SentinelOne is a group of defense and intelligence experts saw savvy attackers compromising endpoints seemingly at will. Tradition... Read More
SentinelOne is a group of defense and intelligence experts saw savvy attackers compromising endpoints seemingly at will. Traditional approaches failed to provide sufficient protection. They founded SentinelOne to develop a dramatic new approach to endpoint protection. It’s one that applies AI and machine learning to thwart known and unknown threats.
“I like that if a machine gets infected, we have the option of separating the machine from other machines in the network without having to disconnect the Internet. This prevents other computers in the network from getting infected. It has a central management console and there is no overload of manual investigation work for my in-house SOC team like before.” Daniel Fenn - Jun 29, 2021
“It is great at detecting potential threats, it even considers the most benign findings. All unwanted changes can be reversed with just one click. There is no need for extra scripting to resolve threats. The scans have a minimal impact on the endpoint itself. The remote shell feature is great for quick and secure access. I have used it on Linux and Windows.” Sandeep Singh - Jul 5, 2021
“One issue that I have is to get more details into the latest threats caught by Singularity Complete agent. I think more functionality should be given to the agent. Also, while it is easy to get started and has thorough documentation, the large amount of information can get confusing to look into sometimes. ” Daniel Fenn - Jun 29, 2021
“My main issue, and it's not huge, is that navigating to the information can be confusing on some screens.?While most of the options are given on the left-hand side, some tabs are also available on the top of the screen.” Sandeep Singh - Jul 5, 2021
“The deployment process was very simple. One of my favorite features is that it can take any form of data whether structured or unstructured, analyze it and discover threats from any tech product and platform. Other than this, we can integrate threat intelligence to avoid switching between applications and have more reliable detection from other third-party feeds.” Sk Sajid Ali - Jun 30, 2021
“It can automatically correlate heterogeneous data across the entire organization to detect any malicious behavior. It works well with our existing SOAR solutions and tools and has helped in streamlining our workflows. Also, we needed help troubleshooting an issue once when we initially deployed it. The support staff was quite helpful and the problem was resolved quickly.” Nomi Singh - Jul 4, 2021
“More transparency around interoperability with other apps, be it native or third-party ones, would be a great advantage. Other area of improvement is the agent update process. If this feature becomes automatic, it will be timely done unlike the current manual process. Other than that, our team never had any issues and it works great. ” Sk Sajid Ali - Jun 30, 2021
“Even though we had no issues with Windows PCs and servers, we had some minor issues with installation for MACs which were thankfully resolved. One improvement I would have liked for complete security control is simplifying the provision of user access and rights to accounts. So far, rest of the experience is great.” Nomi Singh - Jul 4, 2021
“From my experience, it provides complete insight into what are the potential threats and their possible impact based on the data harnessed from all sources. It provides daily, weekly, and monthly threat intelligence reports which are relevant to our company. The open platform gives room to our SOC and IT teams to take the right action on time.” Ullas Naik - Jun 29, 2021
“One thing I like is that you can bring in cyber data from other sources. The marketplace has many useful sandboxing solutions and there are integration options with threat intelligence data streams. Segregation of reports based on our organization’s location and size helps our team focus on emergent threats we are more vulnerable to in our industry.” Gopal Bhola - Jun 28, 2021
“While working with it, I noticed that there is a bit of a minor bug in setting the filters in case of some dashboard panels. For example, if I use the filter checkboxes at the top of the page that I have opened, you may or may not actually get the results in the low and medium threats category. This factor should be considered during next improvement. ” Ullas Naik - Jun 29, 2021
“While it has been a great solution and we should have brought it sooner, there are certain issues I have. Initially, I had to struggle while figuring out how to add an endpoint into the new group that I create.” Gopal Bhola - Jun 28, 2021
“I like that there is a centralized policy-based control which is easier to manage. Also, since it is customizable, my team could make the modifications according to our requirements. Another great feature is that it can control any USB device type or BLE device. This way we can avoid security vulnerabilities in the system due to USB and Bluetooth.” Lova Mani - Jul 2, 2021
“Initial deployment was simple as there were no network changes or additional infrastructure requirements. Its ability to assign network control depending on the physical location of the system is a great feature. Moreover, not having to worry about compliance with security KPIs is a huge relief. It is automatically done and my team is really happy!” Rajib Das - Jul 6, 2021
“The only issue I have is that for some of the services, there were no notifications in the admin console for user action and they were not allowed to start. ” Lova Mani - Jul 2, 2021
“I think that it would be great to have more automation in creating policies which is currently not present for all cases. This can decrease the time for deploying the system.” Rajib Das - Jul 6, 2021
“The setup was very easy and did not require any hardware or network changes. I was glad to see the simplicity of isolating suspicious devices from other managed devices and its understanding of the network. Another thing I like is how it instantly gives information about IP-enabled devices and product inventories located anywhere across the world.” Kiran Kumar - Jul 4, 2021
“I like that the existing agents are used as sensors and there is no need to install another agent. This makes it easily scalable. It fingerprints the OS and the role of every device. It builds an asset inventory for every scanned network and my team finds it very useful to export this data. Another great feature is that different networks can have different policies.” Umair Ali - Jul 1, 2021
“While it is great that it gives alerts about anything even remotely suspicious, sometimes they become too many. ” Kiran Kumar - Jul 4, 2021
“I do not have any major issues, just wanted to know more about the triggers and working of the alerts from the vendor. It should be more in depth for the users. ” Umair Ali - Jul 1, 2021
“The software is easy to install, manage, and maintain. Additionally, the vendor gave us the choice of regional hosting and data storage locations. As protection against malware and malicious activities is not dependent on cloud, it is very reliable. Ability to integrate with MS Power BI was another plus that my team loved.” Joydevdutta - Jun 30, 2021
“It worked for all our desktops and servers including the legacy versions of Windows. With so many cyber threats out there, it was difficult to find an inclusive yet simplistic solution like this. It uses AI to predict and stop attacks. There is no data loss or recovery process is done in a click. There is no need to restore the system back to factory settings.” Ashish Grover - Jul 1, 2021
“The reporting capabilities could be further improved. Getting individual client reports would be great. ” Joydevdutta - Jun 30, 2021
“There were unexpected resource usage spikes on some of our devices, although they were later resolved by the support team. ” Ashish Grover - Jul 1, 2021
“My team works with MS Azure and this software is a great addition in our organization. It offers scalable deployment and we plan to expand further. Singularity Cloud offers high protection for Azure Kubernetes service and we have never faced issues yet. There is no container interference for ensuring runtime container protection.” Burhan Tailor - Jul 6, 2021
“There is just one agent for a worker node without any pod instrumentation. One multi-cloud console is present for all cloud infrastructure. Also, Storyline and EDR data retention options help prevent recurrence of the same issues. Apart from that, auto-deployment of Linux server Sentinels?to Google Compute Engine is impressive.” Nisha S Endloori - Jul 5, 2021
“I think that everything about the software is great so far. The only improvement I can think of is a custom language for deep visibility console searches.” Burhan Tailor - Jul 6, 2021
“Whitelisting and blacklisting should be easier. Instead of individual marking, it should be possible in bulk to save time. This option is not available yet. ” Nisha S Endloori - Jul 5, 2021
What type of company is SentinelOne?
What does SentinelOne do?
What is SentinelOne’s main product?