Search company, investor...

Founded Year

2001

Stage

Secondary Market | Alive

Total Raised

$289.13M

Last Raised

$225M | 3 yrs ago

Mosaic Score
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

-41 points in the past 30 days

About eSentire

eSentire focuses on managed detection and response services in the cybersecurity industry. The company offers a range of services including exposure management services, managed detection and response, and digital forensics and incident response, all aimed at identifying security gaps, improving threat detection, and providing rapid response to cyber threats. It primarily serves various sectors including the insurance, construction, finance, legal, manufacturing, private equity, healthcare, and retail industries. It was founded in 2001 and is based in Waterloo, Canada.

Headquarters Location

451 Phillip Street Suite 135

Waterloo, Ontario, N2L 6M2,

Canada

866-579-2200

Loading...

Loading...

Research containing eSentire

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned eSentire in 1 CB Insights research brief, most recently on Feb 28, 2022.

Expert Collections containing eSentire

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

eSentire is included in 5 Expert Collections, including Unicorns- Billion Dollar Startups.

U

Unicorns- Billion Dollar Startups

1,244 items

C

Capital Markets Tech

997 items

Companies in this collection provide software and/or services to institutions participating in primary and secondary capital markets: institutional investors, hedge funds, asset managers, investment banks, and companies.

C

Cybersecurity

9,329 items

These companies protect organizations from digital threats.

F

Fintech

13,396 items

Excludes US-based companies

C

Canadian fintech

345 items

eSentire Patents

eSentire has filed 5 patents.

patents chart

Application Date

Grant Date

Title

Related Topics

Status

12/30/2016

5/11/2021

Machine learning, Numerical climate and weather models, Climate modeling, Derivatives (finance), Rotating disc computer storage media

Grant

Application Date

12/30/2016

Grant Date

5/11/2021

Title

Related Topics

Machine learning, Numerical climate and weather models, Climate modeling, Derivatives (finance), Rotating disc computer storage media

Status

Grant

Latest eSentire News

Advanced Phishing Attacks Put X Accounts at Risk

Sep 18, 2024

Advanced Phishing Attacks Put X Accounts at Risk Freelance Writer, Infosecurity Magazine Users of social media site X (formerly Twitter) risk having their accounts hacked, even if they have two-factor authentication set up, according to eSentire. Researchers at eSentire’s Threat Research Unit (TRU) found that account takeover was still possible, even though X accounts use security keys or passkeys. X’s own security features allow strong authentication to be bypassed, they warn. As well security keys or passkeys, X users can also use SMS codes or an authenticator application to access their accounts. However, hackers can easily bypass these methods, either through an adversary-in-the-middle (AiTM) attack, intercepting or tricking users into revealing their authentication codes or though SIM swapping. This redirects the authentication code to the attacker’s phone. The US actor Sydney Sweeny had her X account hacked in July, through a SIM-swapping scam. Other victims of X account takeovers include Lara and Tiffany Trump, the rock band Metallica and senior staff at McDonalds. Crypto-Driven Attacks “In the past eight months, there have been numerous X accounts that have been breached by hackers,” Spence Hutchinson, TRU threat intelligence researcher, told Infosecurity. “These high-profile accounts were commonly breached to promote cryptocurrency scams or phishing links to thousands of their followers.” Many of the attacks, including those against the Trumps and Metallica, promoted cryptocurrency schemes. According to Hutchinson, the way X allows users to sign in using an authenticator application or SMS code undermines the use of security keys and passkeys. “While traditional 2FA methods like SMS codes, authentication apps and backup codes add a small security improvement over passwords, they are no defense against sophisticated modern phishing attacks, such as AiTM attacks,” he said. Online Retailers and Software Services Vulnerable TRU researchers warned that it is not only X accounts that are vulnerable. The team found that a number of software services and online retailers’ security keys or passkeys through a technique they term “authentication method redaction” (AMR). To carry out an AMR attack, the hacker blocks the site’s security or passkey option, forcing users to sign in with an email address and password instead. TRU recommends the use of stronger protections, such as passkeys or FIDO2 hardware authenticators, and disabling insecure MFA access methods. “These breaches highlight the need for a robust and secure authentication posture that takes into account the most up-to-date measures to log in,” Don Tait, senior analyst for identity cybersecurity at Omdia told Infosecurity. “Not all authentication methods are the same. Taking advantage of the best authentication methods will minimize the chances of getting breached.” Image credit: BongkarnGraphic / Shutterstock.com

eSentire Frequently Asked Questions (FAQ)

  • When was eSentire founded?

    eSentire was founded in 2001.

  • Where is eSentire's headquarters?

    eSentire's headquarters is located at 451 Phillip Street, Waterloo.

  • What is eSentire's latest funding round?

    eSentire's latest funding round is Secondary Market.

  • How much did eSentire raise?

    eSentire raised a total of $289.13M.

  • Who are the investors of eSentire?

    Investors of eSentire include Georgian, Caisse de depot et placement du Quebec, Warburg Pincus, Edison Partners, Northleaf Capital Partners and 8 more.

  • Who are eSentire's competitors?

    Competitors of eSentire include Darktrace, Trustwave, Mandiant, F-Secure, McAfee and 7 more.

Loading...

Compare eSentire to Competitors

C
Cerebra

Cerebra operates as a software products company focusing on the design and development of cybersecurity technologies. The company offers a range of products including a cybersecurity awareness platform, a multi-factor authentication solution, a phishing simulation solution, and an enterprise messaging gateway. It aims to protect organizations from cyber threats and enhance their cybersecurity awareness. Cerebra was founded in 2020 and is based in Riyadh, Saudi Arabia.

Expel Logo
Expel

Expel operates as a security operations company and specializes in managed detection and response (MDR) within the cybersecurity industry. The company offers various services such as 24/7 monitoring, threat detection, incident response, and security infrastructure optimization. Expel was formerly known as The Concern. It was founded in 2016 and is based in Herndon, Virginia.

T
The VP Techno Labs International

The VP Techno Labs International facilitates cybersecurity solutions. The company offers cybersecurity solutions, using its proprietary Triple Shield DRE methodologies, to protect businesses from cyber threats that could impact their revenue and reputation. The company primarily serves a wide range of sectors including the pharmaceutical, healthcare, hospitality, automotive, and retail industries. It was founded in 2019 and is based in India.

Sophos Logo
Sophos

Sophos provides information technology services. The company offers security and data protection, data loss prevention, patch assessment, full-disk encryption, firewall, intrusion prevention system, mobile device management, wireless security, and network access control. It offers its solutions in a wide range of industries such as education, healthcare, manufacturing, retail, and more. The company was founded in 1985 and is based in Abingdon, United Kingdom.

Exabeam Logo
Exabeam

Exabeam operates as a cybersecurity company and specializes in artificial intelligence (AI) driven security operations for threat detection, investigation, and response. The company offers various products such as cloud-scale security log management, security information and event management (SIEM), and behavioral analytics. It was founded in 2013 and is based in Foster City, California.

B
Barikat Cyber Security

Barikat Cyber Security specializes in the development of cyber security solutions within the information security industry. The company focuses on creating technologies and solutions that aim to protect information, emphasizing continuous improvement and the cultivation of a skilled workforce. Barikat Cyber Security serves various sectors that require information protection and cyber security measures. It was founded in 2008 and is based in Istanbul, Turkey.

Loading...

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.