The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
Background image for Backup Retention Policy Best Practices: A Complete Guide
Cybersecurity 101/Cybersecurity/Backup Retention Policy Best Practices

Backup Retention Policy Best Practices: A Complete Guide

Backup Retention Policy Best Practices for ransomware defense. Covers immutable storage, air-gapped backups, 3-2-1-1-0 framework, and HIPAA/GDPR compliance.

CS-101_Cybersecurity.svg
Table of Contents
What Is Backup Retention?
How Backup Retention Policy Relates to Cybersecurity
How Backup Retention Policies Work
Backup Types and Retention Strategies
Backup Retention Policy Best Practices
1. Enforce Immutable Backup Storage for 30 to 90 days minimum
2. Implement Air-Gapped or Logically Isolated Storage
3. Test Recovery with Zero Error Tolerance
4. Deploy Isolated Recovery Environments
5. Encrypt Backups and Separate Key Management
6. Integrate Backup Telemetry with Security Operations
7. Maintain Golden Images and Infrastructure-as-code Backups
8. Implement Quorum-Based Approval for Destructive Operations
Regulatory Compliance Requirements for Backup Retention
Challenges and Limitations of Backup Retention Policies
Ransomware Groups Target Backups First
The Identity Infrastructure Blind Spot
Compliance Conflicts Across Frameworks
Monitoring Gaps and Silent Failures
Weekend and Holiday Attack Timing
Improve Backup Retention with SentinelOne
Key Takeaways

Related Articles

  • What Is OS Command Injection? Exploitation, Impact & Defense
  • Malware Statistics
  • Data Breach Statistics
  • DDoS Attack Statistics
Author: SentinelOne | Reviewer: Arijeet Ghatak
Updated: May 4, 2026

What Is Backup Retention?

Backup retention is the practice of maintaining copies of critical data for defined time periods, governed by regulatory, legal, and cybersecurity requirements. It determines how long you keep recovery points, where you store them, and how you protect them from the attacks that compromise your production environment.

The stakes are real. In MGM Resorts' 2023 ransomware incident, the company disclosed an approximately $100 million impact to adjusted EBITDA in an SEC filing. When attackers reach or corrupt your backups, the business impact goes beyond IT downtime and becomes an enterprise-level financial event.

Many enterprises still treat backup retention as a storage logistics problem. The difference between organizations that recover and those that pay ransoms comes down to how they design, implement, and enforce their backup retention policies.

The CISA #StopRansomware Guide designates backup retention as Cross-Sector Cybersecurity Performance Goal 2.R: maintain offline, encrypted backups of critical data and regularly test their availability and integrity. This is a federal cybersecurity baseline.

Ransomware groups now target backup infrastructure as a primary objective. Your backup retention policy is the blueprint that determines whether those backups survive.

Backup Retention Policy Best Practices - Featured Image | SentinelOne

How Backup Retention Policy Relates to Cybersecurity

Backup retention policy is a defensive control. The NIST Cybersecurity Framework 2.0 codifies this under Subcategory PR.DS-11, requiring that backups be created, protected, maintained, and tested. That places backup retention within your protective control architecture alongside endpoint protection, access management, and network segmentation.

The cybersecurity relevance becomes clear when you examine attacker behavior. According to NIST SP 800-209, attackers may interfere with the backup process itself, gradually poisoning future copies until the only available backups are already corrupted. Retention duration directly determines whether you maintain a clean recovery point that predates the compromise.

During the 2021 Colonial Pipeline ransomware incident, the U.S. Department of Justice described a $4.4 million ransom payment in its DOJ release. Backup retention does not stop ransomware on its own, but it determines whether you can restore and resume without negotiating.

Your backup retention policy defines how far back you can restore, how quickly you can recover, and whether attackers can eliminate your ability to refuse a ransom demand.

How Backup Retention Policies Work

A backup retention policy governs the lifecycle of every backup copy your organization creates. It specifies creation frequency, storage locations, protection mechanisms, retention duration, and disposal procedures for each data classification tier.

The 3-2-1-1-0 Framework

The industry standard has evolved from the 3-2-1 rule toward the 3-2-1-1-0 framework to address current ransomware tactics.

The framework mandates:

  • 3 backup copies in addition to production data
  • 2 different media types to protect against different hazard classes
  • 1 copy stored offsite for geographic separation
  • 1 immutable or air-gapped copy, plus 0 errors in backup verification testing

Enforcing all of these requirements reduces the chance that a single compromise wipes out every recovery option.

Retention Tiers and Duration

Your backup retention policy should define retention periods based on data classification, regulatory requirements, and recovery objectives. According to Gartner's Peer Community, enterprise practitioners typically distinguish between backup copies for disaster recovery (30 to 90 days) and archived data for compliance (governed by sector-specific mandates).

Two time-based objectives drive every retention decision:

  1. Recovery Point Objective (RPO): The maximum acceptable data age for restoration. An RPO of four hours means you cannot lose more than four hours of data.
  2. Recovery Time Objective (RTO): The maximum acceptable downtime. This determines how quickly your retention infrastructure must deliver usable recovery points.

Together, RPO and RTO shape how frequently you create backups and how quickly your retention infrastructure must serve them during an incident.

Immutability and Access Controls

Immutable backups use WORM (Write Once Read Many) technology to prevent modification or deletion, even by administrators with full privileges. NIST SP 1800-25 establishes that backup systems should restrict access to a single service account on known machines, enforcing role-based access control, MFA, and separate authentication frameworks from production.

These mechanics set the foundation, but the way you structure your backups determines how effectively your retention policy protects each data tier.

Backup Types and Retention Strategies

Your backup retention policy must account for the different backup methods your organization uses. Each type creates a different recovery chain with different storage, speed, and risk tradeoffs.

  • Full Backups: A full backup copies all selected data in a single operation. NIST SP 800-34 recommends that policies specify backup frequency based on data criticality and the rate at which new information is introduced. Full backups restore fastest because only one backup set is needed, but they consume the most storage and take the longest to complete.
  • Incremental Backups: An incremental backup captures only the data that changed since the last backup of any type. Each incremental is small and fast, but restoration requires the last full backup plus every incremental in sequence. If any link in that chain is corrupted, you lose access to all subsequent recovery points.
  • Differential Backups: A differential backup captures all changes since the last full backup, regardless of how many differentials have run since. Differentials grow larger each day but restore faster than incrementals because you only need two backup sets: the last full and the latest differential.
  • Combining Methods with GFS Rotation: Most enterprises combine these methods using a Grandfather-Father-Son (GFS) rotation: weekly full backups retained for months, daily differentials or incrementals retained for weeks, and monthly or yearly archival copies retained for compliance. Your retention schedule should specify different durations for each tier. For example, daily incrementals might expire after 14 days, weekly fulls after 90 days, and monthly archival copies after one to seven years depending on regulatory requirements.

The backup type you choose also affects your RPO. Hourly incrementals give you a tighter RPO than daily differentials, but they create longer restore chains that increase your RTO. Map each data classification tier to the backup method and retention duration that balances these objectives.

Backup Retention Policy Best Practices

A backup retention policy on paper is only as strong as its implementation. Each best practice below addresses a specific failure mode observed in real-world incidents, from backup poisoning and identity compromise to untested restores and insufficient monitoring.

1. Enforce Immutable Backup Storage for 30 to 90 days minimum

Configure immutable retention periods based on your organization's average threat dwell time. The CISA LockBit advisory requires that all backup data be encrypted, immutable, and cover the entire organization's data infrastructure.

A 90-day window accounts for the slow, persistent compromises that NIST SP 800-209 describes as backup poisoning, where attackers corrupt copies gradually over weeks before triggering encryption on production systems. Shorter 30-day windows protect against attacks found quickly but may not cover extended dwell times.

2. Implement Air-Gapped or Logically Isolated Storage

Your immutable backups lose their value if attackers can reach them through the same network paths they used to compromise production. NIST NCCoE guidance emphasizes complete isolation through physical air-gapping (offline tape or removable media with zero network connectivity) or logical air-gapping (online storage with object-level retention policies and strong identity separation). Either way, attackers should not be able to pivot from your production identity plane into your backup control plane.

3. Test Recovery with Zero Error Tolerance

The "0" in 3-2-1-1-0 means zero tolerance for untested recovery procedures. NIST Cybersecurity Framework 2.0 explicitly requires that backups be tested, elevating this from a recommended practice to a formal cybersecurity outcome requirement.

Build a testing cadence that matches your risk profile:

  • Validate critical system recovery monthly
  • Run full restore tests simulating ransomware scenarios quarterly
  • Perform complete restoration exercises semi-annually or annually for ISO 27001 audit readiness

Each test should measure actual recovery time against your RTO and verify data integrity through checksums. Treat any test that fails as a P1 incident and remediate before the next cycle.

4. Deploy Isolated Recovery Environments

NIST NCCoE guidance recommends Isolated Recovery Environments (IREs) with Immutable Data Vaults (IDVs). These are secure, isolated environments where you restore and analyze backup data without reintroducing malware. Your IRE needs separate authentication frameworks, dedicated network segments, and independent administrative access paths.

5. Encrypt Backups and Separate Key Management

Apply AES-256 encryption at rest and TLS 1.3 in transit per ISO 27001 guidance. Store encryption keys separately from backup data with distinct role assignments. Require MFA for key deletion operations. If an attacker compromises your backup data and encryption keys through the same access path, encryption provides zero protection.

6. Integrate Backup Telemetry with Security Operations

Your backup infrastructure generates signals that your SOC should monitor. NIST SP 800-61 establishes that backup systems should integrate with incident response capabilities. Feed backup telemetry into your SIEM or XDR platform and watch for:

  • Sudden changes in backup size or duration
  • Skipped or failed backup jobs
  • Unusual login patterns on backup infrastructure
  • Unexpected modification or deletion attempts

These anomalies often surface before ransomware triggers encryption. SentinelOne's Singularity Platform can correlate this telemetry alongside endpoint and cloud signals, giving your analysts context across the full attack chain.

7. Maintain Golden Images and Infrastructure-as-code Backups

The CISA #StopRansomware Guide directs organizations to maintain golden images of critical systems and use infrastructure-as-code (IaC) to deploy cloud resources, keeping template backups offline. Version-control your IaC templates and audit changes to enable complete environment reconstruction.

8. Implement Quorum-Based Approval for Destructive Operations

No single administrator should be able to delete or modify immutable backups. Require quorum-based approval (multiple authorized individuals) for any operation that reduces backup copies, shortens retention periods, or disables immutability. This protects against both insider threats and compromised privileged accounts.

Once you implement these controls, map retention periods and test evidence to your compliance frameworks.

Regulatory Compliance Requirements for Backup Retention

Backup retention periods are not just security decisions. They are compliance obligations with audit and legal consequences. The challenge is that different frameworks impose different requirements, and many organizations fall under more than one. When regulatory frameworks conflict, implement the longest applicable backup retention requirement while documenting justification for each data classification tier.

HIPAA

HIPAA does not specify backup data retention periods but mandates procedures to create and maintain retrievable exact copies of electronic protected health information (ePHI) under 45 CFR § 164.308(a)(7). The HHS HIPAA series requires a minimum six-year retention period for security documentation.

GDPR

EDPB Guidelines 4/2019 require personal data deletion when no longer necessary. GDPR treats backups as processing under EDPB Guidelines 9/2022, subjecting them to all data protection requirements. Document your business justification for every retention period.

PCI-DSS

PCI-DSS Requirement 10.7 mandates one year of audit trail retention with three months immediately available. Requirement 3.1 requires quarterly verification that stored data exceeding retention periods is securely deleted.

SOC 2

SOC 2 does not prescribe retention periods. Define your own, document them, follow them consistently, and demonstrate effective control operation during audits.

Framework

Backup Data Retention

Documentation Retention

Testing Required

Encryption Required

HIPAA

Risk-based (not specified)

6 years minimum

Yes

Addressable specification

GDPR

Purpose-limited with documented justification

Per accountability principle

Yes (timely restoration)

Required under Article 32

PCI-DSS

Per business justification, quarterly verification

1 year audit logs (3 months online)

Implied

Mandatory for cardholder data

SOC 2

Organization-defined and documented

Per organizational policy

Yes (availability criteria)

Required (security criteria)

Compliance alignment is necessary but not sufficient. You also need to plan for the failure modes that break backup retention in practice.

Challenges and Limitations of Backup Retention Policies

Even well-designed retention policies face implementation barriers that surface during real incidents rather than during planning. The most common failures share a pattern: organizations build the policy correctly but underestimate how attackers, infrastructure gaps, and operational blind spots erode its effectiveness over time.

Ransomware Groups Target Backups First

Attackers hunt for backup credentials, exploit unpatched backup solutions, and deliberately corrupt recovery infrastructure before triggering encryption on production systems. If your backup infrastructure shares the same identity store as production, one compromised domain admin account can eliminate your entire recovery capability.

The Identity Infrastructure Blind Spot

If Active Directory, authentication systems, and privileged access management are not included in your retention scope, you face a recovery paradox: immutable data backups exist, but you cannot restore access to them. Your backup retention policy must cover identity infrastructure as a first-class backup target.

Compliance Conflicts Across Frameworks

GDPR's data minimization principle can conflict with longer retention requirements from HIPAA or PCI-DSS. Managing these conflicts requires granular, data-specific retention schedules with documented legal basis and ongoing legal review.

Monitoring Gaps and Silent Failures

If no one reviews backup logs or alerts, failures go unfound for months. Storage fills up, backup jobs skip without notification, and organizations discover corruption only during actual recovery attempts. Integrating backup telemetry into your security monitoring stack closes this visibility gap.

Weekend and Holiday Attack Timing

Attackers exploit reduced monitoring windows. Ransomware groups deliberately time attacks for periods when IT staff coverage is thinnest, increasing the window during which backup compromises go unnoticed. Autonomous monitoring and response capabilities address this vulnerability more effectively than manual oversight alone.

These challenges point to a common gap: backup retention policies need continuous enforcement, not just documentation. Closing that gap requires a security platform that operates autonomously and provides visibility across your entire recovery environment.

Improve Backup Retention with SentinelOne

Your backup retention policy defines the rules. Your security platform determines whether those rules hold under attack. SentinelOne's Singularity Platform strengthens backup retention by stopping ransomware before it reaches your backup infrastructure and delivering the visibility your SOC needs to find backup-targeting behavior in real time.

Autonomous Ransomware Rollback

SentinelOne uses behavioral AI to identify and stop ransomware activity at execution, reducing the chance that encryption reaches critical systems including backup servers. When ransomware does encrypt files on Windows endpoints, the platform's rollback feature uses Volume Shadow Copy snapshots to restore affected files to their pre-attack state.

Backup Infrastructure Protection

Singularity Cloud Workload Security extends real-time protection across the VMs, servers, containers, and Kubernetes clusters that host your backup infrastructure. The platform provides runtime threat prevention and autonomous response across public clouds, private clouds, and on-premise data centers, isolating affected systems and reverting to a known-safe state without analyst intervention.

AWS Backup Integration

SentinelOne integrates with AWS Backup to streamline cloud recovery workflows. When Singularity Cloud Workload Security identifies a compromised EC2 instance, it queries AWS Backup for recovery information and presents a restoration link directly from the SentinelOne console.

Purple AI for Backup Anomaly Investigation

Purple AI enables your analysts to investigate suspicious backup access patterns through conversational queries, reducing the time required to validate recovery options during incident response. Early adopters report that Purple AI makes threat hunting and investigations up to 80% faster.

Singularity™ AI SIEM

SentinelOne’s Singularity™ AI SIEM for the autonomous SOC is the industry's fastest open platform for all your data and workflows. It is built on our data lake and grants you real-time AI protection for the entire enterprise. You get access to limitless scalability and endless data retention. Speed up your workflows with Hyperautomation. Protect your endpoints, clouds, networks, identities, emails, and more. Stream your data for real-time detection and drive machine-speed protection with autonomous AI. You also get greater visibility for investigations and detections with the industry's only unified console experience. Take the tour.

Sign up for a demo with SentinelOne to see how autonomous backup protection fits into your environment.

AI-Powered Cybersecurity

Elevate your security posture with real-time detection, machine-speed response, and total visibility of your entire digital environment.

Get a Demo

Key Takeaways

Backup retention is a cybersecurity control that determines whether your organization recovers from ransomware or pays. Implement the 3-2-1-1-0 framework with immutable, air-gapped copies. Test recovery quarterly with zero error tolerance. 

Align backup retention schedules to HIPAA, GDPR, PCI-DSS, and SOC 2. Integrate backup telemetry into your SOC. SentinelOne's Singularity Platform strengthens these strategies with autonomous response and real-time visibility across your recovery environment.

FAQs

A backup retention policy is a set of rules that defines how long your organization keeps backup copies of data, where those copies are stored, and when they are deleted. It covers creation frequency, storage locations, immutability requirements, and disposal procedures. 

Retention policies are governed by cybersecurity requirements, regulatory mandates like HIPAA and GDPR, and your organization's recovery objectives for RPO and RTO.

The 3-2-1-1-0 framework builds on the traditional 3-2-1 rule with two additions designed for ransomware resilience. The extra "1" requires an immutable or air-gapped copy that attackers cannot change, even with stolen admin credentials. 

The "0" enforces zero tolerance for unverified restores so you do not discover corruption during an active incident. It turns backup retention from storage hygiene into a recovery control.

Ransomware groups steal credentials, often by dumping memory on admin endpoints, then move to backup consoles and repositories. They exploit unpatched backup software, change job schedules to create coverage gaps, and attempt to delete or shorten retention settings. 

Some actors also poison backups over time so restoration reintroduces persistence. Your goal is to block access paths, enforce immutability, and verify restores regularly.

Backup poisoning happens when attackers corrupt backups gradually during dwell time so that every recent restore point carries the compromise. When encryption finally triggers, you restore and reintroduce the attacker. 

Immutable retention windows should extend beyond typical dwell time in your environment. Many enterprises start with 30 to 90 days of immutability, then tune based on their discovery speed and overall risk tolerance.

If attackers compromise Active Directory or your identity provider, you can lose the ability to authenticate to the very systems that hold your backups. The data exists, but you cannot access it safely or prove integrity. 

Without identity backups, you often have to rebuild the domain, service accounts, and trust relationships before restoring production apps. That delay can turn a restore from hours into days.

Discover More About Cybersecurity

Insider Threat StatisticsCybersecurity

Insider Threat Statistics

Get insights on trends, updates, and more on the latest insider threat statistics for 2026. Find out what dangers organizations are currently facing, who got hit, and how to stay protected.

Read More
Cyber Insurance StatisticsCybersecurity

Cyber Insurance Statistics

Cyber insurance statistics for 2026 reveal a fast growing market. We see shifting claim patterns, stricter underwriting, and widening protection gaps between large enterprises and smaller firms.

Read More
What Is an Infostealer? How Credential-Stealing Malware WorksCybersecurity

What Is an Infostealer? How Credential-Stealing Malware Works

Infostealers silently extract passwords, session cookies, and browser data from infected systems. Stolen credentials fuel ransomware, account takeover, and fraud.

Read More
What Is Application Security? A Complete GuideCybersecurity

What Is Application Security? A Complete Guide

Application security protects software throughout the SDLC using tools like SAST, DAST, SCA, and runtime defenses. Learn how to build an AppSec program.

Read More
CS- 101 Cybersecurity - Prefooter | Experience the Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Get a Demo
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English