Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports & papers.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
Episodes on cybersecurity strategy and threat intel.
Join eSentire’s half-day Cybersecurity Insights Summit to hear from a…
eSentire will be speaking and exhibiting at CIO Arena.
eSentire will be speaking at Advocate's Insider Summit.
Originally posted in Channel Partners December 11, 2019
We’re now in a machine-scale world, where the scale, complexity and dynamism of data exceeds human capacity to keep up with it. Traditional cybersecurity strategies aren’t fluid enough to keep pace with the adoption of emerging technology and platforms. The amount of data organizations take in continues to grow exponentially while groups are faced with a shortage of available cybersecurity talent that’s needed to process and protect this data. Every year in the United States, there are roughly 350,000 open roles for IT talent with security skills and experience.
The simple laws of supply and demand make it clear that designing and executing an effective security strategy is becoming more and more difficult. Emerging technologies such as artificial intelligence (AI) and machine learning (ML) present one potential way to make grappling with this mass amount of data easier, but they aren’t a cure-all. To be effective, these technologies must be coupled with a company culture centered on taking a proactive approach to security and threat detection.
The average midmarket team spins up as many as 10,000 pieces of information a day, from an expanding number of sources, but an average IT team can only handle about 5-10% of the information coming in. That means there is a huge mass of information being left unexamined. You’re essentially looking for a needle in a haystack, but you’re not even looking through all the hay.
It’s unrealistic to think that you’re going to be able to update your software, update the known threat list and keep your next-gen firewall fine-tuned and up to date. These are all good and necessary practices that you should be doing, but there’s just too much to keep up with. There’s already a lack of skilled individuals and, when coupled with the huge amount of data that continues to grow, it’s obvious that a new approach must be taken.
Here’s a visual: If the electromagnetic spectrum were the Brooklyn Bridge, the part humans could see would be only about 20 feet long. This is roughly the same ratio that exists in the world of cybersecurity and threat-hunting. What you see is only a small part of the picture, and it’s the things you can’t see that pose the greatest risk.
Even for a midmarket company, a properly tuned and adjusted alerting process will generate roughly 10,000 alerts a day. Most IT teams, staffed with two or three dedicated threat hunters at best, can only process 500-1,000 alerts a day at best. Now, most people would agree that 5-10% isn’t security, and it may not even be compliance.
Digitization and the drive to the cloud have exacerbated this problem by creating more threat vectors, more opportunities for criminals to penetrate a company’s security strategy. As the complexity of your environment grows, so too do the number of alerts generated. That figure of 10,000 alerts will only get larger. However, the number of alerts a team of three people can process will not improve significantly. And so, the gap continues to grow.
Given the vast amount of information coming into most IT teams, it’s unrealistic to think that humans alone will ever be able to tackle it. You have to use a zero-trust approach, and this data is borderline unusable unless you have a strategy for processing all of it.
One answer is to use machine learning and AI to help sort through the mountains of data, filter it and make it accessible for threat hunters to take action. Applying machine learning to the network’s security and IT logs at a massive scale properly categorizes false positives and benign alerts while surfacing and correlating signals that will expose a threat actor. This empowers security analysts to disrupt and contain threats. Combined with machine speed, your IT team will be able to detect threats as they happen and respond in minutes rather than hours. Whether or not you’re in a position to use AI, you simply have to have an answer for processing the massive volumes of data that can be generated by any number of security technologies.
Cybersecurity means many things to different people — caveat emptor is the rule of the day when vetting solutions. If your provider or vendor can’t tell you how they’re going to address false positives, how they’re going to find the needle in the haystack and how they’re looking for the real threat with a zero-trust approach, you don’t have security; you have a feel-good story.
It’s important to ask the right questions about the kind of investment required:
The digitized world runs at machine speed. Human speed alone, no matter how experienced and dedicated the SOC staff are, cannot meet the cyber threat. Even if enough SOC analysts could meet it, you wouldn’t be able to find enough of them due to the cybersecurity talent shortage. For the sake of security, you must use a zero-trust approach – but it must be coupled with an answer for addressing the massive volumes of data that are created. And, you need to have a solution that does what it promises to do. Use the questions above to make sure there are no nasty surprises when purchasing an AI or ML solution.
eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 1200+ organizations in 75+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.