eSentire esentire.com


Public list: cybersecurity (3154) RSA Exhibitors 2016 (313)

eSentire specializes in advanced threat solutions for the hedge fund industry based on core IP upon which their business succeeds. eSentire delivers real-time threat detection and mitigation on a 24x7x365 basis now known as Continuous Monitoring as a Service (CMAAS).

eSentire specializes in advanced threat solutions for the hedge fund industry based on core IP upon which their business succeeds. eSentire delivers real-time threat detection and mitigation on a 24x7x365 basis now known as Continuous Monitoring as a...Show all

Company (Alive / Active)

Phone: 519-651-2200

Fax:

451 Phillip St
Suite #135
Cambridge, N2L 3X2
Ontario, Canada

Latest News

See more competitors data Competitors
Total Funding Date of Last Funding
eSentire $187.9M Mar 4, 2019
Carbon Black $343.4M Oct 9, 2019
Damballa $57.9M Jul 21, 2016
See all 8 competitors

Web Traffic

Rank

Show (-10)

Engagement (PVPU)

Show (+1%)

Domain Authority Score
Show
Page Views Per Million (PVPM)
Show
Reach Per Million
Show

SEO Statistics

Domain Authority Score Show
Page Authority Score Show
No. External Links Show
No. Links Show

Web Traffic Statistics - Growth

Per Week Per Month Per 6 Months Per Year
Rank Login to see details
Page Views Per Million Login to see details
Page Views Per User Login to see details
Reach Per Million Login to see details

Related eSentire Jobs

jobs by Indeed job
						search

Investors

Investor Investor Type Location Participating Rounds
See all 10 investors

Board Members

Competitors

Company Status Description Investors
See all 8 competitors

Patents

Title Application Date Patent Date Status
(Patent / Application)
Systems and methods for efficient network conversation bandwidth statistics gathering Mar 07, 2017 Dec 24, 2019 Patent
System and method for determining network security threats Dec 30, 2016 Sep 10, 2019 Patent
System and method to spoof a tcp reset for an out-of-band security device Aug 18, 2017 Aug 13, 2019 Patent
System and method for computer system security Jun 03, 2013 Application