What We Do
How We Do
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Get Started

The Latest Threats, Techniques, Risks & Vulnerabilities in Cloud Environments

Watch the Webinar

By clicking the button above I confirm that I have read and agree to the eSentire privacy policy.

In this webinar, eSentire and Sumo Logic threat intelligence experts brief Cloud Security Alliance (CSA) members on cutting edge threat intelligence developed from threat reports and first-hand detections our threat hunting teams have encountered in cloud environments.

Key Takeaways:

  • Top cloud threats and vulnerabilities eSentire is seeing as we respond to threats in customer environments and from the latest cloud threat reports.
  • Examples of critical cloud-specific event data, relevant types of indicators of compromise (IoCs), and adversarial tactics, techniques, and procedures (TTPs).
  • How eSentire’s Threat Response Unit (TRU) search for compromised assets based on indicators, events generated on workloads and within the cloud environments, or communications with known malicious IP addresses and domains.
  • How Sumo Logic’s research team tracks the threat landscape and enhances the detection of advanced threats and gives better context to threat investigations in cloud and multi-cloud environments.


Rob McLeod VP, Threat Response Unit (TRU), eSentire

George Gerchow, Chief Security Officer, Sumo Logic


Get The Webinar