What We Do
How we do it
Resources
TRU INTELLIGENCE CENTER
Our Threat Response Unit (TRU) publishes security advisories, blogs, reports, industry publications and webinars based on its original research and the insights driven through proactive threat hunts.
View Threat Intelligence Resources →
SECURITY ADVISORIES
Jan 19, 2023
Increased Activity in Google Ads Distributing Information Stealers
THE THREAT On January 18th, 2023, eSentire Threat Intelligence identified multiple reports, both externally and internally, containing information on an ongoing increase in Google advertisements…
Read More
View all Advisories →
Company
ABOUT ESENTIRE
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
LATEST PRESS RELEASE
Dec 13, 2022
eSentire Named First Managed Detection and Response Partner by Global Insurance Provider Coalition
Waterloo, ON – December 13, 2022 – eSentire, Inc., the Authority in Managed Detection and Response (MDR), today announced it has been named the first global MDR partner by Coalition, the world’s first Active Insurance provider designed to prevent digital risk before it strikes. Like Coalition, eSentire is committed to putting their customers’ businesses ahead of disruption by improving their…
Read More
Partners
PARTNER PROGRAM
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
ECOSYSTEM PARTNER RESOURCES
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Search
Resources
Blog — Sep 20, 2018

The MDR difference: Rapid fire detection and containment of cyber threats

2 minutes read
Speak With A Security Expert Now

The current state of cybersecurity as it relates to the rapidly evolving threat landscape has led many organizations to outsource some, if not all, of their security operations. While there are many flavors of the SOC (or Security Operations Center)-as-a-Service option, the two options most discussed today are MSS (Managed Security Services) and MDR (Managed Detection and Response).

According to Gartner’s 2018 Market Guide for Managed Detection and Response Services, MDR is a 24x7 monitoring, detection, and lightweight response service that combines technologies at the host and network layers to investigate incidents, provide remote response capabilities (i.e., threat containment), and support customer efforts to restore compromised environments to a steady state. Many Managed Security Services Providers (MSSPs) rely on SIEM (Security Information and Event Management) technologies to protect organizations from business disrupting events. While there is some value in this approach, there are gaps when compared to MDR: response capabilities, time to detection, and protection against zero-day threats.

Focusing on the “R” in MDR for a moment, response capabilities of an MSSP are very different from those of an MDR provider. Both MSSPs and MDR providers will Manage the Detection of threats. But while an MSSP sends an alert to a customer’s network or security team that requires additional triage and investigation, an MDR provider will likely perform the initial investigation on the customer’s behalf, contain the threat if applicable, and support the customer during its own internal forensic analysis and remediation process.

A SIEM’s basic function is to ingest, aggregate, correlate, and enrich logs, then compare resulting datasets to rules defined within the system and trigger an alert (assuming appropriate rule sets have been configured). This makes time to detection (and inevitably response) of a SIEM slower than that of a live MDR analyst performing investigations on all potential anomalous activity or indicators of compromise and responding with some form of containment in near real-time, if necessary. Additionally, a SIEM must be configured to look for specific indicators of compromise or anomalous activity. So, in the case of a net new zero-day threat, this technology falls short as likely there is not a rule in place to alert on the associated activity.

Utilizing full packet capture and endpoint forensics to power eSentire’s MDR capabilities, SOC analysts can detect threats faster, perform more in-depth investigations, and provide threat containment services and detailed forensic data to customers. This drastically reduces internal network and security team workloads by relieving day-to-day threat hunting activities, so they can focus on other areas of security within the business.

Many organizations now realize that effective threat hunting is a 24x7 operation that requires dedicated resources with advanced skillsets and access to cutting-edge security technologies. Similarly, MSSP customers are finding they need more guidance, information, and involvement from security partners to safeguard environments and respond to incidents. eSentire MDR services address these concerns by staffing two global 24X7 SOCs with extremely talented, highly skilled analysts that provide incident response, forensic analysis, and remediation support.

View Most Recent Blogs
Tia Hopkins
Tia Hopkins Field CTO and Chief Cyber Risk Strategist

As Field CTO & Chief Cyber Risk Strategist, Tia Hopkins is focused on engaging with the cybersecurity community, providing thought leadership, supporting strategic customer and partner engagements, and working closely with the sales, marketing, product, engineering, and customer success teams to drive security outcome-focused initiatives. She has spent the past 20+ years of her career in various IT and IT Security roles and has over a decade of experience in the managed services space. Outside of her role at eSentire, Tia is also an adjunct professor of Cybersecurity at Yeshiva University and is currently pursuing her PhD in Cybersecurity Technology Innovation Management.