Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
I distinctly remember when the first Gartner Market Guide for Managed Detection and Response was released in 2016 when I worked for one of the world’s largest managed security service providers (MSSPs) with revenue growth that outpaced the market average. Asked for my impression by co-workers, I focused on dissecting the guide with the goal of defining strict criteria to determine “what is Managed Detection and Response?” and “how is it different from what we do as an MSSP and could it threaten our business model?”
Back then, the guide was somewhat ambiguous ... providing more recognition of an emerging category versus a definition. There were different perspectives from co-workers at that time, including that it was a Gartner marketing tactic to drive more revenue. However, I disagreed. One singular statement from the guide stuck with me: “Prevention is futile without detection and response capabilities.” What the analyst meant by detection was clear: response. And I felt THAT was the defining factor of MDR.
The incident response lifecycle covers a range of stages from initial detection all the way to recovery and hardening of systems against future attack. While each stage is critical in process continuity, containment is key. More importantly, rapid containment is critical.
In the MSSP model, containment is the customer’s responsibility. Alerts are generated according to service level agreements and passed on to the customer to complete the incident response lifecycle. If not completed in a timely manner, the consequences can be devastating.
This concept has never been more apparent than in recent news surrounding COVID-19. After effecting drastic measures to lock down citizens in Hubei Province in mid-February, China recently reported the first 24-hours free of new infections. In contrast, other countries such as Iran, Italy and the United States are seeing continued widespread infection as their response measures were delayed. Similar to how containment of human interaction can help reduce the pandemic curve, containment of digital infections results in reduced risk and safeguarding business continuity.
When MSSPs cut the incident response lifecycle off at alerts with generalized guidance, it shifts the burden of containment back to the customer resulting in the fact that rapid containment is typically too late. Incident response retainers are sold at an upcharge, however service level agreements for responder deployment comes with delays up to 48 hours.
Contrast that with the Managed Detection and Response model which shifts the incident response lifecycle, including containment, to the provider … then you have a model that is built to neutralize malicious spread. To associate some numbers to the importance of time to containment, the latest Black Report shows that 54 percent of attackers can achieve their objectives in under 15 hours. For each minute a breach goes undetected, it will cost an organization on average $10.71 per minute, $643 per hour, $15,433 a day and so on.
If your organization is considering Managed Detection and Response and you find yourself confused by what delineates MDR versus MSSP, there are a number of factors that distinguish one from another. However, the R in MDR comes down to minimizing dwell time and the potential risks. The more time a threat actor goes undetected and uncontained, the greater the probability the threat actor will succeed. Consider the following questions when looking into potential providers to protect your digital assets,:
Get notified of the latest news, intel and helpful tools & assets. You can unsubscribe anytime.
eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.