Sentinel One News

Category: Sentinel One News

S1 Mobile Admin App – Feature Spotlight

S1 Mobile Admin App – Feature Spotlight

Threats don't respect your work hours or your location, so why should threat response and endpoint management be constrained by the times when you're at your desk? The time it takes to respond to a network intrusion can make the crucial difference between "saving the...

RSAC DAY 1 – Rollback and Relax

RSAC DAY 1 – Rollback and Relax

Once again we're here at RSA! Since last year, SentinelOne has developed a better product, a better team and become even better at innovation, introducing new technologies that are re-defining endpoint security. This year we look forward to meeting our customers and...

SentinelOne Ranger (IoT) – Technology Preview

SentinelOne Ranger (IoT) – Technology Preview

Ranger creates visibility into your network by using distributed passive and active mapping techniques to discover running services, unmanaged endpoints, IoT devices, and mobiles. Why Does Enterprise Need This? The number of devices running on networks is increasing...

What is EDR? (And is it Failing?)

What is EDR? (And is it Failing?)

The term EDR - Endpoint Detection and Response - only entered the vocabulary of computer security a few years ago and still causes some confusion among customers entering into the crowded field of enterprise security solutions. What, exactly, is EDR? How is it...

Active EDR – Feature Spotlight

Active EDR – Feature Spotlight

Today we are pleased to announce the revolutionary technology of ActiveEDR. ActiveEDR solves the problems of EDR as you know it by tracking and contextualizing everything on a device. ActiveEDR is able to identify malicious acts in real time, automating the required...

Intel Inside – SentinelOne Cryptominer Detection

Intel Inside – SentinelOne Cryptominer Detection

Cryptominers are illegally used for Cryptojacking, the process by which an attacker secretly launches cryptocurrency mining software on a target system. The software consumes processor cycles to process cryptocurrency transactions, thus earning the attacker a...

Full Remote Shell – Feature Spotlight

Full Remote Shell – Feature Spotlight

Full Remote Shell gives your security team a rapid way to investigate attacks, collect forensic data, and remediate breaches no matter where the compromised endpoints are located, eliminating uncertainty and greatly reducing any downtime that results from an attack....

Reach Me

Request a Call Back by filling out and submitting the following form.

+1 408-568-3993

    What is 2 + 6 ? Refresh icon