Back to Resources

Identity Resources

Showing 31 Results
Webinar
Mastering Defense: The Power of Counterintelligence in Cyber Deception
Webinar
Guarding the Gateway: Managing Active Directory Attack Surface
Webinar
5 Best Practices to Secure Active Directory
Webinar
The Art of Cyber Deception: Strengthening Modern Defenses
Why ITDR Completes XDR
Webinar
Defending Patient Privacy: Identity Security Strategies for Healthcare
Webinar
Modernizing Enterprise Identity Security for Financial Services
White Paper
Deception for Inside-the-Network Threat Detection
White Paper
Protecting Against Credential-Based Attacks
Webinar
Gain Control of Your Attack Surface with XDR and Identity
Webinar
Deception: The Secret Weapon Against Identity-Based Attacks
Case Study
Eagers Automotive Chooses SentinelOne Singularity Hologram To Improve Its Cybersecurity Posture
Case Study
Eagers Automotive Chooses SentinelOne Ranger AD to Better Secure Its Active Directory
Webinar
The Role of Identity Compromise in Recent Breaches
White Paper
Choosing an Active Directory Visibility Solution
Webinar
Endpoint Credential Theft: How to Prevent and Tackle The Adversary Head-On
White Paper
Dynamic Deception for Industrial Automation and Control Systems
eBook
Deception Technology: A Critical Component of a Modern Cybersecurity Stack
Data Sheet
Defending Against Identity-Based Attacks
White Paper
Preventing In-Network Lateral Movement Attacks with Identity Security
Webinar
Top 5 Ways to Protect Your Active Directory from Ransomware Attacks
Webinar
Protecting your Identity Attack Surface
Data Sheet
Identity Security Questionnaire
Data Sheet
Active Directory Security Checklist
White Paper
How CISOs Empower Enterprises to Develop Robust Identity Security Programs
Webinar
Rise of Identity Based Attacks: How to Efficiently Protect Your Enterprise
Video
Singularity™ Identity Vs. Browser Credential Harvesting (Prevention and Deception)
Data Sheet
Singularity Identity Posture Management
Data Sheet
Singularity Identity Detection & Response
Data Sheet
Singularity Hologram
Data Sheet
Singularity App for Azure Active Directory
Webinar
5 Best Practices for Implementing XDR

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform harnesses the power of data and AI to protect your organization now and into the future.