SentinelOne provides autonomous security solutions for various IT environments. The company's main focus is on endpoint security, cloud security, and identity security. It operates on an AI-powered platform that brings prevention, detection, response, remediation, and forensics under one umbrella. The endpoint security product uses artificial intelligence to constantly adapt to new threats, offering real-time protection and automated response. The key principle of SentinelOne's security approach is to allow organizations to detect harmful behavior across multiple vectors, rapidly eliminate threats with an integrated response, and continuously adapt defenses against advanced cyber attacks. The company also provides a range of services such as threat hunting, incident response, and incident management.
Do You Manage Peer Insights at SentinelOne?
Access Vendor Portal to update and manage your profile.
-AI/Behavioral Analysis: Creating seamless static and behavioral AI capabilities for both known and unknown threats takes out the middle man in assessing each alert. -Automated Rollback: After identifying perhaps a true positive, the ability to rollback affected endpoints to pre-incident is a must. This is now included as part of our ransomware playbook. -Lightweight Agent: This agent is low impact and ensures light endpoint performance and provides functionalities even when the machine is offline.
Integration with SentinelOne products, usability of the interface, and visibility into identities and misconfigurations.
SentinelOne provides protection beyond the typical antivirus and places us into the Endpoint Detection and Response space. Paired with their live human monitoring and remediation, that is one less thing we as admins need to review and address.
I do not have any direct dislikes about this service. There has been several service outages which has created inability to check / alert on some machines, but support has been great at communicating updates to outages.
Quality of professional services, ease of deployment to achieve full capabilities, response capabilities and price.
There is very little the end user may do from the client on the machine directly. They can basically only see if a file or process has been quarantined and scan individual files from explorer.