Autonomous AI Endpoint Security Platform
Cybersecurity that prevents threats at faster speed, greater scale, and higher accuracy than humanly possible
Award Winning Security
ENDPOINT PROTECTION PLATFORMS
- A Leader in the 2021 Magic Quadrant for Endpoint Protection Platforms
- Highest Ranked in all Critical Capabilities Report Use Cases
RECORD BREAKING ATT&CK EVALUATION
- No missed detections. 100% visibility
- Most Analytic Detections 2 yrs running
- Zero Delays. Zero Config Changes.
98% OF GARTNER PEER INSIGHT™
- 4.9/5 Rating for Endpoint Protection Platforms and Endpoint Detection and Response Solutions
- 96% Recommend SentinelOne
CUSTOMER TESTIMONIALS
The Splunk Use Case Model from Positka is a game changer. All Splunk users need to look into.
~ CISO,
Major Telco
The speed with which Splunk Use Cases were implemented by Positka ihelped us deliver to our customer requirements in record time.
~ CTO,
High Tech SaaS provider
Positka helped us with amazing insights by focusing on the data science with some of the best data scientist we have worked with.
~ Director of Analytics,
Global Technology Player
Stand Out from the Crowd
Drive risk reduction and efficiency with SentinelOne. Are you ready?
USER ENDPOINT CLIENTS
Windows XP,7,8,8.1,10
Mac OSX 10.9.x, 10.10.x, 10.11x, macOS 10.12x macOS 10.13(High Sierra)
CentOS 6.5,7.0,7.2
Red Hat Enterprise Linux 6.5,7.0,7.2
Ubuntu 12.04,14.04,16.04,16.10
OpenSUSE 42.2
SERVER ENDPOINT CLIENTS
Windows Server 2003, 2008, 2008 R2,
2012, 2012 R2, 2016
CentOS 6.5, 7.0, 7.2
Red Hat Enterprise Linux 6.5, 7.0, 7.2
Ubuntu 12.04, 14.04, 16.04, 16.10
SUSE Linux Enterprise Server 12SP1
Oracle Linux 6.5-6.9, 7.0+
Amazon Linux(AMI) 2016.09+, 2017.03+
VIRTUAL ENVIRONMENTS
Citrix XenApp, XenDesktop
Microsoft Hyper-V
Oracle VirtualBox
VMware vSphere
VMware Workstation
VMware Fusion
VMware Horizon
Singularity Platform EDR Packages
Cloud-Native NGAV
Endpoint security bedrock for organizations that want to replace legacy AV or NGAV with an effective EPP that is easy to deploy and manage.
The Suite Features You Need
Made for organizations seeking the best-of-breed cybersecurity with additional suite features.
Consolidating Vital Security Functions
Designed for organizations seeking single-agent enterprise-grade prevention, detection, response and hunting across endpoint, cloud, and IoT coupled with critical automations.
Endpoint Protection
- Built-in Static AI and Behavioral AI analysis prevent and detect a wide range of attacks in real time before they cause damage. Core protects against known and unknown malware, Trojans, hacking tools, ransomware, memory exploits, script misuse, bad macros, and more.
- Sentinels are autonomous which means they apply prevention and detection technology with or without cloud connectivity and will trigger protective responses in real time.
- Recovery is fast and gets users back and working in minutes without re-imaging and without writing scripts. Any unauthorized changes that occur during an attack can be reversed with 1-Click Remediation and 1-Click Rollback for Windows.
- Secure SaaS management access. Choose from US, EU, APAC localities. Data-driven dashboards, policy management by site and group, incident analysis with MITRE ATT&CK integration, and more.
IT OPS / Security Hygiene
- All SentinelOne Core features
- Device Control for control of USB devices and Bluetooth/BLE peripherals
- Firewall Control for control of network connectivity to and from devices including location awareness
- Rogues network visibility to uncover devices that don’t yet have Sentinel agents
- Vulnerability Management, in addition to Application Inventory, for insight into 3rd party apps that have known vulnerabilities mapped to the MITRE CVE database
Security Operations
- All SentinelOne Core + SentinelOne Control features
- Patented Storyline™ tech for fast RCA and easy pivots
- Integrated ActiveEDR™ visibility to both benign and malicious data
- 14 - 365+ historical EDR data retention + usable query speeds at scale
- Hunt by MITRE ATT&CK ® Technique
- Mark benign Storylines as threats for enforcement by the EPP functions
- Automated StorylineTM Active Response (STAR) watchlist functions
- Timelines, remote shell, file fetch, sandbox integrations, andmore
One Agent for Consolidation Efforts
- Singularity Complete includes full featured enterprise-grade EDR.
- Complete includes NGAV and behavioral AI to stop known and unknown threats.
- Complete includes suite features like network control, USB device control, and Bluetooth device control.
- Complete includes Rogue identification and can be instrumented for full network attack surface protection with Ranger IoT.
Storyline Automates Visibility
- Storyline creates context in real time at the source: Windows, Mac, Linux, and Kubenetes cloud-native workloads.
- Storyline enables efficient hypothesis testing leading to fast RCA conclusions.
- Process re-linking across PID trees and across reboots preserves precious context.
- S1QL query language enables intuitive searches and hypothesis-based hunting.
ActiveEDR Automates Response
- ActiveEDR responses are part of the same code base as prevention mechanisms.
- Resolve threats with 1-Click and without scripting on one, several, or all devices across the entire estate.
- Mark benign findings as threats for the same real-time automatic, 1-Click remediation.
- Automated Storyline Active Response (STAR) watchlists keep a constant watch for noteworthy and customizable situations needing a deeper look.
- Single API with 350+ functions provides a basis for further automation.
Hunter's Toolkit
- High performance, industry leading historical EDR data retention. 14 to 365 days visibility.
- Deep Visibility Storyline pivot and hunt by MITRE ATT&CK® technique.
- Customizable network isolation
- Secure Remote Shell (full Windows Powershell. Standard Mac & Linux bash).
- Manual and auto file fetch of malicious and benign files for Windows, Mac, Linux. Optional sandbox integrations for additional dynamic analysis.
NGAV & Behavioral AI Prevention
- Protects against ransomware, known and unknown malware, trojans, hacking tools, memory exploits, script misuse, bad macros, and living off the land attacks.
- On-agent Storyline™ tracking builds actionable context in real time.
- On-agent static AI replaces signatures and predicts malicious files.
- On-agent Behavioral AI identifies and stops fileless attacks happening within Storylines in real time.
- Autonomous operation. No cloud reliance for always-on protection.
1-Click Remediation & Recovery
- Automates threat resolution to reduce administrative workload. Fully automatic; no complicated scripting.
- Gets users working again fast. Eliminates tedious re-imaging.
- Autonomous and automatic threat responses trigger protective actions in real-time.
- Patented 1-Click remediation reverses unauthorized changes.
- Patented 1-Click rollback for Windows restores any data affected by an attack.
Incident Forensics & Reporting
- Easy-to-use incident data quickly orients analysts about what happened, when it happened, and who was affected. All information is stored for 365 days.
- Automatic interpretation is created using industry standard MITRE ATT&CK tactics and techniques mapping and AI indicators for malware prediction.
- Team workflows including custom annotations, verdict assignment, incident status, incident timelines and attack exploration.
- Customizable data driven dashboards and built-in reporting standard.
- Available integrations with Tableau® and Microsoft PowerBI®.
Deep OS & Interoperability Support
- Singularity agents provide support for the major desktop and server OSes.
- Resource efficient agents support physical systems, VDI, and cloud service providers.
- Support for 17 years of Windows releases including EOL versions, macOS’ new “kextless” security model, and 10 major Linux distributions.
- Anti-tamper mechanisms to prevent agent security interruptions.
- Powerful, pinpoint agent interoperability controls to ensure maximum security with system stability.