The eSentire Blog

Threat Intelligence

4 M

Gray War: Deterrence by Cyber Denial

In part one of “Gray War” I looked at the threats posed by gray zones looking to destabilize our economy by…

READ NOW →

Endpoint Protection

6 M

eSentire and VMware Carbon Black: Delivering World-Class Managed Endpoint Security

With many organizations forced to rapidly implement work-from-home operating models—and with widespread…

READ NOW →

Threat Intelligence

3 M

Your Endpoints Need a Strong Defense Team

Understand attacker behavior to effectively hunt endpoint threats There’s one undeniable constant in endpoint…

READ NOW →

Managed Detection and Response

4 M

The Limitations of Managed Endpoint Detection and Response (EDR)

A Brief History of Endpoint Detection and Response (EDR): Fulfilling a NeedEmerging in the early 2010s, endpoint…

READ NOW →

Endpoint Protection

6 M

Quantifying Risk: Making the Case for Greater Endpoint Protection

As the coronavirus (COVID-19) continues to spread, the virulent disease has impacted our lives with restricted…

READ NOW →

Endpoint Protection

2 M

eSentire and CrowdStrike: More Choice, More Signals — and More Cloud-Native Advancement

Today we announced a partnership with CrowdStrike, a leader in cloud-delivered endpoint protection: this offering…

READ NOW →

Threat Intelligence

1 M

eSentire Threat Intelligence Spotlight: The Shifting Framework of Modern Malware

Modern malware is increasingly sophisticated. While newer antivirus solutions provide a more effective layer of…

READ NOW →

Threat Intelligence

3 M

Depth and Breadth: Logs help empower Managed Detection and Response delivery

We’ve all heard it, “it’s not a matter of if, but when.” This phrase is a marketing staple used to instill fear,…

READ NOW →

Cybersecurity Strategy

5 M

SIEM: the many shades of success and failure

It’s no secret that there’s difficulty in implementing, operating and deriving business value from SIEMs. Service…

READ NOW →

Network Protection

3 M

Just another day at the office: protecting clients from complex threat networks

On Dec. 1, a large US-based cybersecurity firm received extensive international media coverage for a reported…

READ NOW →
Page
of 2