What We Do
How we do it
Resources
SECURITY ADVISORIES
Jul 26, 2021
PetitPotam NTLM Relay Attack
THE THREAT PetitPotam is a variant of NTLM Relay attacks discovered by security researcher Gilles Lionel. Proof of Concept code released last week [1] relies on the Encrypting File System Remote (EFSRPC) protocol to provoke a Windows host into performing an NTLM authentication request against an attacker-controlled server, exposing NTLM authentication details or authentication certificates.…
Read More
View all Advisories →
Company
ABOUT eSENTIRE
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
LATEST PRESS RELEASE
Jul 12, 2021
Tecala and eSentire Partner to Protect Enterprises across APAC from Business-Disrupting Cyber Attacks
Sydney, 12 July, 2021 - Tecala, Australia’s award-winning technology services and IT consulting provider, today announced it has chosen eSentire, the global Authority in Managed Detection and Response (MDR) cybersecurity services, as their exclusive MDR solution provider in Australia and New Zealand. This partnership will enable Tecala to augment its cybersecurity practice and offer enterprises…
Read More
Partners
PARTNER PROGRAM
Partners
Our award-winning partner program offers financial rewards, sales and marketing tools and personalized training. Accelerate your business and grow your revenue by offering our world-class Managed Detection and Response (MDR) services.
Learn about our Partner Program
Partners

PARTNER PORTAL

Login →
PARTNER SERVICES → RAPID ASSIST

Every second
counts

Stop breaches with Rapid Assist before they disrupt your business.

Become a Partner

Challenges in rapidly detecting and responding to threats

54

%

Of cyber attackers can breach the perimeter, identify critical data and exfiltrate in under 15 hour

70

%

Of cyber attackers use tools and technology to cover their tracks, making it difficult to conduct forensic investigation

$15,000

Every day a breach goes unnoticed costs a business an average of $15,000

206

DAYS

Mean time to identify a cyberthreat

73

DAYS

Mean time to contain a cyberthreat

How does Rapid Assist solve these challenges?

R A

Determine the extent

Collects critical network and endpoint data, providing on-site and remote incident response teams with crucial information that speeds forensic investigation

R A

Disrupt the threat

Minimizes threat actor dwell time with embedded containment capabilities via host isolation and network communication disruption

Eliminate all traces

Captures full network packets and endpoint telemetry, ensuring incident responders have a comprehensive picture on how to eliminate all traces of the threat

Monitors for reentry

Rapid Assist monitors for threat reentry, ensuring the network and endpoints are not susceptible to new points of attack

How it Works

Rapid assist outlines

How does Rapid Assist protect you?

Deploy within hours Full packet capture visibility Reduces forensic investigation timeline Host isolation Contains threats by TCP reset Monitor for threat reentry Confirms successful remediation

What Results Can You Expect from Rapid Assist?

Minimize threat actor dwell time

Prevent data exfiltration

Technology and tools to collect and contain threats

Prevents lateral spread

Reduces risk exposure during an active breach

Ready to become a partner?

The Rapid Assist Approach

TRADITIONAL INCIDENT RESPONSE (IR)
ESENTIRE
Monitoring during incident response process for additional attacks
TRADITIONAL INCIDENT RESPONSE (IR)
ESENTIRE
Containment of threat: host isolation
TRADITIONAL INCIDENT RESPONSE (IR)
ESENTIRE
Containment of threat: network communication disruption
TRADITIONAL INCIDENT RESPONSE (IR)
ESENTIRE
Post event monitoring for threat actor reentry
TRADITIONAL INCIDENT RESPONSE (IR)
ESENTIRE
Confirmation that network changes are hardened against new attacks
TRADITIONAL INCIDENT RESPONSE (IR)
Limited
ESENTIRE
Analysis of incident for procedural and policy implications
TRADITIONAL INCIDENT RESPONSE (IR)
ESENTIRE
Evidence collection for forensic investigation
TRADITIONAL INCIDENT RESPONSE (IR)
ESENTIRE
Determine priority, scope and root cause
TRADITIONAL INCIDENT RESPONSE (IR)
ESENTIRE
Analysis of incident for procedural and policy implications
TRADITIONAL INCIDENT RESPONSE (IR)
ESENTIRE
Evidence collection for forensic investigation
TRADITIONAL INCIDENT RESPONSE (IR)
ESENTIRE
Determine priority, scope and root cause
TRADITIONAL INCIDENT RESPONSE (IR)
ESENTIRE

Ready to get started?

Reach out to learn how eSentire can give you the peace of mind that comes with comprehensive MDR.

This field cannot contain links