SentinelOne Reseller and Integration ConsultantsSentinelOne's Singularity portfolio is a subscription-based, cloud-centered cyberthreat defense platform that features computer learning algorithms and advanced services to deliver comprehensive endpoint detection and response (Singularity Control and Complete) and managed detection and response (Singularity Complete with Vigilance MDR). SentinelOne's compact software agents can be loaded in a few minutes to protect popular endpoints against increasingly sophisticated threats such as ransomware, familiar and new malware, trojans, hacking tools, RAM exploits, malicious scripts, invasive macros, and living-off-the-land abuse. SentinelOne software agents are offered for Microsoft Windows, macOS, Linux, and Kubernetes powered endpoints. Supported deployment models include physical, virtual, VDI desktops, hybrid data centers, and cloud service providers. Because SentinelOne agents operate autonomously, they can deliver advanced behavior-based protection in real time even during periods when endpoints are unattached to the cloud.

Progent is a certified SentinelOne Partner and dealer and manages thousands of endpoints protected by SentinelOne technology. SentinelOne is always the initial endpoint response software activated by Progent to provide control and visibility of a customer's network in the first stages of a ransomware recovery. SentinelOne Singularity is also the key technology powering Progent's Active Security Monitoring services. SentinelOne was recognized as a top visionary in Gartner's 2022 Magic Quadrant for Endpoint Protection Platforms and scored the most high-quality detections in real-time during the 2022 MITRE ATT&CK Phase 4 Evaluation. According to Gartner's assessment, "This reaffirms its (SentinelOne's) ability to detect all attacks and provide full details of the techniques and tactics used." SentinelOne also surpassed all competitors for every use scenario in Gartner's evaluation of Critical Capabilities for Endpoint Protection Platforms.

Singularity Bundles for SentinelOne Endpoint Detection and Response
SentinelOne's Singularity family offers several tiers of endpoint security product packages provided as a global SaaS platform that delivers high availability, centralized policy management, AI driven malware intelligence, rapid restoration, and an information-driven console for security analytics. Bundles consist of Control for enhanced management, Complete for automated root cause analysis, and Complete with Vigilance MDR for 24/7 advanced monitoring and response. The tiers are additive. Control and Complete each include all the features of the tier beneath it. Pricing starts at $10 for each endpoint per month for small customers with significant discounts for larger deployments. There is no minimum endpoint count.

The SentinelOne Control Package
The SentinelOne Control Package is the base software and is 100% maintained by the client. For some examples: Endpoint agents need to be updated in the SentinelOne portal, allow rules need to be set, exclusions need to be made, blacklists should be created, threats must be responded to, and many other day-to-day activities that someone in your organization needs to manage and maintain. SentinelOne is just like any other security product in that it has frequent updates to keep its defenses current. Progent can assist with or directly handle these items, but there is additional time and materials billing for all services performed.

With the Control Package you manage your own portal and while Progent and SentinelOne personnel are monitoring and or receiving alerts of serious threats in your environment, we have no authorization to do any work in your environment and will only do best efforts to alert you in case of a serious threat.

Major Features of the SentinelOne Control Package include:

  • Endpoint Prevention (EPP) to stop a wide variety of malware, Trojans, hacking tools, and ransomware before they can start
  • ActiveEDR Basic for Endpoint Detection and Response (EDR) operates in real-time with or without cloud access. ActiveEDR identifies the latest malware, memory exploits and other fileless assaults as they attempt to do compromise your network.
  • ActiveEDR Recovery gets users up and running quickly and features 100% remediation plus rollback for all supported releases of Microsoft Windows.
  • Endpoint Control for Policy-based control of all USB and Bluetooth peripherals (Windows, Mac)
  • Firewall Control for Policy-based control of network connectivity to and from assets, including location awareness (Win, Mac, Linux)
  • Security Vulnerability Management, along with Application Inventory, for insight into 3rd party applications that have known vulnerabilities mapped to the MITRE CVE security dictionary
  • Secure Remote Shell capability for direct endpoint connection by incident responders and forensics team
  • Autonomous SentinelOne agent Storyline Engine
  • Integrated Static AI and SentinelOne Cloud Intelligence file-based attack prevention
  • Behavior-based AI fileless incursion detection
  • Autonomous Threat, Remediation, and Rollback Response
  • Quarantine endpoint from network, Incident Analysis, Agent Anti-tamper, Application inventory
  • Rogue endpoint discovery
The SentinelOne Complete Package
The SentinelOne Complete Package includes the core features and works with all the options of the Control bundle and adds single-agent advanced endpoint detection and response (EDR), hunting throughout endpoints, cloud, and Internet-of-Things (IoT). The package eliminates significant effort for security administrators, security operations center analysts, threat hunters, and incident responders by automatically correlating events and mapping it into the MITRE ATT&CK framework to investigate root causes. The SentinelOne Singularity Complete Package includes an advanced EDR feature set:
  • Co-Managed solution with Progent being sent alerts and notices of all activities in your environment. Customers are responsible for reacting to threats in their system and extra-cost support time and material is offered from Progent
  • ActiveEDR Advanced adds visibility of all benign data.
  • ActiveEDR Advanced adds enterprise threat hunting. SentinelOne stands out with the ease-of-use characterized by the active nature of the solution in autonomously responding to attacks.
  • Storyline feature for Automated Forensics and quick root cause analysis. All OS stories are automatically contextualized with SentinelOne’s proprietary TrueContext function, simplifying analysts' tedious job of event correlation so they can determine the root cause with reduced MTTR.
  • Storyline Active Response (STAR) mitigates zero-day threats with custom detection and hunting rules.
  • Deep visibility Storyline Pivot and Hunt by MITRE ATT&CK technique
  • EDR Hunting Data storage ranging from 14 days standard to 365 days optional
  • Timelines, file fetch, file integrity monitoring, sandbox integrations
  • Other response options are offered and personalized to your needs. Includes 1 hour of training in advanced features and routine management of the SentinelOne portal. During this time, Progent will train in the specification of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts.
Options for the SentinelOne Singularity Complete Package bundle include adding software-defined network discovery and aggregated active/passive device mapping through SentinelOne's Vigilance with MDR package plus elimination of agent installation gaps with configurable job automation. Progent can also provide monthly customer portal review and threat cleanup advice.

Complete with Vigilance Respond Managed Detection and Response Services
Vigilance Respond and Vigilance Respond Pro are add-on Managed Detection and Response (MDR) services for subscribers to SentinelOne's Singularity Complete bundle. These packages include full 24x7x365 incident response delivered by Tier-1, Tier-2, and Tier-3 cybersecurity professionals. Vigilance Respond subscriptions include validation of threats, event prioritization, false positive management and dashboard cleanup, accelerated threat resolution, thorough reporting, service level agreements, and escalation to the customer's security organization.

Vigilance MDR consultants rank detected threat alerts based on a hierarchy ranging from Benign False Positive to Malicious Urgent. This classification determines how the analyst manages the detected threat. There are five categories of threats and associated responses. Most alerts require no action by the client.

Benign Alert - False Positive
Vigilance takes care of the issue and annotates the SentinelOne dashboard. For single False Positive alerts, no additional actions or alerts are required. For persistent False Positive alerts, Vigilance will escalate the issue to the client to offer or agree to a proper exclusion or agent upgrade as required.

Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program
Vigilance responds to ensure the threat is blacklisted, resolved, and documented. Usually, no alert will be sent to the customer unless the issue calls for follow up activity.

Malicious Alert - True Positive / No Action Necessary
Vigilance takes proper actions including remediation to ensure the threat is isolated. Once the analyst verifies the threat is eliminated, the analyst will transmit a verification notice to the customer.

Malicious Alert - True Positive Non-Urgent / Action Necessary
Vigilance performs proper actions including remediation to make sure the threat is quarantined. Once the SentinelOne analyst confirms the threat is eliminated, the analyst will transmit a confirmation notice to the client. Follow-up activity like re-imaging may be called for in certain cases.

Malicious Alert - True Positive Urgent / Action Needed
Vigilance may react strongly in high priority breach cases including taking agent remediation actions and disconnecting affected network endpoints to isolate the attack and prevent additional lateral progress. The analyst will send a proactive notification informing the customer of the issue and request immediate response.

In addition to including all the functions of SentinelOne Control and SentinelOne Complete, SentinelOne Complete with Vigilance MDR adds round-the-clock Monitoring with Immediate Threat Response, Remote Script Orchestration, and Ranger:

  • Fully Co-Managed Environment with Progent receiving alerts and notifications of all threats and activities in your system and combined SOC response, offering 3 levels of 24x7x365 Detection and Response. All threats are neutralized and responded to in close to real-time. Further remediation options after threat mitigation are available and customized to meet your individual requirements.
  • Remote Script Orchestration enables enterprises to send scripts to a single machine, a few hundred machines, or even millions of machines, to respond to present and future cyberattacks at machine speed. Security Teams can send customized scripts or choose from a wide selection of tasks – ranging from incident response to forensics artifact collection and even network administration. In conjunction with SentinelOne Storyline Active Response, analysts benefit from automated workflows that promote incident response to the next level.
  • Ranger enables unparalleled visibility into your environment. Ranger is network-efficient by intelligently designating a small number of SentinelOne agents for each subnet to undertake network mapping missions. Elected "Rangers" passively track network broadcast data such as ARP, DHCP, and other network observances. Admins can modify active scan policies and specify multiple IP Protocols for machine learning including ICMP, SNMP, UDP, TCP, SMB, and others. Rangers correlate all collected information within the backend to characterize familiar and unknown devices. Ranger device inventories show what is connected to your system, where they are attached, and which protocols the devices listen on. Ranger permits you to discover and close SentinelOne Agent deployment oversights using Ranger Deploy, a peer-to-peer deployment (Windows, Mac, Linux). Ranger enables you to determine how unknown devices communicate with managed hosts and quarantine suspicious devices from managed devices with a click.
Includes one hour of training in advanced features and routine management of the SentinelOne portal. During this time, Progent will train customers how to create Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts. Progent offers tailored extra instruction for your company's requirements on a time and materials basis.

Download Progent's SentinelOne Singularity Packages Datasheets
Download datasheets about Progent's SentinelOne Singularity products and services:

The Progent Advantage
Progent's roster of over 150 consultants includes certified experts in every aspect of network technology associated with small and mid-size organizations. With this scope of expertise, Progent can be your single point of contact for integrating a comprehensive cybersecurity solution that delivers significant business value. In addition to the endpoint security available from SentinelOne products and services, Progent offers a variety of managed services and affordably-priced support packages created to assist SMBs to design, deploy, validate, and manage networks that feature enterprise-class cybersecurity and low TCO.

Progent offers in-depth experience with all the endpoints, servers and VMs that can be secured by SentinelOne products. Progent can provide services that include Windows 11 planning and migration consulting, Windows 10 management, Linux integration, Mac support, iPhone and iPad consulting, Android integration, Windows Server 2022 migration expertise, Windows Server 2019 integration expertise, Hyper-V virtualization support, and VMware vSphere support consulting.

For fast rollback, Progent's Windows Server experts can assist you to configure Windows Volume Shadow Copy Service (VSS). Progent can also provide remote and onsite access to certified Cisco CCIE experts to assist you to plan, protect or optimize your infrastructure. If your network relies on cloud assets, Progent offers the support of Microsoft Azure consultants, Amazon AWS consultants, and Google Cloud integration consultants.

Contact Progent about SentinelOne Sales and Configuration Services
To find out more about how Progent can assist you to purchase or configure SentinelOne endpoint security products, call 1-800-993-9400 or see Contact Progent.



An index of content::

  • 24-7 Network Support Consulting BlackBerry Enterprise Server Van Nuys BlackBerry Network Architect Firms Los Angeles LAX Airport, USA
  • 24-Hour Ubuntu Linux, Solaris, UNIX Computer Consulting Denver International Airport Redhat Linux, Solaris, UNIX Onsite Technical Support
  • 24/7 Exchange Server 2016 Migration Planning Support Outsourcing Microsoft Exchange 2016 Migration Computer Consultant
  • 24/7 Work from Home Employees Consulting Services - Lubbock - Endpoint Management Systems Consulting and Support Services South Plains Lubbock Lubbock County Texas, America Teleworkers Lubbock Consulting and Support Services - Management Solutions Consulting and Support Services
  • 24x7 Hartford Small Office IT Consultants Hartford, Connecticut Network Support Service
  • After Hours Technical Support Services Fedora Linux, Sun Solaris, UNIX Recife, State of Pernambuco Red Hat Linux, Solaris, UNIX Information Technology Consulting
  • Akron IT Staffing Support Akron, Summit County, US Temporary Staffing Help Expertise Akron, OH, United States
  • At Home Workers Assistance nearby São José dos Campos - Integration Consulting Services Santana do Paraíba Work from Home Employees Expertise near me in São José dos Campos - Setup Guidance
  • BlackBerry Technology Consulting Company Edmonton BlackBerry Professional Software Consulting Group
  • Burlington, Vermont Technical Support Burlington, Rutland, Montpelier, VT Outsourced IT Support
  • CRISC Certified Risk Monitoring On-site Support Best Risk Monitoring Remote Support
  • Cisco Online Technical Support Albuquerque, Bernalillo County, New Mexico Cisco Computer Help New Mexico
  • Cisco Small Office Network Consultants Monterey Peninsula IT Outsource Cisco Monterey Peninsula
  • El Paso Ryuk Online Crypto-Ransomware Mitigation Experts El Paso County Texas El Paso Spora Ransomware Recovery El Paso Texas
  • Hialeah At Home Workforce Conferencing Systems Consulting Services Hialeah, Miami-Dade County Telecommuters Hialeah Assistance - Conferencing Solutions Expertise Hialeah, FL
  • Professionals SentinelOne Singularity XDR
  • Microsoft SharePoint 2013 On-site Support Microsoft SharePoint 2010 Integration Services El Paso County Colorado
  • Midland Texas Nephilim Ransomware Hot Line Conti Ransomware Hot Line
  • Naples Work from Home Employees IP Voice Solutions Consulting Experts Naples Naples FL, US Work at Home Employees Naples Consulting and Support Services - VoIP Technology Expertise
  • Oakland Locky Crypto-Ransomware Removal Oakland Airport OAK Oakland Spora Ransomware Recovery Union City CA
  • Offsite Workforce Consulting Services near San Jose - IP Voice Solutions Consulting San Jose - Sana Clara, USA San Jose Airport SJC At Home Workers Guidance near San Jose - VoIP Solutions Guidance

  • Backup and Recovery Software Consultants
    Services Backup Exec

    Progent can provide economical remote support from IT engineers skilled in a broad range of products and technologies that provide solutions for backing up Microsoft Windows, Apple Mac, and Linux/UNIX servers and workstations plus notebooks and smartphones. Progent can provide consulting support for all major backup platforms including Acronis Backup and Recovery, Barracuda Backup, Altaro VM Backup, Symantec Backup Exec, BackupAssist, CrashPlan PRO, Double-Take Software, MozyPro, Retrospect for Macintosh, Time Machine, VMware vSphere Data Protection (VDP), and Solaris FLARs. Progent's consultants can assist you to implement, enhance, or troubleshoot backup/restore solutions for a range of architectures such as on-premises, remote, cloud-based, or hybrid.

  • Omaha Netwalker Crypto-Ransomware Settlement Experts Omaha, NE Omaha Ransomware Negotiation Consulting Omaha Nebraska
  • SentinelOne Singularity Complete Reseller Remote Support Services
  • On-site and Remote Support SQL Server 2019 Santa Catarina SQL Server 2012 Design Consultant Florianópolis, Estado de Santa Catarina
  • Consultant SentinelOne Behavior-based Antivirus
  • Ransomware Cryptoworm Recovery Mexico City, Cuajimalpa de Morelos Hermes Ransomware Hot Line Ciudad de México, La Magdalena Contreras
  • Redhat Linux, Solaris, UNIX Computer Engineer Clearwater, Pinellas County Clearwater Florida CentOS Linux, Sun Solaris, UNIX Support Outsourcing
  • Remote Workers Consulting near Melbourne - IP Voice Technology Guidance Melbourne Telecommuters VoIP Systems Consulting Experts Victoria
  • Remote Workforce Anaheim Consultants - Infrastructure Expertise Orange County At Home Workers Anaheim Expertise - Integration Consultants Orange County
  • SQL 2008 Online Support Services MS SQL 2008 IT Consultants
  • SQL Server 2019 on Linux On-site Technical Support Microsoft Expert SQL Server 2019 Always On Support and Help

  • SCDPM 2012 and Hyper-V Remote Consulting
    System Center 2012 Data Protection Manager Technical Support

    Progent's Microsoft-certified consultants can provide online or in-person support to help companies of all sizes to plan, implement, administer, and troubleshoot a backup/restore solution based on System Center 2012 Data Protection Manager. Progent can help you to upgrade from older versions of Data Protection Manager or from another backup/recovery platform, and Progent can integrate your SCDPM 2012 deployment for on premises, cloud-based, or hybrid environments. Progent can provide as-needed help for fixing especially challenging problems, or comprehensive project management support. Progent's consultants can also assist your business to incorporate SCDPM 2012 into a comprehensive disaster recovery strategy.

  • Salt Lake City, Tooele County Offsite Workforce Guidance in Salt Lake City - Cybersecurity Systems Expertise Work from Home Employees Salt Lake City Consulting Experts - Security Solutions Assistance Salt Lake City Ogden Clearfield
  • San Jose Small Business IT Support Firms After Hours Network Consulting Companies San Jose-Los Altos
  • Santos-Praia Grande Server Install Santos-São Vicente Migration Consultants
  • Technology Consulting SharePoint 2013 Microsoft SharePoint Server 2013 Online Technical Support

  • Operations Manager Case Studies
    Case Study MOM

    Before Progent's MOM-based solution, network issues were handled reactively, after users were impacted by them. With the benefit of proactive, automated alerts and trend analyses sent by Microsoft Operations Manager, Progent can now address server issues before they becomes critical enough to impact network uptime. Because of Microsoft Operations Manager, Progent can deal with looming problems before clients suspect that the problems are there. Progent supports MOM 2005 and Microsoft Operations Manager 2000 to deliver small company networks enterprise-class reliability, safety and performance.

  • Telecommuters Assistance near me in Calgary - IP Voice Systems Consulting Calgary, Alberta Biggest Remote Workforce Consulting Services near me in Calgary - VoIP Technology Assistance Alberta
  • Telecommuters Sorocaba Expertise - Cloud Technology Guidance 24x7 Work from Home Employees Consulting and Support Services - Sorocaba - Cloud Integration Systems Consulting Experts Sorocaba, State of Sao Paulo
  • Teleworkers Jersey City Consulting and Support Services - Cybersecurity Systems Consulting Hudson County New Jersey, United States Hudson County New Jersey Teleworkers Jersey City Expertise - Security Systems Consulting and Support Services

  • After Hours ISSAP Certified Security Firms
    Security Architecture Consultants

    Progent's ISSAP Premier security consultants, or Information Systems Security Architecture Professionals, are consultants who have earned ISSAP Certification through thorough testing and extensive experience with network security architecture. ISSAP consultants possess in-depth understanding of access management mechanisms and techniques, telecommunications and network infrastructure protection, cryptography, needs evaluation, business continuity and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-certified security specialists can help your business with all aspects of architecture security.

  • The Woodlands Hermes Ransomware Recovery Montgomery County The Woodlands Sodinokibi Ransomware Removal The Woodlands, Texas
  • Top Rated Teleworkers Mesa Guidance - Video Conferencing Systems Consultants Mesa Phoenix Mesa Telecommuters Video Conferencing Solutions Consulting Mesa Arizona

  • Specialists Microsoft 365 Integration
    Biggest Microsoft 365 Planning Help and Support

    Progent can help you to understand the many subscription plans offered with Microsoft 365, formerly branded Office 365, and integrate your network with Microsoft 365 so you realize top business value. Progent offers expertise with multi-vendor environments that include Windows, macOS or OS X, and Linux operating systems. Progent can also help your business to build and manage hybrid solutions that seamlessly integrate on-premises and cloud products and services.

  • Ubuntu Linux, Sun Solaris, UNIX Information Technology Consulting Greensboro Winston-Salem High Point Redhat Linux, Solaris, UNIX Integration Services

  • Patch management Engineers
    Top Server patch management Consulting Services

    Progent's support services for patch management provide organizations of all sizes a versatile and cost-effective alternative for evaluating, validating, scheduling, implementing, and tracking updates to your virtual and physical; servers, endpoints scanners, infrastructure appliances such as routers and wireless access points, and Internet-of-Things devices such as sensors and robotics.

  • Walnut Creek Remote Workforce IP Voice Solutions Consulting Experts Concord At Home Workers Walnut Creek Guidance - IP Voice Systems Consulting and Support Services Walnut Creek California
  • WiFi 6/6E Engineers WiFi 6/6E Optimization Consultant Services
  • Windows 2016 Disaster Recovery Computer Consultants Emergency Troubleshooting Windows Server 2016 Hybrid Cloud Integration
  • SentinelOne Behavior-based Antivirus Consultancy
  • Work at Home Employees Scottsdale Consulting Experts - Collaboration Technology Expertise Scottsdale Arizona Scottsdale At Home Workforce Collaboration Solutions Consulting Scottsdale Arizona

  • © 2002-2024 Progent Corporation. All rights reserved.