OneCon Logo Don’t miss OneCon23! SentinelOne’s Customer Conference. Register Now
Don’t miss OneCon23! SentinelOne’s Customer Conference.
Experiencing a Breach?
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
en
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
S1 Logo Color Light S1 Logo Color
Platform
  • Platform Overview
    • Singularity Platform Welcome to Integrated
      Enterprise Security
    • Singularity XDR Native & Open Protection,
      Detection, and Response
    • XDR Ingestion One Home for All
      Security Data
    • How It Works The Singularity XDR Difference
    • Singularity Marketplace One-Click Integrations to Unlock the Power of XDR
  • Surfaces
    • Endpoint Autonomous Prevention, Detection, and Response
    • Cloud Autonomous Runtime Protection for Workloads
    • Identity Autonomous Identity & Credential Protection
  • Platform Packages
    • Singularity Complete The Standard for Enterprise Cybersecurity
    • Singularity Control Organization-Wide
      Protection and Control
    • Singularity Core Cloud-Native NGAV
    • Package Comparison Our Platform at a Glance
  • Platform Products
    • Singularity Cloud Container, VM, and Server Workload Security
    • Singularity Mobile Mobile Threat Defense
    • Singularity Cloud Data Security AI-Powered Threat Detection
    • Singularity RemoteOps Orchestrate Forensics at Scale
    • Singularity Identity Identity Threat Detection
      and Response
    • Singularity CloudFunnel Cloud-to-Cloud Telemetry Streaming
    • Singularity Ranger AD Active Directory Attack Surface Reduction
    • Singularity BinaryVault Automatic File Sample Collection
    • Singularity Ranger Rogue Asset Discovery
    • Singularity Hologram Deception Protection
Why SentinelOne?
  • Why SentinelOne?
    • Why SentinelOne? Cybersecurity Built
      for What’s Next
    • Our Customers Trusted by the World’s Leading Enterprises
    • Industry Recognition Tested and Proven
      by the Experts
    • About Us The Industry Leader in Autonomous Cybersecurity
  • Compare SentinelOne
    • CrowdStrike Cyber Dependent
      on a Crowd
    • McAfee Pale Performance,
      More Maintenance
    • Microsoft Platform Coverage
      That Compromises
    • Trend Micro The Risk of DevOps Disruption
    • Palo Alto Networks Hard to Deploy,
      Harder to Manage
    • Carbon Black Adapt Only as Quickly
      as Your Block Lists
    • Symantec Security Limited
      to Signatures
  • Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
Services
  • Threat Services
    • Vigilance Respond Pro
      MDR + DFIR
      24x7 MDR with Full-Scale Investigation & Response
    • WatchTower Pro
      Threat Hunting
      Dedicated Hunting & Compromise Assessment
    • Vigilance Respond
      MDR
      Dedicated SOC
      Expertise & Analysis
    • WatchTower
      Threat Hunting
      Hunting for Emerging Threat Campaigns
    Services Overview
  • Support, Deployment, & Health
    • Technical Account Management Customer Success with Personalized Service
    • SentinelOne GO Guided Onboarding & Deployment Advisory
    • SentinelOne University Live and On-Demand Training
    • Support Services Tiered Support Options for Every Organization
    • SentinelOne Community Community Login
Partners
  • Our Network
    • Singularity Marketplace Extend the Power
      of S1 Technology
    • Cyber Risk
      Partners
      Enlist Pro Response
      and Advisory Teams
    • Technology Alliances Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS Hosted in AWS Regions Around the World
    • Channel Partners Deliver the Right
      Solutions, Together
    Program Overview
Resources
  • Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • White Papers
    View All Resources
  • Blog
    • Cyber Response
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog
  • Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
About
  • About SentinelOne
    • About SentinelOne The Industry Leader in Cybersecurity
    • Investor Relations Financial Information & Events
    • SentinelLABS Threat Research for
      the Modern Threat Hunter
    • Careers The Latest Job Opportunities
    • Press & News Company Announcements
    • Cybersecurity Blog The Latest Cybersecurity Threats, News, & More
    • F1 Racing SentinelOne &
      Aston Martin F1 Team
    • FAQ Get Answers to Our Most Frequently Asked Questions
    • DataSet The Live Data Platform
    • S Foundation Securing a Safer Future for All
    • S Ventures Investing in the Next Generation
      of Security and Data
    • Brand SentinelOne Brand Guidelines
en
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
Get a Demo
S1 Logo Color Light S1 Logo Color
Navigation Arrow Left Back
Navigation Close
Platform
  • Platform Overview
    • Singularity Platform Welcome to Integrated
      Enterprise Security
    • Singularity XDR Native & Open Protection,
      Detection, and Response
    • XDR Ingestion One Home for All
      Security Data
    • How It Works The Singularity XDR Difference
    • Singularity Marketplace One-Click Integrations to Unlock the Power of XDR
  • Surfaces
    • Endpoint Autonomous Prevention, Detection, and Response
    • Cloud Autonomous Runtime Protection for Workloads
    • Identity Autonomous Identity & Credential Protection
  • Platform Packages
    • Singularity Complete The Standard for Enterprise Cybersecurity
    • Singularity Control Organization-Wide
      Protection and Control
    • Singularity Core Cloud-Native NGAV
    • Package Comparison Our Platform at a Glance
  • Platform Products
    • Singularity Cloud Container, VM, and Server Workload Security
    • Singularity Mobile Mobile Threat Defense
    • Singularity Cloud Data Security AI-Powered Threat Detection
    • Singularity RemoteOps Orchestrate Forensics at Scale
    • Singularity Identity Identity Threat Detection
      and Response
    • Singularity CloudFunnel Cloud-to-Cloud Telemetry Streaming
    • Singularity Ranger AD Active Directory Attack Surface Reduction
    • Singularity BinaryVault Automatic File Sample Collection
    • Singularity Ranger Rogue Asset Discovery
    • Singularity Hologram Deception Protection
Why SentinelOne?
  • Why SentinelOne?
    • Why SentinelOne? Cybersecurity Built
      for What’s Next
    • Our Customers Trusted by the World’s Leading Enterprises
    • Industry Recognition Tested and Proven
      by the Experts
    • About Us The Industry Leader in Autonomous Cybersecurity
  • Compare SentinelOne
    • CrowdStrike Cyber Dependent
      on a Crowd
    • McAfee Pale Performance,
      More Maintenance
    • Microsoft Platform Coverage
      That Compromises
    • Trend Micro The Risk of DevOps Disruption
    • Palo Alto Networks Hard to Deploy,
      Harder to Manage
    • Carbon Black Adapt Only as Quickly
      as Your Block Lists
    • Symantec Security Limited
      to Signatures
  • Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
Services
  • Threat Services
    • Vigilance Respond Pro
      MDR + DFIR
      24x7 MDR with Full-Scale Investigation & Response
    • WatchTower Pro
      Threat Hunting
      Dedicated Hunting & Compromise Assessment
    • Vigilance Respond
      MDR
      Dedicated SOC
      Expertise & Analysis
    • WatchTower
      Threat Hunting
      Hunting for Emerging Threat Campaigns
    Services Overview
  • Support, Deployment, & Health
    • Technical Account Management Customer Success with Personalized Service
    • SentinelOne GO Guided Onboarding & Deployment Advisory
    • SentinelOne University Live and On-Demand Training
    • Support Services Tiered Support Options for Every Organization
    • SentinelOne Community Community Login
Partners
  • Our Network
    • Singularity Marketplace Extend the Power
      of S1 Technology
    • Cyber Risk
      Partners
      Enlist Pro Response
      and Advisory Teams
    • Technology Alliances Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS Hosted in AWS Regions Around the World
    • Channel Partners Deliver the Right
      Solutions, Together
    Program Overview
Resources
  • Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • White Papers
    View All Resources
  • Blog
    • Cyber Response
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog
  • Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
About
  • About SentinelOne
    • About SentinelOne The Industry Leader in Cybersecurity
    • Investor Relations Financial Information & Events
    • SentinelLABS Threat Research for
      the Modern Threat Hunter
    • Careers The Latest Job Opportunities
    • Press & News Company Announcements
    • Cybersecurity Blog The Latest Cybersecurity Threats, News, & More
    • F1 Racing SentinelOne &
      Aston Martin F1 Team
    • FAQ Get Answers to Our Most Frequently Asked Questions
    • DataSet The Live Data Platform
    • S Foundation Securing a Safer Future for All
    • S Ventures Investing in the Next Generation
      of Security and Data
    • Brand SentinelOne Brand Guidelines
Get a Demo
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
Experiencing a Breach?
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
Empower your enterprise with best-of-breed
cybersecurity and native suite features.
Get a Demo Cta Left Left White

More Capability, All in One Agent

Augment Your Team With Holistic Suite Management Features and Flexible Options for Managing The Attack Surface.

Control Network Flows 250x82 PURP

Control
Network Flows

Enable granular, location aware network flow control with native firewall control for Windows,
macOS, and Linux.

USB Bluetooth 250x82 PURP

Control USB & Bluetooth

Control any USB, Bluetooth, or Bluetooth Low Energy device on Windows and Mac to reduce the physical attack surfaces.

Deployment 250x82 PURP

Ensure 100% Deployment

Identify unprotected, out of compliance devices automatically to ensure compliance with organizational risk management KPIs.

Network Control

  • Control in-and-outbound network traffic for Windows, macOS, and Linux.
  • Centralize and customize policy-based control with hierarchical inheritance.
  • Streamline policy assignment with tagging mechanisms.
  • Adapt swiftly with touchless location awareness that dynamically assigns network control based on a system’s physical location.
Get a Demo Cta Left Left White

Device Control

  • Enable granular device control for USB and Bluetooth on Windows and macOS.
  • Centralize and customize policy-based control with hierarchical inheritance.
  • Control any USB device type, and specify full read-write or read-only operation.
  • Control Bluetooth by protocol version and by specific Bluetooth device type.
  • Extend coverage and control to Bluetooth Low
    Energy devices.
Get a Demo Cta Left Left White

Rogue Device Discovery

  • Identify any rogue endpoints that are not yet protected by SentinelOne.
  • Gain enterprise-wide visibility with passive and active network sweeps.
  • Remove the uncertainty of compliance by discovering deployment gaps in your network.
  • Get started with no additional software, network changes, or hardware appliances.
Get a Demo Cta Left Left White

SentinelOne Singularity Control FAQ

What types of USB devices can I control with Singularity Control? Navigation Arrow Down Light

Singularity Control can control any kind of USB device. Administrators can create highly granular control for any type of USB device as defined by the USB standard. Policy can be defined by vendor ID, product ID, serial number or by class of device which includes things like audio, printers, mass storage, smart cards, video devices, USB-C devices, personal healthcare devices, and more. For example, Singularity Control can only permit IronKey™ encrypted external thumb drives as well as certain audio headsets and deny everything else that is USB.

Does Singularity USB device control support read-only operation for data loss prevention (DLP)? Navigation Arrow Down Light

Yes. Policies can be crafted to permit read-only operation of mass storage USB devices.

What are some use cases to help explain why I would want Bluetooth Control? Navigation Arrow Down Light

Some use cases for Bluetooth control include:

  • Restricting Bluetooth operation to only newer Bluetooth versions in order to reduce the attack surface contributed by older versions.
  • Restricting Bluetooth connectivity from devices to a specified list or type of peripherals.

What is meant by network control with location awareness? Navigation Arrow Down Light

SentinelOne offers native OS firewall control for Windows, macOS, and Linux. Your security policies may require different local OS firewall policies applied based on the device’s location. For example, a more restrictive policy might be used outside the organization’s network vs. a more open policy inside the network. Administrators craft network location tests that help the endpoint automatically determine what network it’s connected to before applying the correct firewall policy.

SentinelOne offers a “Rogues” capability and Singularity Ranger. What is the difference? Navigation Arrow Down Light

Rogues is a feature that is included with Singularity Control and Singularity Complete. Its purpose is to discover whether there are hosts on the network that do not yet have the Sentinel Agent installed. Singularity Ranger is a module that helps you control your network attack surface. Ranger offers Rogue functions and adds extensive network discovery and fingerprinting of all IP-enabled devices. Ranger can also be used to protect SentinelOne devices from non-managed network-connected devices to ensure unauthorized lateral movement by an unmanaged device is disallowed.

Ready to Take
a Look?

Experience cybersecurity that prevents threats at faster speed, greater scale, and higher accuracy.

Explore SentinelOne

Thanks for Contacting Us

A Sentinelone Representative Will Contact You Shortly to Discuss Your Needs.

Related Resources

DATA SHEET

Singularity Endpoint Datasheet

Learn More Cta Left Left White
DATA SHEET

Vigilance MDR

Learn More Cta Left Left White
DATA SHEET

Singularity Platform Datasheet

Learn More Cta Left Left White
DATA SHEET

Singularity Ranger

Learn More Cta Left Left White

The World’s Leading and Largest Enterprises Trust SentinelOne

Including 4 of the Fortune 10 and Hundreds of the Global 2000
Logogrid Samsung 1
Logogrid EA 2
Logogrid Mckesson 1
Logogrid EsteeLauder 1
Logogrid Sysco 2
Logogrid AstonMartin 1
Logogrid Shutterfly 2
Logogrid Politico 2
Logogrid Pandora 1
Logogrid Oneil 1
Logogrid NorwegianAir 1
Logogrid Naver

Backed by the Industry

Tried and Trusted by the Industry’s Leading Authorities, Analysts, and Associations.

Gartner Primary Logo WHT 1

Endpoint Protection Platforms

  • A Leader in the 2022 Magic Quadrant for Endpoint Protection Platforms
Learn More Cta Left Left White
MITRE Engenuity Logo WHT 1

Record Breaking ATT&CK Evaluation

  • 100% Protection. 100% Detection.
  • Top Analytic Coverage 3 Years in a Row
  • 100% Real-time with Zero Delays
Learn More Cta Left Left White
Gartner Peer Insights 2023 Hp

96% WOULD RECOMMEND FOR EDR AND EPP

  • 4.8/5 Rating for Endpoint Protection Platforms and Endpoint Detection & Response Platforms
Learn More Cta Left Left White

Explore the Full Power of Singularity

S1 Singularity Cloud STACK RGB WHT 3

Simplifying container and VM security, no matter their location, for maximum agility, security, and compliance.

Learn More Cta Left Left White
S1 Singularity Core STACK RGB WHT 2

Endpoint security bedrock for organizations replacing legacy AV or NGAV with an effective EPP that is easy to deploy and manage.

Learn More Cta Left Left White
S1 Singularity Complete STACK RGB WHT 2

Made for organizations seeking the best-of-breed cybersecurity with additional security suite features.

Learn More Cta Left Left White
Singularity Ranger Wordmark STACK RGB WHT

Made for organizations seeking enterprise-grade prevention, detection, response and hunting across endpoint, cloud, and IoT.

Learn More Cta Left Left White

Purpose Built to Prevent Tomorrow’s Threats.

Today.

Your most sensitive data lives on the endpoint and in the cloud. Protect what matters most from cyberattacks. Fortify the edges of your network with realtime autonomous protection.
Get a Demo
Company
  • Our Customers
  • Why SentinelOne
  • Platform
  • About
  • Partners
  • Support
  • Careers
  • Legal & Compliance
  • Security & Compliance
  • Contact Us
  • Investor Relations
Resources
  • Blog
  • Labs
  • Hack Chat
  • Press
  • News
  • FAQ
  • Resources
  • Ransomware Anthology
Global Headquarters

444 Castro Street
Suite 400
Mountain View, CA 94041

+1-855-868-3733

[email protected]

Sign Up For Our Newsletter
Thank you! You will now receive our weekly newsletter with all recent blog posts. See you soon!
English
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
©2023 SentinelOne, All Rights Reserved.
Privacy Policy Master Subscription Agreement
Footer Logo
Social Twitter White Social Facebook White Social Linkedin White Social Youtube White