Connect with us

Press Releases

eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket

Published

on

Press Release: eSentire Endpoint Managed Detection and ResponseTM, Powered by Carbon Black Strengthens Defense Against Cyber Threats and Attack Vectors

// -- Discuss and ask questions in our community on Workplace.

CAMBRIDGE, ONTARIO – September 12, 2016eSentire, Inc., the leader in managed cyber threat detection and response services, today launched eSentire Endpoint Managed Detection and Response™ (MDR), powered by Carbon Black, the leader in next-generation endpoint security. The integrated service makes endpoint security available to midmarket organizations, helping them strengthen their overall security posture.

Cybercrime and the attack vectors used by hackers are evolving faster than the traditional defenses organizations require to counter advanced threats. eSentire Endpoint MDR, powered by Carbon Black, provides a critical layer of protection for today’s most common target, the endpoint. (70% of all breaches occur at the endpoint according to Verizon’s 2013 Data Breach Investigations Report).

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

A Powerful Cybersecurity Combination

The integrated cybersecurity service makes eSentire the first and only vendor in Gartner’s 2016 Market Guide for Managed Detection and Response Services to provide Carbon Black endpoint visibility and response as a comprehensive, fully managed security service.

eSentire Endpoint MDR provides real-time continuous monitoring, hunting, detection, and isolation of endpoint threats before they propagate within the customer’s network. The service goes beyond legacy solutions, leveraging analysts, attack patterns, and behavioral analytics to forensically investigate and combat unknown threats.

Carbon Black’s “Cb Response” is the market-leading incident response and threat hunting solution. Its integration with eSentire Endpoint MDR allows the service to continuously record and centralize all endpoint activity, providing eSentire’s Security Operations Center (SOC) analysts with complete, real-time information needed to understand exactly how attackers are targeting a customer’s organization so they can identify root cause, hunt anomalous behavior, and isolate threats with precision.

Cb Response empowers eSentire Endpoint MDR to streamline alert validation, accelerate investigations, reduce dwell time, eliminate unnecessary reimaging, and limit IT involvement in the security lifecycle process. Endpoint Detection Response (EDR) recording is essential for threat remediation, complementing full packet capture analysis techniques. This enhanced visibility enables eSentire SOC analysts to rapidly contain attacks and accelerate remediation efforts.

“Technology simply isn’t enough to combat today’s sophisticated cyber-attacks. In the case of the endpoint, it has been clearly demonstrated that traditional antivirus and firewall technologies cannot prevent endpoints from being compromised. The attacks and malware are always evolving faster than the signatures can keep up,” said Mark McArdle, CTO, eSentire. “The key to MDR is having broad and deep visibility into the network and its endpoints. Identifying and understanding a threat is required before you can respond. eSentire Endpoint MDR provides our clients with unparalleled endpoint threat management. Our business has been built on hunting down and terminating threats, and partnering with Carbon Black allows us to deliver an affordable, premiere endpoint service to midmarket organizations.”

eSentire Endpoint MDR Benefits:

  • Arms organizations against the most sophisticated threats.
  • Detects threats, isolates and responds to attacks in real-time with its always-on, 24×7 service.
  • Continuously records, centralizes, and correlates all endpoint activity to quickly detect attacks others miss.
  • Detects unknown attacks leveraging attack patterns and behavioral analytics – not simplistic signatures or IOCs.
  • Instantly reveals root cause and scope, helping to prevent repeat attacks.
  • Secures Mac, Linux, and Windows devices for local and remote users.
  • Lightweight agent on endpoints.
  • Reduces time, effort, and costs associated with incident response.
  • Cloud implementation reduces complexity; zero hardware and maintenance costs.
  • As part of eSentire Managed Detection and ResponseTM service, eSentire Endpoint MDR benefits from unparalleled visibility to network events thanks to always-on full packet capture and the real-time, signature, behavioral, and anomaly-based threat detection and prevention capabilities delivered through eSentire’s SOC.

“As the leader in next-generation endpoint security, Carbon Black has had great success helping organizations of all sizes. Partnering with eSentire allows us to continue making our market-leading incident response and threat hunting solution available to one of the fastest growing attack targets today, the midmarket,” said Tom Barsi, SVP, business development, Carbon Black. “Leveraging Cb Response, eSentire’s expert security analysts can continuously monitor, hunt, detect, isolate, and respond to never-before-seen endpoint threats, stopping cybercriminals in their tracks. For customers, the eSentire and Carbon Black partnership makes a cyber-security service available that was previously perceived as unattainable due to the cost and resources required to power EDR monitoring.”

eSentire Endpoint MDR provides the most complete protection against advanced cyberattacks that target endpoints and servers, 24×7. For more information, visit: https://www.esentire.com/what-we-do/core-technologies/endpoint-security.

About eSentire
eSentire® is an industry leader, providing managed detection and response (MDR) services to mid-sized organizations, keeping them safe from constantly evolving cyber attacks that traditional security defenses simply can’t detect. eSentire combines people, process, and technology to deliver an unmatched, premium level service that detects, remediates, and communicates sophisticated cyber threats in real-time, 24×7. Protecting more than $3.2 trillion in Assets under Management (AuM), eSentire is the award-winning choice for security decision-makers in mid-size enterprises.

eSentire has received multiple accolades for exceptional service, including numerous HFM (Hedge Fund Manager) Service Provider awards (2013, 2014, 2015, 2016). In 2015, eSentire was named to Deloitte’s Technology Fast 50TM and Fast 500TM lists, and included in the 2016 “Market Guide for Managed Detection and Response Services” and 2015 “Cool Vendors in Cloud Security Services” reports by Gartner, Inc. For more information, visit www.esentire.com and follow@esentire on Twitter.

About Carbon Black
Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute’s Best of 2015 Awards. For more information, visit www.carbonblack.com.

Products, service names, and company logos mentioned herein may be the registered trademarks of their respective owners. All rights reserved.

PR Contacts:
Angela Tuzzo
MRB Public Relations for eSentire
+1 732.758.1100, x. 105
atuzzo@mrb-pr.com

Mandy Bachus
eSentire Corporate Communications
+1 226.338.7135
mandy.bachus@esentire.com

If you would rather not receive future communications from eSentire, let us know by clicking here.
eSentire, 278 Pinebush Road, Suite 200, Cambridge, ON N1T 1Z6 Canada

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...





Feedback or Requests?

Click to comment

You must be logged in to post a comment Login

Leave a Reply

Press Releases

SecurityScorecard Announces Data Science Partnership with Columbia University

Published

on

Press Release: Security rating and risk monitoring platform to collaborate with Columbia’s Data Science Institute to build breach prediction models.

// -- Discuss and ask questions in our community on Workplace.

NEW YORK – August 31, 2016SecurityScorecard, the most accurate security rating and continuous risk monitoring platform, today announced a year-long partnership with Columbia University’s Data Science Institute.  The two will collaborate on various data science and machine learning projects to build breach prediction models that will help determine how and why cyberattacks happen, and the types of organizations that are vulnerable to them.

Breach prediction models provide a way to assess the security risk for clients as well as other companies. The objective of the analysis is to investigate methods to develop learning algorithms to automatically cluster organizations into groups based on the malware and port vulnerability features in their data sets – vital proprietary information SecurityScorecard uses to understand how cyberattacks happen.

Scores created by SecurityScorecard already cover the security hygiene of a large number of companies, based on a wide breadth of security indicators. By identifying which types of security vulnerabilities are more closely tied to actual breaches or attacks, SecurityScorecard aims to further improve its scoring, which is already top in the field.

// -- Become a yearly Platinum Member and save 69 USD and get access to our secret group on Workplace. Click here to change your current membership -- //

“SecurityScorecard is constantly looking for ways to improve the predictive power and accuracy of our scores, and this requires a variety of approaches. By partnering with Columbia, we will expand the resources available for research using advanced data science techniques,” said Luis Vargas, Senior Data Scientist at SecurityScorecard. “Research outcomes from the partnership will be used to improve our analytics, and gain insights into new ways of developing algorithms.”

The university plans to use the data as a starting point to build risk models for cyber insurance.

“This is an exciting partnership between the university and SecurityScorecard. Columbia will base its analysis on SecurityScorecard’s rapidly growing IP-based threat and vulnerability data such as insecure ports and malware infections, in significantly more detail than has been done before,” said Vishal Misra, Computer Science Professor at Columbia Engineering.  “Therefore, we expect that new insights will be uncovered from this data. We cannot wait to get started.”

SecurityScorecard chose to partner with Columbia University given their wealth of expertise in machine learning, as well as security.

“We believe that Columbia has the right combination of expertise, mentorship, and committed students who can apply their skills to conduct research on our data,” said Vargas. “As a leading startup in New York City, SecurityScorecard also has a strong interest in helping create connections with the next generation of data scientists here in the city.”

About SecurityScorecard

SecurityScorecard provides the most accurate rating of security risk for any organization worldwide. The proprietary cloud platform helps enterprises gain operational command of the security posture for themselves and across all of their partners and vendors. The platform offers a breadth and depth of critical data points not available from any other service provider and in a completely self-service and automated tool. The platform provides continuous, non-intrusive monitoring for any organization including third and fourth parties. Security posture is assessed and measured non-intrusively across a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering and Passwords Exposed.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...





Feedback or Requests?

Continue Reading

Press Releases

New Book – ‘Hacked Again’ – It can Happen to Anyone… Even a Cyber Security Expert

Published

on

scott-3D-bPress Release: Hacked Again details the ins and outs of a cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind him being hacked. By day, he runs a successful security company and reports on the latest cyber breaches in the hopes of offering solace and security tips to millions of viewers. But Scott begins to realize his worst fears are only a hack away as he falls prey to an invisible enemy.

// -- Discuss and ask questions in our community on Workplace.

Scott Schober shares his personal accounts as a business owner, thought leader, and wireless technology expert as his book examines a multitude of cybersecurity issues affecting all of us. Through tips and advice gained from his own experience, Scott offers hope to others by examining his own security foibles so readers will not have to go through the same cybersecurity struggles themselves.

Available immediately for purchase : www.hackedagain.com

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...





Feedback or Requests?

Continue Reading

Recent Comments

Recent Posts

A part of CCN

Hacked.com is Neutral and Unbiased

Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com.

Trending