 100 GB of classified data from a failed joint intelligence-sharing program—run by the US Army and National Security Agency—publicly accessible for years.
The explosive popularity of cloud computing has resulted in a new attack surface for cybercriminals with troves of valuable, sensitive and often poorly secured data. All of this begs the question: what risks exist for cloud data and how can they be mitigated?
If a cybercriminal gains access to a company’s cloud storage, there’s a variety of nefarious actions they can take. Depending on the type of data that is stored, proprietary information can be sold to competitors and personally identifiable information (PII) can either be used for fraud or sold on the dark web. Similar to the Uber breach, any of this information can be used in an extortionist attempt to force a ransom payment. If the cloud storage is configured to be publicly writable, cybercriminals will also be able to edit the stored documents. This vulnerability has been dubbed GhostWriter, and it is serious, as code can be altered or data manipulated to cause damage to the company.
Ransomware on the cloud is a relatively new idea but MIT has predicted cloud ransomware to be one of the biggest cyber security risks for 2018. With new threats like this appearing, and cloud storage becoming increasingly more integrated into business, an increased focus needs to be placed on cloud security.
Some of the largest cloud breaches over the last two years could have been prevented with proper security due diligence. The first step in securing cloud data is understanding what security responsibilities are covered by the cloud service provider and what steps need to be taken separately. Using a cloud service creates a shared security responsibility between the customer company and the cloud provider. If expectations are not clearly defined from the start, security holes may develop.
The next step to establishing strong cloud security is ensuring that stored data is categorized and documented. This should be done retroactively to be sure previously stored data is well documented. As previously stated, out of sight, out of mind. Keeping organized information on data stored in the cloud decreases the chance that private information will be stored in an insecure way. Data that is meant to be private must be stored in a cloud bucket set to private (not public).
Cloud storage buckets should have randomized names. This increases the difficulty of targeted attackers locating specific buckets belonging to the targeted company. It is also prudent to avoid the use of externally facing web portals. Although not always possible, this step will decrease the available attack surface.
Companies should have a regular auditing schedule to review what groups or individuals have access to data stored on the cloud. Once this has been established, permissions should be re-evaluated based on task requirements. It is highly recommended that all administrative accounts for cloud storage require multi-factor authentication, as this implementation will decrease the likelihood of account compromise. Similarly, following security best practices for passwords is highly recommended; this involves using a strong password or passphrase and never reusing the same password for multiple accounts.
Lastly, encryption should be implemented at rest, as well as in transit, for data stored on cloud infrastructure. Encryption is the last line of defence against the sinister characters looking to pilfer data. Keeping sensitive data encrypted will minimize the effect of a breach or leak and ensure that data meant to be private remains private.