What We Do
How we do it
Our Threat Response Unit (TRU) publishes security advisories, blogs, reports, industry publications and webinars based on its original research and the insights driven through proactive threat hunts.
View Threat Intelligence Resources →
Nov 21, 2022
ProxyNotShell Exploit Released
THE THREAT eSentire is aware of public Proof-of-Concept (PoC) exploit code for the ProxyNotShell Exchange vulnerabilities (CVE-2022-41040 [CVSS:8.8], CVE-2022-41082 [CVSS:8.0]). The publication of…
Read More
View all Advisories →
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
Nov 07, 2022
Global Cybersecurity Leader eSentire Partners with InfoTrust to Deliver 24/7 Multi-Signal MDR and IR Services Across Australia
Waterloo, ON and Sydney, Australia – November 9, 2022 – eSentire, Inc., the Authority in Managed Detection and Response (MDR), today announced it has expanded its presence in Australia via a strategic partnership with InfoTrust. InfoTrust is a leading specialized cybersecurity provider that combines next-generation security controls, with the InfoTrust “Connective Tissue” of customer success,…
Read More
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Data sheet / solution brief

Managed Vulnerability Service

Comprehensive Vulnerability Management Driving Cyber Risk Reduction

Your network is an ever-expanding ecosystem of dynamic assets being targeted by threat actors that continue weaponizing new zero-day vulnerabilities. Without regular vulnerability scanning that stays ahead of the latest CVEs and zero-days, your environment presents opportunities that threat actors will exploit.

eSentire’s Managed Vulnerability Service continuously identifies vulnerabilities across your on-premises and cloud environment with help from eSentire experts who act as an extension of your team providing analysis and remediation guidance. We schedule and execute scans, manage the platform and refine your risk profile while supporting remediation plans.

The benefits of Managed Vulnerability Service include:

Our Best of Breed Technology Partner Approach

Our best-of-breed Managed Vulnerability Service approach means we partner with Tenable, the leader in vulnerability management. With Tenable, eSentire Managed Vulnerability Service helps you minimize the vulnerability discovery to remediation timeframe by:

We can also leverage your existing investment by taking over management of Tenable instances.

Streamline the Vulnerability Management Cycle

You need to be able to act quickly when zero-day vulnerabilities emerge. Lean on our threat experts to manage your scanning and provide guidance to track, prioritize and remediate risk.


Comprehensive Visibility

Industry-leading IT asset coverage with scanning available for more than 59,000 vulnerabilities with 147,000 plugins.

Flexible Scanning Tools

Collect the data you need to increase visibility and decrease risk from vulnerabilities via network scanners and agents.

Dynamic Asset Tracking

Group and classify assets in a single pane of glass with attributes beyond IP addresses to more accurately identify and prioritize your new and existing vulnerabilities.

Business Contextual Risk Prioritization

eSentire dedicated Managed Vulnerability Service experts provide risk prioritization and guidance specific to your unique business context.

Continuous Optimization and Focused Guidance

eSentire dedicated Managed Vulnerability Service experts become a genuine extension of your team providing end-to-end management that optimizes the vulnerability management lifecycle including remediation guidance, verification, scan quality assurance and weekly communication on newly discovered vulnerabilities.

Executive and Technical Reporting

Custom executive and detailed summary reporting is available for technical and non-technical audiences.

Regulatory Requirement Reporting

Pre-built compliance reporting and dashboards for multiple security frameworks including PCI, NIST, ISO and CIS.

Co-managed Flexibility

Full system access and flexibility to run your own customized scans and reporting alongside eSentire’s dedicated Managed Vulnerability Service experts.

Web Application Scanning (Add-On)

Safely and accurately scan your web application portfolio without the worry of performance latency or disrupting your development team.

PCI Approved Scanning Vendor Solution (Add-On)

Streamline and comply with quarterly scanning requirements required by PCI 11.2.2.

The eSentire Difference

eSentire’s Managed Vulnerability service is single tier, all-inclusive and completely transparent.

eSentire Managed Vulnerability Service + Managed Detection and Response (MDR)

To drive deep investigation and data correlation, analysts need visibility across a combination of sources. Our multi-signal MDR approach ingests endpoint, network, log, cloud, asset and vulnerability data to enable complete attack surface visibility. In addition to the dedicated team managing your scanning, our SOC leverages Managed Vulnerability Service data for MDR investigations. Automated blocking capabilities built into our eSentire Atlas XDR Cloud Platform prevent attackers from gaining an initial foothold while our expert Elite Threat Hunters can initiate manual containment at multiple levels of the attack surface. Through the use of host isolation, malicious network communication disruption, identity-based restriction and other measures, we can stop attackers at multiple attack vectors and minimize the risk of business disruption.

Download Now