eSentire is aware of public Proof-of-Concept (PoC) exploit code for the ProxyNotShell Exchange vulnerabilities (CVE-2022-41040 [CVSS:8.8], CVE-2022-41082 [CVSS:8.0]). The publication of…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Global Cybersecurity Leader eSentire Partners with InfoTrust to Deliver 24/7 Multi-Signal MDR and IR Services Across Australia
Waterloo, ON and Sydney, Australia – November 9, 2022 – eSentire, Inc., the Authority in Managed Detection and Response (MDR), today announced it has expanded its presence in Australia via a strategic partnership with InfoTrust. InfoTrust is a leading specialized cybersecurity provider that combines next-generation security controls, with the InfoTrust “Connective Tissue” of customer success,…
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Your network is an ever-expanding ecosystem of dynamic assets being targeted by threat actors that continue weaponizing new zero-day vulnerabilities. Without regular vulnerability scanning that stays ahead of the latest CVEs and zero-days, your environment presents opportunities that threat actors will exploit.
eSentire’s Managed Vulnerability Service continuously identifies vulnerabilities across your on-premises and cloud environment with help from eSentire experts who act as an extension of your team providing analysis and remediation guidance. We schedule and execute scans, manage the platform and refine your risk profile while supporting remediation plans.
The benefits of Managed Vulnerability Service include:
Identifies vulnerabilities across dynamic and expanding IT assets
Improves your scanning consistency and timeliness
Tracks and measures your vulnerabilities lifecycle
Prioritizes remediation against greatest potential business risk
Verifies remediation and quality assurance
Minimizes your vulnerability discovery to remediation timeframe
Tracks and measures programmatic improvements
Reduces your operational, staffing and resource constraints
Satisfies your regulatory requirements
Our Best of Breed Technology Partner Approach
Our best-of-breed Managed Vulnerability Service approach means we partner with Tenable, the leader in vulnerability management. With Tenable, eSentire Managed Vulnerability Service helps you minimize the vulnerability discovery to remediation timeframe by:
Protecting critical data assets to ensure customer privacy, competitive advantage and security for sensitive projects.
Around-the-clock global network coverage with 24/7 support from eSentire’s team of Elite Threat Hunters who respond to and contain threats.
Cost-effective solution versus running and staffing an in-house 24/7 Security Operations Center (SOC).
We can also leverage your existing investment by taking over management of Tenable instances.
Streamline the Vulnerability Management Cycle
You need to be able to act quickly when zero-day vulnerabilities emerge. Lean on our threat experts to manage your scanning and provide guidance to track, prioritize and remediate risk.
Industry-leading IT asset coverage with scanning available for more than 59,000 vulnerabilities with 147,000 plugins.
Flexible Scanning Tools
Collect the data you need to increase visibility and decrease risk from vulnerabilities via network scanners and agents.
Dynamic Asset Tracking
Group and classify assets in a single pane of glass with attributes beyond IP addresses to more accurately identify and prioritize your new and existing vulnerabilities.
Business Contextual Risk Prioritization
eSentire dedicated Managed Vulnerability Service experts provide risk prioritization and guidance specific to your unique business context.
Continuous Optimization and Focused Guidance
eSentire dedicated Managed Vulnerability Service experts become a genuine extension of your team providing end-to-end management that optimizes the vulnerability management lifecycle including remediation guidance, verification, scan quality assurance and weekly communication on newly discovered vulnerabilities.
Executive and Technical Reporting
Custom executive and detailed summary reporting is available for technical and non-technical audiences.
Regulatory Requirement Reporting
Pre-built compliance reporting and dashboards for multiple security frameworks including PCI, NIST, ISO and CIS.
Full system access and flexibility to run your own customized scans and reporting alongside eSentire’s dedicated Managed Vulnerability Service experts.
Web Application Scanning (Add-On)
Safely and accurately scan your web application portfolio without the worry of performance latency or disrupting your development team.
PCI Approved Scanning Vendor Solution (Add-On)
Streamline and comply with quarterly scanning requirements required by PCI 11.2.2.
The eSentire Difference
eSentire’s Managed Vulnerability service is single tier, all-inclusive and completely transparent.
eSentire Managed Vulnerability Service + Managed Detection and Response (MDR)
To drive deep investigation and data correlation, analysts need visibility across a combination of sources. Our multi-signal MDR approach ingests endpoint, network, log, cloud, asset and vulnerability data to enable complete attack surface visibility. In addition to the dedicated team managing your scanning, our SOC leverages Managed Vulnerability Service data for MDR investigations. Automated blocking capabilities built into our eSentire Atlas XDR Cloud Platform prevent attackers from gaining an initial foothold while our expert Elite Threat Hunters can initiate manual containment at multiple levels of the attack surface. Through the use of host isolation, malicious network communication disruption, identity-based restriction and other measures, we can stop attackers at multiple attack vectors and minimize the risk of business disruption.