Feature Spotlight

Central Park Feature Glance – Deep Visibility Watchlists

Today’s blog post will focus on a new enhancement to our Deep Visibility solution.  With our Central Park release, we have introduced the concept of Watchlists.   This module allows the SentinelOne administrator to create alerts based off Deep Visibility data, which could be anything from modifications to critical files, web requests to a given […]

READ MORE

Central Park Feature Glance – Active Directory Integration Demonstration

In yesterday’s blog post we detailed what options are available for AD Integration and why I feel that SentinelOne has the best approach to this integration.  The purpose of today’s blog will be to detail how our customers can leverage and configure this feature. More in particular, how to create a SentinelOne group based off […]

READ MORE

Central Park Feature Glance – Active Directory Integration

With our most recent SentinelOne release we have completely revamped our Active Directory (AD) Integration.  This is one of the many compelling enhancements to this monumental release.  This post will primarily focus on AD Integration with cloud based Sentinelone management, but some of the concepts can also apply to on-premise SentinelOne management deployments. Over the […]

READ MORE

Alexa, send me the daily SentinelOne report

  We are thrilled to announce and publicly launch SentinelOne’s Alexa integration today.  By making information available anywhere, anytime, SentinelOne is able to solve the first mile problem.   The first mile problem is what a CISO faces when she is asked by her CEO if she is protected against Meltdown/Spectre or the latest vulnerability/attack […]

READ MORE

Announcing 2.5/Bahamas Release

We’re happy to announce SentinelOne 2.5/Bahamas is now available including updates such as Deep Visibility, Insights Reporting, improved prevention, detection, and response, and many more features, fixes, and enhancements. Let’s go over the most significant changes. Deep Visibility The new network is no longer defined by a perimeter. Users may be anywhere at any time, […]

READ MORE

Next Generation Endpoint Security, Part 5: Remediation and Rollback

Picture this: your endpoint protection system has identified a virus, either by detecting its signature or identifying its behavior. It has mitigated the virus and stopped the bleeding, either by halting the responsible executable, dropping the infected endpoint off the network, or even shutting it down entirely. This is all fantastic—the infection has been successfully […]

READ MORE