Threats don't respect your work hours or your location, so why should threat response and endpoint management be constrained by the times when you're at your desk? The time it takes to respond to a network intrusion can make the crucial difference between "saving the...
Sentinel One News
Category: Sentinel One News
RSAC DAY 1 – Rollback and Relax
Once again we're here at RSA! Since last year, SentinelOne has developed a better product, a better team and become even better at innovation, introducing new technologies that are re-defining endpoint security. This year we look forward to meeting our customers and...
SentinelOne Ranger (IoT) – Technology Preview
Ranger creates visibility into your network by using distributed passive and active mapping techniques to discover running services, unmanaged endpoints, IoT devices, and mobiles. Why Does Enterprise Need This? The number of devices running on networks is increasing...
The ONE reason to visit SentinelOne’s RSA 2019 booth S #1527
The ONE reason to visit SentinelOne's RSA 2019 booth, S #1527, is to witness ActiveEDR: we're autonomously delivering prevention, detection, response, and hunting. Get ready to see us take endpoint to places it's never been before! One Platform. One Agent. One...
What is EDR? (And is it Failing?)
The term EDR - Endpoint Detection and Response - only entered the vocabulary of computer security a few years ago and still causes some confusion among customers entering into the crowded field of enterprise security solutions. What, exactly, is EDR? How is it...
Active EDR – Feature Spotlight
Today we are pleased to announce the revolutionary technology of ActiveEDR. ActiveEDR solves the problems of EDR as you know it by tracking and contextualizing everything on a device. ActiveEDR is able to identify malicious acts in real time, automating the required...
Intel Inside – SentinelOne Cryptominer Detection
Cryptominers are illegally used for Cryptojacking, the process by which an attacker secretly launches cryptocurrency mining software on a target system. The software consumes processor cycles to process cryptocurrency transactions, thus earning the attacker a...
Full Remote Shell – Feature Spotlight
Full Remote Shell gives your security team a rapid way to investigate attacks, collect forensic data, and remediate breaches no matter where the compromised endpoints are located, eliminating uncertainty and greatly reducing any downtime that results from an attack....
Reach Me
Request a Call Back by filling out and submitting the following form.








