SentinelOne | Autonomous AI EndPoint Security Platform
The SentinelOne Endpoint Protection Platform unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with fully automated, policy-driven response capabilities, and complete visibility into the endpoint environment with fullcontext, real-time forensics.
ActiveEDR™ is delivered via SentinelOne’s single agent, single codebase, single console architecture. Going beyond traditional antivirus and EDR solutions, ActiveEDR, powered by SentinelOne’s patented Storyline™ technology, allows security teams to quickly understand the story and root cause behind threat actors and autonomously respond, without any reliance on cloud resources. Storyline™ correlates and serves as a unique identifier for all events belonging to a group of processes.
Tomorrow’s Threats Require a New Enterprise Security Paradigm
Multiple patented AI algorithms protect against the widest array of threat vectors. Eliminate dependency on connectivity, cloud latency, and human intervention. On-device AI prevents known and unknown threats in real time.
detection and response
Devices self defend and heal themselves by stopping processes, quarantining, remediating, and even rolling back events to surgically keep endpoints in a perpetually clean state. Hunt more and pivot less.
iot discovery and control
SentinelOne Ranger transforms every device into a sentinel, mapping and enforcing the enterprise IoT footprint. Hunt rogue devices, ensure vulnerability hygiene, and segment devices with dynamic policies.
Deploy autonomous CWPP across cloud, container, and server workloads. The building blocks of your secure cloud transformation are visibility, file integrity monitoring, protection,
SentinelOne StoryLine. Defeating Every Attack.
Every Second. Every Day.
SentinelOne’s Deep Visibility empowers you with rapid threat hunting capabilities thanks to our patented Storylines technology. Each autonomous SentinelOne Agent builds a model of its endpoint infrastructure and real-time running behavior. The Storyline ID is an ID given to a group of related events in this model. When you find an abnormal event that seems relevant, use the Storyline ID to quickly find all related processes, files, threads, events and other data with a single query.
Rich forensic data can action threats automatically, including mitigation and even a complete rollback to pre-encrypted states. As a threat hunter, your main mission is to understand the behavior of your endpoints and to capture abnormal behavior with fast, super fast mitigation actions. You need the ability to search your fleet for behavioral indicators such as those mapped by the Mitre ATT&CK framework with a single-click, and you need to automate threat hunts for known attacks or according to your own criteria. SentinelOne’s Storylines allows you to do all that and more, faster than ever before.
Level 31, 120 Collins St
Melbourne VIC 3000
Copyright © 2020 Morfit Group Consulting