eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyberattacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.eSentire.com and follow @eSentire. IT’S ONLY A MATTER OF TIME TO FIND A BLIND SPOT THE GREATER YOUR EXPOSURE, THE GREATER THE PROBABILITY BECOMES REALITY² TRADITIONAL SECURITY APPROACHES PROVE FUTILE, WHILE MEAN TIME TO IDENTIFY AND CONTAIN A THREAT EXTENDS TO DANGEROUS LEVELS CONFIDENCE IN CAPABILITIES TO QUICKLY DETECT AND CONTAIN AN ATTACK DECREASE WHILE CONSEQUENCES INCREASE MODERNIZE YOUR CYBERSECURITY TO MEET THE DEMANDS OF TODAY’S THREAT LANDSCAPE of attackers can achieve in under 10 hours of attackers can achieve in under 10 hours 71 67 Manufacturing: Probability of a breach Fabricating An Environment For Cyber Risk ADVERSARIES EXECUTE ATTACKS AGAINST MANUFACTURERS FASTER THAN EVER USING TOOLS AND TECHNIQUES DESIGNED TO BYPASS YOUR CYBERSECURITY MEASURES1 of attackers can achieve in under 10 hours 78 Malware Phishing Exploit Cumulative Modernized business demands modernized security. eSentire Managed Detection and Response ¹2018 Nuix Black Report ²Using data from more than 2,000 deployed eSentire sites, depicts risk rates for organizations that do not have a threat monitoring service in place. Statistical projections are based on the ongoing and cumulative chance attack categories would have been picked up by an eSentire Security Operations Center, which watches for things bypassing traditional security measures in unmonitored environments. ³⁴⁵⁶ 2018 Cyber Risk in Advanced Manufacturing Report ⁷⁸ Ponemon: 2018 Cost of a Data Breach Study ⁷⁸Ponemon: 3rd Annual Study on the Cyber Resilient Organization ⁹¹⁰¹¹https://www.americanbar.org/groups/law_practice/publications/techreport/2017/security/ SEE EVERTHING MISS NOTHING ACT BEFORE IMPACT HARDEN AGAINST FUTURE ATTACKS 24x7x365 monitoring with full spectrum visibility across on- premises, cloud and hybrid IT environments. Human threat hunting with machine learning-assisted detection uncovers known and never- before-seen attacks. Embedded incident response accelerates precision and speed, facilitating rapid tactical threat containment. Root cause investigation and remediation guidance defines corrective actions to harden security postures against evolving threats. 30 27 48 39 Locations Malware Phishing Exploit Cumulative TAKE ACTION Per Location: Cumulative Probability of a Security Incident Involving a Bypass of a Manufacturer's Security Controls Over a 12-month period² 49 % of attackers spend over 20 hours a week researching and bypassing security systems Breach the Perimeter Identify Critical Data Exfiltrate Data CONFIDENCE: • Nearly 50 % lack confidence they are protected⁷ CONSEQUENCES: • Increased downtime due to affected ICS • 91 % of material stolen is related to proprietary information 8 • 3.1 % abnormal client churn 9 • 48 % experienced losses of $500k or more per incident 10 168 DAYS mean time to identify a data breach⁷ 63 DAYS mean time to contain a data breach⁸ eSentire Managed Detection and Response (MDR) 1 3 6 9 20% 40% 60% 80% 100% • 48% report lack of funding as top barrier regarding cyber risk³ • 50% perform ICS vulnerability testing less than once a month⁴ • 31% have not conducted an ICS assessment⁵ • 39% experienced a breach in the last 12 months⁶