ESentire Better Together Features Comparison Chart

Transcription

Better Together:eSentire Managed Detection and Responseand Managed Vulnerability ServiceIn 2016, Gartner launched its Managed Detection andThis chart, reflecting eSentire’s collective serviceResponse (MDR) Guide, validating the category within thecapabilities, was built to help your organization measure themanaged security services market. Gartner’s recognitionMDR vendor landscape and visualize the risk associatedof MDR resulted from disparity between the evolvingwith inclusion or removal of signals from network, endpoint,threat landscape and traditional MSSP capabilities. Thislogs, and vulnerability data across key categories including:new MDR category put traditional MSSPs on notice, Visibilitybut categories and criteria by which to measure MDR Advanced analyticsproviders was absent. The 2018 Gartner MDR Guide Proactive threat huntingreviews more providers, including MSSPs that now claim Correlation and forensic investigationto deliver MDR, yet still lacks measurement criteria. This Alerts, containment and responsecreates a confusing MDR vendor landscape and subjects Vulnerability risk prioritizationunsuspecting buyers to unnecessary risk.“Clients should be wary of claims from traditional MSSPs on their ability to deliver MDR-likeservices. Delivering these services requires technologies not traditionally in scope for MSS,such as endpoint threat detection/response, or network behavior analysis or forensic tools.”- Gartner Managed Detection and Response Services Market Guide. May 2017.Analysts need visibilityacross a combinationof sources including:1. Web Traffic4. Endpoints2. Email Traffic5. Network Traffic3. Cloud Access6. Policies and Violations7. Vulnerabilities1

esNETWORK, esENDPOINT, esLOG and Managed Vulnerability ServiceesLOG esENDPOINTesNETWORKMONITORING, MANAGEMENTAND CONTINUOUS TUNINGWeekly Scanning(External Assets)MonthlyScanning(Internal Assets)24x7x365 managedFully managedFully managedCo-managedLimitedMerge and manage the signal set into a standardconfiguration that is deployed to all boxes(we can tune esLOG butnot the security devicesthat feed however we willmake recommendations)N/ARefinements and updates to account for client’sspecific environment are done continuously as theirenvironment changesVISIBILITYLOGSMonitors, captures and inspects logs from the following sources but not limited to: Security Events (IDS, Endpoint, DLP, VPN, WebFilters, Honeypots, Firewalls, IAM, etc.) Network Logs (Routers, switches, DNS servers,WAP, WAN, Data Transfers, VPC, etc.) Applications and Devices (Application Servers,Databases, Intranet Applications, Web Applications,SaaS Applications, Cloud Hosted Servers, etc.) AWS (CloudTrail, Config, Inspector, S3, etc.) Google Cloud Platform Microsoft Azure (Active directory, Azure audit, AzureSQL, Office365) Database (Amazon DynamoDB, SQL Server,MongoDB, MySQL, Oracle, etc.) Web Server (Apache, Tomcat, IIS, Nginx) DevOps (Docker, GitHub, Kubernetes, Jenkins, etc.) IT Infrastructure (Configuration, Locations, Owners,Network Maps, Vulnerability Reports) Operating System (Host Metrics, Linux, Windows,Windows Performance)Cloud deploymentOn-premises deployment2

esNETWORK, esENDPOINT, esLOG and Managed Vulnerability ServiceesLOG BILITYENDPOINTMonitors company assets at the endpoint level (hostvisibility)Inspection and recording of full endpoint telemetryOn-premises deploymentCloud deploymentNETWORKMonitors ingress and egress chokepoints anddecrypted spansReal-time inspection of network packet utilizing fullpacket capture (PCAP)On-premises deploymentCloud deploymentComing soonVULNERABILITIESBusiness contextual risk prioritizationRemediation guidance and verificationWeb Application scanningPCI Environment scanningOn-premises deploymentCloud deploymentANALYTICS AND DETECTIONNETWORKSignatures and IoCsMachine-learning integrationBig data analytics integrationBehavioralUser behavior analyticsAnomaly/suspicious basedMonitoring and investigation of signals that aregenerated from any source that don’t currently have aknown explanation for why they would be firing3

esNETWORK, esENDPOINT, esLOG and Managed Vulnerability ServiceesLOG ORK (CONTINUED)Investigate and determine a root cause for a detectionevent that doesn't have an existing known explanationwithin a 20-minute SLOThreat intelligence integration (home grown)Threat intelligence integration (external integration)HUNTING AND INVESTIGATIONProactive threat hunting Hypothesis-driven investigation (knowledgeof a new threat actor’s campaign based onthreat intelligence gleaned from a large pool ofcrowdsourced attack data) Investigations that are based on known IoCs(Indicator of compromise) Analytics-driven investigations (based on advancedanalytics and machine learning)Confirmation of true positive (false positive elimination)CORRELATION ANDFORENSIC INVESTIGATIONLogs: can perform searches inside client logs to assist inproviding more information during an investigationNetwork: can gather and interpret forensic data (PCAPs,netflow, metadata) from network choke points relevantto the investigationEndpoint: can gather and interpret forensic data(process flows, execution chains, etc) from affectedhosts relevant to the investigationEvidence collection, dissection, processing and analysisALERT, CONTAINMENT AND RESPONSEAlerting of suspicious behaviorAlerting of confirmed threatsHost level tactical containmentNetwork level tactical containmentResponse plan for particular incidentRemediation guidance and co-remediation until threat isfully contained and eradicatedPortal with data visualization24x7x365 SOC supportEradicating threats takes more than alerts.LEARN MORE4

eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keepingorganizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, andresponds in real-time to known and unknown threats before they become business-disrupting events.Protecting more than 6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity,delivering enterprise-grade protection and the ability to comply with growing regulatory requirements.For more information, visit www.eSentire.com and follow @eSentire.

Big data analytics integration Behavioral User behavior analytics Anomaly/suspicious based . eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its