SlideShare a Scribd company logo
1 of 8
The Leader in Pure-play Managed Detection and Response
eSentire Managed Detection
and Response
CIO Strategy Council| December 5, 2017
J.Paul Haynes
MANAGED DETECTION AND RESPONSE
$5.7T Protected Assets SOCs
Canada 43.3616° N, 80.3144° W | GMT -0.5
Ireland 51.8969° N, 8.4863° W | GMT -0.0
550 Customers 340 Employees
98% Customer Retention 50% Growth
We absorb the complexity of doing truly effective cybersecurity
We respond near real time to hunt down threats before they become business disrupting
We call this approach, Micro Incident Response
Copyright © 2017 eSentire, Inc 3
MANAGED DETECTION & RESPONSE
Focus on threat detection use cases, advanced or targeted attacks that have
bypassed existing perimeter controls
GARTNER ADAPTIVE SECURITY ARCHITECTURE
PREDICT
Proactive exposure assessment
Predict attacks
Baseline systems
Remediate and make changes
Design and model change
Investigate / Forensics
RESPOND
PREVENT
Harden and isolate systems
Divert attackers
PREVENT INCIDENTS
Detect incidents
Confirm and prioritize
Contain incidents
DETECT
CONTINUOUS
MONITORING
&
ANALYTICS
$$$$$$
$$$
$$ $
Managing the Complexity of Cybersecurity
SIGNAL
ENRICHMENT
CORRELATE &
INVESTIGATION
ANALYST
RESPONSE
SIGNAL
INGESTION
HUNTING FOR
THE SIGNALS
IN THE NOISE
REALTIME
NETWORK/CLOUD/
ENDPOINT FORENSICS
ENRICHMENT
FULL CONTEXT ATTACK
INVESTIGATION
ANALYST REAL-TIME
FORENSIC HUNT
CONTAINMENT
CONNECTION TERMINATION
QUARANTINE
COORDINATED REMEDIATION
NOTIFICATION AND ESCALATION
Q3 Data – 550 Customers & 1.1M Investigations
Top 3 growers in Q3 are:
» Intrusion Attempts – 34% overall
» Information Gathering – 19% Overall
» Availability/DOS attacks – 8% of Overall
TARGETED RANSOMWARE ATTACK
7:43 AM
INITIAL 87.exe BLOCKED
FROM BLACKLISTED IP
SUBSEQUENTLY DOWNLOADED
FROM NEW/UNKNOWN IP
7:44 AM
TESLACRYPT BEACONS
TO CNC SERVER
35
Seconds Response
7:54 AM
SOC ALERTS ON INFECTION
AND BLOCKS TRAFFIC
10.5
Minute Containment
20
Minute SLO Met
8:00AM
HOST ISOLATED
LOOK ACROSS THE CLIENT
NETWORK FOR OTHERSIGNS
OF INFECTION
8:30AM
HOST RESTORED
FROM BACKUP
EVENT RESOLVED
47
Full Remediation
INVESTIGATION
FULL PACKET CAPTURE
INSPECT BINARY
DETONATE MALWARE
24x7 SECURITY OPERATIONS (SOC)
MONITOR | HUNT | INVESTIGATE | RESPOND
esARTEMIS MDR PLATFORM
INGEST | CORRELATE | ENRICH | INVESTIGATE
MANAGED DETECTION AND RESPONSE
ADVISORY
SERVICES
esRECON
CLIENT COMMUNICATIONS
COORDINATED REMEDIATION | REPORTING | DASHBOARD | ISSUE TRACKING
ON-PREMISES | CLOUD | HYBRID CLOUD
esNETWORK esENDPOINT esLOG
2022-10-31 Copyright © 2017 eSentire, Inc. All rights reserved. 8
MICRO INCIDENT RESPONSE
Within 35 seconds we start investigating and containing suspicious activity,
typically resolved within minutes (not hours, days or weeks)
ELITE WHITE-GLOVE SERVICE
Every eSentire client receives the same high-level service
(every event is high priority)
ABSORBING THE COMPLEXITY CYBERSECURITY
We leverage advanced tradecraft, the latest threat intelligence and
proprietary technology to detect and respond to threats at wire-speed
WE BECOME AN EXTENSION OF YOUR TEAM
Our clients see us as an extension of their own teams because we have a
deep understanding of their networks, and work closely with them to
identify and manage threats on their behalf, 7X24X365

More Related Content

Similar to December-2017-Cyber_JPaul-Haynes_-eSentire.pptx

CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CloudIDSummit
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Responsexband
 
FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachRahul Neel Mani
 
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...TI Safe
 
FIS Profile Summary V7.3
FIS Profile Summary V7.3FIS Profile Summary V7.3
FIS Profile Summary V7.3Jorge Sebastiao
 
Insider Threat: How Does Your Security Stack Measure Up?
Insider Threat: How Does Your Security Stack Measure Up?Insider Threat: How Does Your Security Stack Measure Up?
Insider Threat: How Does Your Security Stack Measure Up?ThinAir
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall ServiceSecureData Europe
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Effective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businessesEffective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businessesShawn Tuma
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMAlienVault
 
Prezentare_RSA.pptx
Prezentare_RSA.pptxPrezentare_RSA.pptx
Prezentare_RSA.pptxAgusNursidik
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Servicestsaiblake
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Luis Atencio
 
Awarepoint: ZigBee RTLS Solutions for Hospitals
Awarepoint: ZigBee RTLS Solutions for HospitalsAwarepoint: ZigBee RTLS Solutions for Hospitals
Awarepoint: ZigBee RTLS Solutions for HospitalsValerie Fritz
 

Similar to December-2017-Cyber_JPaul-Haynes_-eSentire.pptx (20)

CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
 
Linked In
Linked InLinked In
Linked In
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Response
 
Esguf Profile Short V34
Esguf Profile Short V34Esguf Profile Short V34
Esguf Profile Short V34
 
FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
 
FIS Profile Summary V7.3
FIS Profile Summary V7.3FIS Profile Summary V7.3
FIS Profile Summary V7.3
 
Insider Threat: How Does Your Security Stack Measure Up?
Insider Threat: How Does Your Security Stack Measure Up?Insider Threat: How Does Your Security Stack Measure Up?
Insider Threat: How Does Your Security Stack Measure Up?
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall Service
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Effective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businessesEffective cybersecurity for small and midsize businesses
Effective cybersecurity for small and midsize businesses
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Prezentare_RSA.pptx
Prezentare_RSA.pptxPrezentare_RSA.pptx
Prezentare_RSA.pptx
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
Assuring Reliable and Secure IT Services
Assuring Reliable and Secure IT ServicesAssuring Reliable and Secure IT Services
Assuring Reliable and Secure IT Services
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511
 
"Navigate the MDR Marketplace Like a Pro!"
 "Navigate the MDR Marketplace Like a Pro!" "Navigate the MDR Marketplace Like a Pro!"
"Navigate the MDR Marketplace Like a Pro!"
 
Awarepoint: ZigBee RTLS Solutions for Hospitals
Awarepoint: ZigBee RTLS Solutions for HospitalsAwarepoint: ZigBee RTLS Solutions for Hospitals
Awarepoint: ZigBee RTLS Solutions for Hospitals
 

Recently uploaded

如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证a8om7o51
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证pwgnohujw
 
How to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsHow to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsBrainSell Technologies
 
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证dq9vz1isj
 
Bios of leading Astrologers & Researchers
Bios of leading Astrologers & ResearchersBios of leading Astrologers & Researchers
Bios of leading Astrologers & Researchersdarmandersingh4580
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancingmohamed Elzalabany
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshareraiaryan448
 
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjSCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjadimosmejiaslendon
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证pwgnohujw
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfgreat91
 
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证ju0dztxtn
 
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksSensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksBoston Institute of Analytics
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationmuqadasqasim10
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...yulianti213969
 
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...ssuserf63bd7
 
Formulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfFormulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfRobertoOcampo24
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证acoha1
 
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一fztigerwe
 
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...ThinkInnovation
 
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...yulianti213969
 

Recently uploaded (20)

如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 
How to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsHow to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data Analytics
 
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
 
Bios of leading Astrologers & Researchers
Bios of leading Astrologers & ResearchersBios of leading Astrologers & Researchers
Bios of leading Astrologers & Researchers
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancing
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshare
 
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjSCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
 
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
 
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksSensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic information
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
 
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
 
Formulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfFormulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdf
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
 
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
 
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
 
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
obat aborsi Bontang wa 081336238223 jual obat aborsi cytotec asli di Bontang6...
 

December-2017-Cyber_JPaul-Haynes_-eSentire.pptx

  • 1. The Leader in Pure-play Managed Detection and Response eSentire Managed Detection and Response CIO Strategy Council| December 5, 2017 J.Paul Haynes
  • 2. MANAGED DETECTION AND RESPONSE $5.7T Protected Assets SOCs Canada 43.3616° N, 80.3144° W | GMT -0.5 Ireland 51.8969° N, 8.4863° W | GMT -0.0 550 Customers 340 Employees 98% Customer Retention 50% Growth We absorb the complexity of doing truly effective cybersecurity We respond near real time to hunt down threats before they become business disrupting We call this approach, Micro Incident Response
  • 3. Copyright © 2017 eSentire, Inc 3 MANAGED DETECTION & RESPONSE Focus on threat detection use cases, advanced or targeted attacks that have bypassed existing perimeter controls GARTNER ADAPTIVE SECURITY ARCHITECTURE PREDICT Proactive exposure assessment Predict attacks Baseline systems Remediate and make changes Design and model change Investigate / Forensics RESPOND PREVENT Harden and isolate systems Divert attackers PREVENT INCIDENTS Detect incidents Confirm and prioritize Contain incidents DETECT CONTINUOUS MONITORING & ANALYTICS $$$$$$ $$$ $$ $
  • 4. Managing the Complexity of Cybersecurity SIGNAL ENRICHMENT CORRELATE & INVESTIGATION ANALYST RESPONSE SIGNAL INGESTION HUNTING FOR THE SIGNALS IN THE NOISE REALTIME NETWORK/CLOUD/ ENDPOINT FORENSICS ENRICHMENT FULL CONTEXT ATTACK INVESTIGATION ANALYST REAL-TIME FORENSIC HUNT CONTAINMENT CONNECTION TERMINATION QUARANTINE COORDINATED REMEDIATION NOTIFICATION AND ESCALATION
  • 5. Q3 Data – 550 Customers & 1.1M Investigations Top 3 growers in Q3 are: » Intrusion Attempts – 34% overall » Information Gathering – 19% Overall » Availability/DOS attacks – 8% of Overall
  • 6. TARGETED RANSOMWARE ATTACK 7:43 AM INITIAL 87.exe BLOCKED FROM BLACKLISTED IP SUBSEQUENTLY DOWNLOADED FROM NEW/UNKNOWN IP 7:44 AM TESLACRYPT BEACONS TO CNC SERVER 35 Seconds Response 7:54 AM SOC ALERTS ON INFECTION AND BLOCKS TRAFFIC 10.5 Minute Containment 20 Minute SLO Met 8:00AM HOST ISOLATED LOOK ACROSS THE CLIENT NETWORK FOR OTHERSIGNS OF INFECTION 8:30AM HOST RESTORED FROM BACKUP EVENT RESOLVED 47 Full Remediation INVESTIGATION FULL PACKET CAPTURE INSPECT BINARY DETONATE MALWARE
  • 7. 24x7 SECURITY OPERATIONS (SOC) MONITOR | HUNT | INVESTIGATE | RESPOND esARTEMIS MDR PLATFORM INGEST | CORRELATE | ENRICH | INVESTIGATE MANAGED DETECTION AND RESPONSE ADVISORY SERVICES esRECON CLIENT COMMUNICATIONS COORDINATED REMEDIATION | REPORTING | DASHBOARD | ISSUE TRACKING ON-PREMISES | CLOUD | HYBRID CLOUD esNETWORK esENDPOINT esLOG
  • 8. 2022-10-31 Copyright © 2017 eSentire, Inc. All rights reserved. 8 MICRO INCIDENT RESPONSE Within 35 seconds we start investigating and containing suspicious activity, typically resolved within minutes (not hours, days or weeks) ELITE WHITE-GLOVE SERVICE Every eSentire client receives the same high-level service (every event is high priority) ABSORBING THE COMPLEXITY CYBERSECURITY We leverage advanced tradecraft, the latest threat intelligence and proprietary technology to detect and respond to threats at wire-speed WE BECOME AN EXTENSION OF YOUR TEAM Our clients see us as an extension of their own teams because we have a deep understanding of their networks, and work closely with them to identify and manage threats on their behalf, 7X24X365

Editor's Notes

  1. TALK TRACK eSentire is the leading pure-play provider Managed Detection and Response services. We absorb the complexity of operational security hunting down threats in real-time to prevent them from becoming business disrupting. We call this approach Micro Incident Response. We have over 500 customers across varied industries like finance, legal, energy, retail, manufacturing and technology. No matter the industry, our clients trust us to protect their assets and more importantly, their reputation.
  2. The bad guys have nowhere to hide. We invented a highly integrated technology stack that enables unparalleled visibility into our customers’ networks, and agile real-time threat response capabilities. Our team of elite security analysts use these tools to detect the threats already lurking in your network and stop them. CLICK: Based on Agency-grade tradecraft, our SOC analysts have access to signals ingested from across your network, endpoints and cloud sources. CLICK: They combine you signals with reputation, geolocation and other threat intelligence feeds from across the government, law enforcement and the security industry. CLICK: They correlate this information and use it to investigate potential attacks. Humans have intuition; something a policy-driven machine will never match. CLICK: And when our analysts find something suspicious, they don’t just alert on threats, they investigate and respond on your behalf.
  3. 7:43 User receives a SPAM email and clicks on it High quality/targeted phishing campaign AMP blocks 87.exe from blacklisted IP Seconds later, 87.exe is downloaded from another site, not blacklisted. 60 Second of attack The malware beacons home to retrieve the encryption keys, and this traffic is detected by our sensors. 2 min later, Analyst assess DPI and tracks new variant of TeslaCrypt.  Contacts client and talks then through the mitigation Clients had good Cyber playbook and isolated host. Reimage system SOC extracts threat intel (new binary, checksums, IPs) and pushing back down to client sensors and sharing across our client base. Started looking for additional signs of previous or continuing compromise. 8:30 Client calls SOC to notify that the device was coming back onto the network. They also reviewed all network nodes and found new additional signs of infection We shared the threat with various feeds and continued looking for additional signs of compromise.
  4. eSentire MDR consists of Network, Endpoint and Cloud protection. These services are fed into proprietary, purpose-built MDR technology that feeds the SOC analysts and allows them to investigate threats with unparalleled visibility into network, endpoint and cloud traffic and activity. eSentire has been delivering MDR for 15 years, and over that tenure has developed these specialized tools and systems, because off the shelf SIEMs and other security tools did not provide the necessary visibility, deep packet inspection or correlation required.
  5. And this approach, we call MICRO INCIDENT RESPONSE. The faster we identify the attack and contain it, the less opportunity it has to spread and metastasize through the organization and become business disrupting. We absorb ABSORBING THE COMPLEXITY OF OPERATIONAL SECURITY. We leverage advanced tradecraft, the latest threat intelligence and proprietary technology to detect and respond to threats at wire-speed And all of our clients receive the same, ELITE, WHITE-GLOVE SERVICE. There are tiers or levels of service. Everyone flies first class. WE BECOME AN EXTENSION OF YOUR TEAM We treat every customer as a top priority, and we actively protect all of the complexities of your attack surface 7X24X365. You can sleep because we don’t.