eSentire | LinkedIn (original) (raw)
Computer and Network Security
Waterloo, Ontario 51,246 followers
The Authority in Managed Detection and Response.
About us
eSentire, Inc. is the Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations in 80+ countries, representing 35 industries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts, Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit http://www.esentire.com and follow https://twitter.com/eSentire.
Industry
Computer and Network Security
Company size
501-1,000 employees
Headquarters
Waterloo, Ontario
Type
Privately Held
Founded
2001
Specialties
Managed Detection and Response, Security Strategy, Threat Hunting, Managed Vulnerability, Phishing, Security Awareness Training, Virtual CISO, Advanced Threat Protection, Application Whitelisting, Cyber Forensics, Endpoint Security, Incident Response, IDS/IPS, Malware Protection, Penetration Testing, Security Monitoring Services, Security/Regulatory Compliance Consulting, SIEM, and Vulnerability Assessments 2.0
Locations
- Primary
451 Phillip St
Suite #135
Waterloo, Ontario N2L 3X2, CA
Get directions - Pearse House
Barrack Square
Ballincollig, Co. Cork, IE
Get directions - 999 3rd Avenue
2100
Seattle, Washington 98104, US
Get directions - One Penn Plaza
Suite 4501
New York, NY 10119, US
Get directions - One Canada Square
Level 24, Canary Wharf
London, E14 5AB, GB
Get directions
Employees at eSentire
Updates
-
51,246 followers
2y Edited
As your business scales, so do the threats you're facing. Your team needs a partner that can detect threats in seconds and contain them in minutes. At eSentire, our sole mission is to protect your critical data, technology, and people from cyber threats. We combine: ✅ Total Attack Surface Visibility ✅ XDR Cloud Platform Technology ✅ Proprietary Machine Learning Models ✅ 24/7 Threat Hunting The result? eSentire MDR delivers complete Response to stop threats before they become business-disrupting events. Combat-ready and battle-tested, Team eSentire stands guard so you don't have to. An attack on you is an attack on us. Full stop. Get started now: https://bit.ly/3HAc6c8 -
51,246 followers
5d Edited
Congratulations to our very own Tia (Yatia) Hopkins, Chief Cyber Resilience Officer and Field CTO, for being named an honoree in the 2024 Women in IT Security program by SC Media! 🎉 Tia has been recognized as an outstanding woman in cybersecurity, and has won the top Advocate award, which recognizes women leaders who work tirelessly to expand cybersecurity awareness and inclusivity, opening doors for a more diverse industry. For Tia, that means being resilient in the face of adversity. With over 20+ years of experience in cybersecurity, Tia is passionate about empowering diverse perspectives in the field to drive real innovation. Read the full article to learn more about why Tia was named a 2024 Women in IT Security honoree ⬇ #cybersecurity #leadership #WomeninITSecurity
eSentire's Tia Hopkins leads cybersecurity with resilience, inclusivity scworld.com - 🚨 Budget season is here, and with it comes a familiar challenge for security leaders: securing funds to safeguard against rapidly evolving cyber threats. It’s not just about asking for resources; it’s about proving their value in a language that resonates with decision-makers. 💡 The stakes are high: without proper funding, even well-crafted strategies fall short, leaving organizations exposed. Our comprehensive guide, packed with insights from our vCISO team, gives you an actionable roadmap for budget planning that resonates with leadership and drives results. 📊🔐 Key insights include: ➡️ Leveraging Security Program Maturity Assessments (SPMAs) to make data-backed budget decisions. ➡️ Aligning your budget with the NIST Cybersecurity Framework to ensure you cover all bases—from prevention to recovery. ➡️ Learning how to focus spending on emerging threats like Ransomware-as-a-Service (RaaS) and AI-driven attacks. 🔍 ➡️ Building early support by engaging finance and leadership teams through targeted, strategic communication. 🤝 Set your cybersecurity strategy up for success, show its value in terms of risk reduction and business resilience, and secure the buy-in you need to thrive. 👉 Download the guide to start planning a budget that protects and grows your organization: https://buff.ly/3AzR7bU
- Endpoints are under attack more than ever. Is your security strategy ready for 2024 and beyond? 🛡️ Join us for an expert-led webcast with SC Media where you'll get a comprehensive forecast of endpoint security trends and offer strategic guidance for late 2024 and early 2025. In this session, seasoned industry experts including Kurtis Armor, our VP Product Management, will explore emerging threats, advanced protection techniques, and innovative solutions to enhance your endpoint security posture. Key takeaways will include: 💻 Understand the emerging trends and future directions in endpoint security for the coming months. 👾 Identify the latest threats targeting endpoints and learn how to mitigate them. ⚡ Discover practical strategies for securing endpoints against evolving cyber threats. 💡 Explore new technologies and tools that can strengthen your endpoint security efforts. 💼 Stay informed about upcoming regulatory changes and how they impact endpoint security practices. 📑 Learn how to effectively manage and reduce risks associated with endpoint security. Get practical insights into managing endpoint security risks, ensuring compliance, and leveraging new technologies to fortify your defenses! 📅 Date/Time: November 13, 2024 at 12pm ET 🔗 Register here: https://buff.ly/4fp4Z7V
-
51,246 followers
1w Edited
Want to grow your security practice without the steep learning curve? 📈 For channel partners, this means enabling your partners to drive sales without the pressure of deep technical expertise. Good news: Selling MDR doesn’t require your sales team to be cybersecurity pros! 🤓 By partnering with the right MDR provider, you get access to comprehensive co-marketing programs, training resources, and joint go-to-market strategies that enhance your channel’s capability. Join Vincent Gatti, our Global Director of Business Development, in a conversation with Mark Stackpoole, CEO of GTS, and Meredith Caram, Ecosystem Expert at JSGroup, as they chat about: 📈 The Security Opportunity and how to leverage it for business growth 🤝 The GTS approach for simplifying co-selling and boosting revenue 🛠️ Selling security with eSentire made easy with tools, training, and support 📚 Tips for choosing the right customers in your book of business to maximize success The right partner can make all the difference in empowering your team to position security solutions confidently, start the security conversation, and identify and qualify the right opportunities. Plus! Attend and get a chance to win a Solo Stove or an outdoor pizza oven! 🍕🔥 Register here: https://bit.ly/3YEKbC3 - Generative AI technologies have had a transformative impact on businesses to help improve efficiency and reduce overhead. However, as reliance on these technologies rises, they come with their own complex set of cybersecurity challenges. 😨 Security leaders want to understand the evolving AI threat surface, the importance of governance and visibility, and the types of attacks researchers are seeing as well as what effective countermeasures can be used. Join Greg Crowley, and Dr. Jeff Schwartzentruber, as they walk through how MDR providers are introducing GenAI tools to accelerate threat investigations outcomes and response. You'll also learn about the types of telemetry defenders need to gather to properly secure and monitor AI based applications, and how MDR will need to adapt to defend an AI-enabled world. In this webinar, we will share our insights on: ➡ Cyber risks associated with using generative AI technologies ➡ How security leaders can use ChatGPT, and other similar tools, to strengthen their cybersecurity posture and build cyber resilience ➡ How security leaders can set up, deploy, and use LLM (large language model) gateways to protect your company's sensitive data and ensure regulatory compliance ➡ How MDR providers are applying generative AI tools to advanced threat detection and response to provide better security outcomes 📝 Register now: https://lnkd.in/dJGX6ubP #generativeai #genai #machinelearning #cybersecurity #cyberthreats
This content isn’t available here
Access this content and more in the LinkedIn app - The latest edition of the TRU Weekly Threat Briefing is now out! 🦉 Here are the top 3 stories we're discussing: 1️⃣ Investigating a SharePoint Compromise Threat actors have been identified targeting a high-severity vulnerability in on-premise SharePoint servers. Organizations need to ensure that Internet-facing applications are regularly reviewed for vulnerabilities and are prioritized for patching. 2️⃣ New Black Basta Social Engineering Technique The Black Basta ransomware group has incorporated new social engineering tactics to gain access to victim organizations, including the abuse of Microsoft teams, email bombing, and Remote Monitoring and Management tools. Organizations must strengthen their defenses against these multi-layered social engineering campaigns. 3️⃣ National Cyber Threat Assessment 2025-2026 The Canadian Center for Cyber Security (CCCS) National Cyber Threat Assessment for 2025-2026 includes information on state adversaries, cybercrime, and threat landscape trends. The report highlights the continued impact of both Peoples Republic of China threat actors and ransomware on Canadian industries. Read the full briefing below #threatintelligence #sharepoint #cyberthreats #cybersecurity #blackbasta
Weekly Threat Briefing: Oct 28 - Nov 1, 2024 eSentire on LinkedIn -
51,246 followers
2w Edited
From early challenges to AI-driven security, here's how two industry leaders have built resilient defenses in a world where threats evolve daily. 🎙️ Rich Raether, CIO of Quarles & Brady, and Andrew DeBratto, CISO of Hunton Andrews Kurth LLP, join the latest episode of the Cyber Talks podcast to unpack the evolution of cybersecurity from their decades in the industry. They recount shared projects, including navigating early security challenges, and reflect on how the industry has transformed, focusing on threat management and resilience-building. Rich and Andrew also reflect on how best practices in the industry have evolved and why proactive education to mitigate risks from ransomware, phishing, and other persistent threats is critical. Key takeaways include: 🔒 Shifts in Threat Management: From perimeter defense to AI-driven, cloud-based approaches in today’s hybrid environments 💡 Keys to Resilience: Incremental improvements and proactive education to guard against phishing, ransomware, and other threats 🤝 The Value of MDR Partnerships: Achieving consistent visibility and rapid response to incidents, essential for a robust security posture Tune in to hear how fostering a security-first culture year-round creates lasting resilience. 🎧 Spotify: https://spoti.fi/48ykEiw🎧 Apple: https://apple.co/3AujTuq -
51,246 followers
2w Edited
For many SMBs, disaster recovery planning often slips down the priority list—until a crisis hits. But the stakes are high: just a few hours of downtime can be costly, and a full-blown disaster can be fatal. 📉 46% of businesses lack a documented disaster recovery plan, and stats show that 90% of SMBs may not survive a year if they don’t resume operations within five days post-disaster. Unfortunately, even if a disaster recovery plan is in place, it may not always be implemented correctly. Quentin Simmons, our Sr. Digital Forensic Investigator, says, "Plans are not being tested and nor re-evaluated on a consistent basis to keep up with the evolution of risks. Organisations need to ensure their DR strategies include redundancy and multiple phases to maintain the integrity of their backups." So, here’s where resellers play a crucial role. By guiding SMBs on disaster recovery strategies, resellers can help ensure: ➡️ Preparedness for cyber threats & natural disasters: Disaster recovery isn’t just tech—it’s about safeguarding continuity. ➡️ Regular testing and compliance: Many SMBs skip testing—big mistake. Resellers should advocate for realistic, compliant solutions. ➡️ Holistic, tailored plans are created since a one-size-fits-all disaster recovery plan doesn’t work. Effective plans include on-site & cloud backup, redundancy, and staff training. Resellers—this is your opportunity to support SMBs in building resilience and continuity. Let’s make sure they’re not just surviving but thriving, no matter what comes their way. 🛠️ Read the full article here: https://bit.ly/3AnvADd #disasterrecovery #incidentresponse #cybersecurity - What do LummaStealer, Matanbuchus, and Midnight Blizzard have in common? They're the topics of discussion of our November TRU Intelligence Briefing by our eSentire Threat Response Unit (TRU)! Join us on November 12th as our TRU team hosts a live webinar to share new research-driven observations of malware, notable vulnerabilities, threat actor groups, and cyber activity affecting the threat landscape. This month, our monthly TRU Intelligence Briefing will review: 🦉 Threat Landscape: A review of malware recently observed by eSentire’s Threat Intelligence team over the past month including LummaStealer, Matanbuchus, as well as notable vulnerabilities impacting Cisco (CVE-2024-2048), Zimbra (CVE-2024-45519), and Fortinet (CVE-2024-47575). This section will also include a quick overview of the “Email Bombing” initial access technique. 🦉 A brief geopolitical update focused on the Russian state-sponsored APT group Midnight Blizzard. 🦉 Code Signing Certificate Landscape: An analysis of the underground ecosystem supplying code signing certificates to threat actors, including key insights derived from the hundreds of distinct certificates tracked in 2024. 🦉 Signed Malicious Code – Observations and Defense Mechanisms: Code-signing certificates abuse in the wild and recommended defense mechanisms against these threats. Register here: https://lnkd.in/gNhWvEz3 #threatbriefing #ransomware #cybersecurity #threatintelligence #lummastealer #midnightblizzard #APT
This content isn’t available here
Access this content and more in the LinkedIn app
Join now to see what you are missing
Affiliated pages
Similar pages
Browse jobs
- eSentire jobs 47 open jobs
- Account Manager jobs 8,569 open jobs
- Analyst jobs 46,752 open jobs
- Account Executive jobs 4,646 open jobs
- Cyber Security Specialist jobs 1,485 open jobs
- Director jobs 62,088 open jobs
- Project Manager jobs 21,434 open jobs
- Sales Manager jobs 14,070 open jobs
- Engineer jobs 32,877 open jobs
- Information Security Analyst jobs 491 open jobs
- Sales Director jobs 2,929 open jobs
- Human Resources Business Partner jobs 6,297 open jobs
- Vice President jobs 9,517 open jobs
- System Administrator jobs 2,455 open jobs
- Business Development Specialist jobs 2,671 open jobs
- Security Consultant jobs 1,923 open jobs
- Director Business Intelligence jobs 305 open jobs
- Solutions Architect jobs 8,282 open jobs
- Associate Product Manager jobs 5,921 open jobs
- Key Account Manager jobs 1,980 open jobs