eSentire Products and Services:
eSentire's solution delivers an XDR platform, with solutions for endpoint, email, cloud, network and data security. Please see below for products/services offered:
Products:
eSentire Atlas Extended Detection and Response (XDR) Platform:
- Automated Disruptions
- Proprietary Adaptive Machine Learning
- Threat-specific Containment Measures across Cloud, Identity, Network and Endpoint
- Scalable, Distributed Platform utilising Cloud-Native Architecture
- Threat Intelligence
- Multi-Signal Coverage including: Logs, Network, Identity Assets, Endpoint, Cloud Environments, Vulnerability Scans and Behavioural Sources
Services:
Digital Forensics and Incident Response:
On-Demand 24/7 Incident Response:
- Security Consulting & Advisory Services
- Incident Response Retainer
- Security Incident Response Planning (SIRP) (Add-On)
Emergency Incident Response:
- End-to-End Incident Response Lifecycle Support
Managed Detection & Response:
- eSentire MDR Essentials
- eSentire MDR Expert
- eSentire MDR Elite
- eSentire MDR with Microsoft 365 Defender
- eSentire MDR with Microsoft Sentinel
Features | Essentials | Expert | Elite |
24/7 Protection and Support | | | |
24/7 Live Security Operations Center (SOC) Cyber Analyst Support | ✓ | ✓ | ✓ |
24/7 Monitoring, Threat Detection, and Investigations | ✓ | ✓ | ✓ |
Machine Learning Powered Atlas XDR Cloud Platform | | | |
Machine Learning Powered Atlas XDR Cloud Platform | ✓ | ✓ | ✓ |
Cyber Risk Advisor | | | |
Security Infrastructure review | | ✓ | ✓ |
Monthly service review | | Report | Live Walkthrough |
Tailored risk reduction roadmap | | | ✓ |
eSentire MDR + Business Security Tooling Coverage Map | | | ✓ |
Board meeting and executive leadership meeting preparation and presentation | | | ✓ |
Annual Business Review | | | ✓ |
Multi-Signal MDR | | | |
Endpoint | ✓ | ✓ | ✓ |
Network | ✓ | ✓ | ✓ |
Log | ✓ | ✓ | ✓ |
Cloud | ✓ | ✓ | ✓ |
Email | | ✓ | ✓ |
Automated Blocking and Alerting | | | |
Automated Blocking and Alerting | ✓ | ✓ | ✓ |
Proactive Manual Threat Containment and Response | | | |
Host | ✓ | ✓ | ✓ |
Network | ✓ | ✓ | ✓ |
Email threat | | ✓ | ✓ |
Identity/User | | ✓ | ✓ |
eSentire Threat Response Unit (TRU) | | | |
eSentire-lead threat intelligence | ✓ | ✓ | ✓ |
Integrated third-party threat intelligence | ✓ | ✓ | ✓ |
Standard MITRE ATT&CK mapped runbooks | ✓ | ✓ | ✓ |
Custom detection development | | ✓ | ✓ |
Customer Visibility, Co-Management, and Reporting | | | |
Insights portal | ✓ | ✓ | ✓ |
Co-managed SIEM | | ✓ | ✓ |
Managed Risk Programs:
eSentire Managed Risk Core Essentials:
- Executive Briefing
- Managed Vulnerability Service
- Virtual CISO (vCISO)
- Security Programs Maturity Assessment
eSentire Managed Risk Measure and Engage
- Managed Vulnerability Service
- Virtual CISO (vCISO)
- Security Programs Maturity Assessment - Phishing and Security Awareness Training
- External Penetration Test
- Threat Advisories
- Executive Briefing
eSentire Managed Risk Mature and Detect
- Managed Vulnerability Service
- Virtual CISO (vCISO)
- Security Programs Maturity Assessment
Choose One Of:
- Security Policy Review
- Security Incident Response Planning
- Security Architecture Review
- Vendor Risk Management Program
- Vulnerability Management Program - Phishing and Security Awareness Training
- External Penetration Test
- Threat Advisories
- Executive Briefing
eSentire Managed Risk Harden and Secure
- Managed Vulnerability Service
- Virtual CISO (vCISO)
- Security Programs Maturity Assessment
Choose Three Of:
- Security Policy Review
- Security Incident Response Planning
- Security Architecture Review
- Vendor Risk Management Program
- Vulnerability Management Program - Phishing and Security Awareness Training
- External Penetration Test
- Threat Advisories
- Executive Briefing
Solutions:
- Cloud Misconfiguration
- Cyber Risk
- Ransomware
- Sensitive Data
- Third-Party Risk
- Zero Day Attacks
eSentire People:
- Security Operations Centre (SOC)
- Team eSentire
- Threat Response Unit