eSentire

Company Products

Show me products in:    
Active Threat Protection Platform by assenter
As the cyber landscape continues to shift and diversify at a staggering pace, the threat of a breach is a reality for companies of all sizes across industries. To combat today’s advanced targeted attacks and persistent threats, you need a proven, best in class approach. Validated as a best practice by leading industry analysts, Active Threat...
Network Interceptor
At the core of Active Threat Protection is Network Interceptor from eSentire. Network Interceptor is a proprietary network appliance delivered as a continuous managed service. Core capabilities include real-time deep-packet inspection, human assisted machine learning, behavior-based anomaly detection, signature-based intrusion detection and...
TRAP (Targeted Retrospection Analysis Platform)
Working in conjunction with Network Interceptor, TRAP broadens operational forensics, using wire-speed, full-packet capture to continuously scan, mitigate and report previously unknown and undetected threats.
Host Interceptor
Host Interceptor from eSentire works in conjunction with Network Interceptor to provide core network containment capabilities. Host Interceptor leverages technology and human-driven analysis, to assist with the containment of laterally spreading threats within the core of the network. This provides real-time detection and isolation of any network...
Log Sentry
Log Sentry from eSentire collects, centralizes and correlates critical event log data from any network-attached asset. Threat analysts rely on Log Sentry to provide informed decision-making and intervention specific to active threats detected by Network Interceptor and Host Interceptor. In certain scenarios, Log Sentry provides primary detection....
Continuous Vulnerability Scanning
Continuous Vulnerability Scanning (CVS) is delivered as a continuous managed service, ensuring our threat analysts are fully informed of security posture during active threat investigation. CVS also affords the customer the opportunity to drastically reduce the exploit window by having a current list of systems requiring patching and password...
Advisory Services
Today’s threat landscape requires constant vigilance to monitor network traffic for signs of an attack. While at the same time, your information security program must leverage industry best practices so you can stay ahead of evolving compliance demands and regulatory obligations. Most mid-sized enterprises simply aren’t equipped to manage...
Regulatory Examination Readiness Service
eSentire’s leadership position in the financial services market provides a unique perspective on how to detect and mitigate attacks that specifically target registered investment advisors, broker dealers, private equity firms and traditional asset management organizations. The Regulatory Examination Readiness Service will walk you through...