SentinelOne Reseller and Integration ExpertsSentinelOne's Singularity product line is a subscription-based, cloud-centric cyberthreat management platform that includes computer learning software and professional services to provide comprehensive endpoint detection and response (Singularity Control and Complete) and managed detection and response (Singularity Complete with Vigilance MDR). SentinelOne's low-profile agents can be loaded in minutes to guard popular endpoints against modern cyberthreats such as ransomware, familiar and zero-day malware, trojan viruses, hacking tool sets, RAM exploits, malicious scripts, harmful macros, and living-off-the-land (LotL) abuse. SentinelOne agents are available for Windows, Apple macOS, Linux distributions, and Kubernetes powered endpoints. Supported deployment models include physical, virtual, VDI, customer and hybrid data centers, and cloud service providers. Because SentinelOne agents operate autonomously, they are able to provide advanced behavior-based security in real time even when endpoints are not interfaced to the cloud.

Progent is a SentinelOne Partner and reseller and oversees thousands of endpoints protected by SentinelOne technology. SentinelOne Singularity is always the initial endpoint response tool activated by Progent to gain control and visibility of a customer's network in the first stages of a ransomware recovery. SentinelOne Singularity is also the key technology powering Progent's Active Security Monitoring managed services. SentinelOne has been ranked as a top visionary in Gartner's 2022 Magic Quadrant for Endpoint Protection Platforms and scored the most correlated tactics and techniques in real-time during the gold-standard MITRE ATT&CK Phase 4 Evaluation. Gartner concludes, "This reaffirms its (SentinelOne's) ability to detect all attacks and provide full details of the techniques and tactics used." SentinelOne also outscored all competitors for each use case in Gartner's assessment of Critical Capabilities for Endpoint Protection Platforms (EPPs).

Singularity Bundles for SentinelOne Endpoint Detection and Response
SentinelOne's Singularity product line includes several tiers of endpoint security product bundles provided as a worldwide cloud-based solution that features high availability, hierarchical policy management by site and group, AI powered threat intelligence, fast recovery, and a data-driven console for cyberthreat analytics. Bundles consist of Control for enhanced management, Complete for automated root cause analysis, and Complete with Vigilance MDR for 24/7 advanced monitoring and response. The product tiers are additive. Control and Complete each have all the features and options of the tier beneath it. Subscription rates begins at $10 for each endpoint per month for small customers with significant discounts for bigger accounts. There is no minimum device count.

The SentinelOne Control Package
The SentinelOne Control Package is the base software and is 100% maintained by the client. For some examples: Endpoint agents need to be updated in the SentinelOne portal, allow rules need to be set, exclusions need to be made, blacklists should be created, threats must be responded to, and many other day-to-day activities that someone in your organization needs to manage and maintain. SentinelOne is just like any other security product in that it has frequent updates to keep its defenses current. Progent can assist with or directly handle these items, but there is additional time and materials billing for all services performed.

With the Control Package you manage your own portal and while Progent and SentinelOne personnel are monitoring and or receiving alerts of serious threats in your environment, we have no authorization to do any work in your environment and will only do best efforts to alert you in case of a serious threat.

Major Features of the SentinelOne Control Package include:

  • Endpoint Prevention (EPP) to block a wide variety of malware, Trojans, hacking tools, and ransomware before they can start
  • ActiveEDR Basic for Endpoint Detection and Response (EDR) works in real-time with or without cloud access. ActiveEDR identifies the latest malware, script misuse and other fileless attacks as they attempt to do compromise your network.
  • ActiveEDR Recovery gets users back in business in minutes and features 100% repair as well as rollback for all non-legacy versions of MS Windows.
  • Device Control for Policy-based control of all USB and Bluetooth devices (Win, Mac)
  • Firewall Control for Policy-based control of network connectivity to and from assets, including location awareness (Win, Mac, Linux)
  • Vulnerability Management, in addition to Application Inventory, for details of 3rd party apps that have known vulnerabilities mapped to the MITRE CVE cybersecurity database
  • Full Secure Remote Shell support for direct endpoint connection by event responders and forensics team
  • Autonomous SentinelOne agent Storyline Engine
  • Combined Static AI and SentinelOne Cloud Intelligence file-based assault defense
  • Behavior-based AI fileless attack detection
  • Autonomous Threat, Remediation, and Rollback
  • Quarantine device from system, Incident Analysis, Agent Anti-tamper, App inventory
  • Rogue device discovery
The SentinelOne Singularity Complete Package
The SentinelOne Complete Package includes the core features and operates with the extra functions of the Control bundle and adds single-agent enterprise-grade endpoint detection and response (EDR), hunting for all endpoints, cloud, and IoT. The bundle eliminates substantial effort for security admins, security operations center analysts, cyberthreat hunters, and incident responders by automatically correlating events and mapping it into the MITRE ATT&CK framework to investigate root causes. The SentinelOne Singularity Complete Package provides a powerful EDR feature set:
  • Co-Managed environment with Progent being sent alarms and notices of all threats in your environment. Customers are responsible for reacting to threats in their system and optional support time and material is available from Progent
  • ActiveEDR Advanced adds visibility of all non-threatening data.
  • ActiveEDR Advanced adds enterprise threat hunting. SentinelOne is differentiated by the the ease-of-use characterized by the active quality of the solution in autonomously reacting to attacks.
  • Storyline technology for Automated Forensics and fast root cause analysis (RCA). All OS stories are automatically contextualized with SentinelOne’s patented TrueContext technology, simplifying analysts' laborious task of event correlation so they can arrive at root causes with reduced MTTR.
  • Storyline Active Response (STAR) mitigates zero-day threats with customized detection and hunting rules.
  • Deep visibility Storyline Pivot and Hunt by MITRE ATT&CK technique
  • EDR Hunting Data storage from 14 days standard to one year optional
  • Timelines, file fetch, file integrity monitoring, sandbox integrations
  • Other response options are offered and customized to your needs. Includes an hour of training in key features and routine management of the SentinelOne portal. During this time, Progent will demonstrate the creation of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts.
Add-in for the SentinelOne Complete Package package include adding software-defined network discovery and aggregated active/passive device mapping through SentinelOne's Vigilance with MDR package plus elimination of agent installation gaps with configurable job automation. Progent also offers monthly customer portal checks and threat cleanup advice.

Complete with Vigilance Respond MDR Services
Vigilance Respond and Vigilance Respond Pro are optional MDR programs for subscribers to the Singularity Complete bundle. These bundles include digital forensics and full 24x7 incident response provided by Tier-1, Tier-2, and Tier-3 IT security experts. Vigilance Respond subscriptions include validation of threats, event prioritization and triage, false positive management and console cleanup, accelerated threat resolution, management reporting, SLAs, and escalation to the customer's cybersecurity team.

Vigilance MDR analysts classify detected threat notifications based on a threat-handling hierarchy ranging from Benign False Positive to Malicious Urgent. This ranking dictates how the analyst responds to the detected threat. There are five classes of threats and consequent responses. The majority of alerts require no a response by the client.

Benign Alert - False Positive
Vigilance takes care of the issue and updates the SentinelOne dashboard. For isolated False Positive alerts, no other responses or notifications are needed. For persistent False Positive alerts, Vigilance will escalate the issue to the client to offer or approve a proper exclusion or agent upgrade as required.

Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program
Vigilance takes action to make sure the threat is blacklisted, resolved, and annotated. Usually, no alert will be transmitted to the customer unless the issue calls for follow up activity.

Malicious Alert - True Positive / No Action Needed
Vigilance takes proper actions including remediation to make sure the threat is isolated. After the analyst verifies the threat is eliminated, the analyst will send a confirmation alert to the client.

Malicious Alert - True Positive Non-Urgent / Action Needed
Vigilance takes proper actions including remediation to make sure the threat is isolated. Once the analyst verifies the threat is deleted, the analyst will transmit a verification alert to the customer. Subsequent activity like re-imaging may be called for in certain circumstances.

Malicious Alert - True Positive Urgent / Action Necessary
Vigilance may react aggressively in serious breach incidents including pursuing agent remediation actions and isolating compromised network endpoints to stall the attack and block further lateral movement and spread. The analyst will transmit a proactive alert apprising the customer of the situation and request immediate response.

In addition to including all the functions of SentinelOne Control and SentinelOne Complete, SentinelOne Complete with Vigilance MDR adds round-the-clock Monitoring with Near Real Time Threat Response, Remote Script Orchestration, and Ranger:

  • Fully Co-Managed Solution with Progent receiving alerts and notifications of all threats and activities in your system and combined SOC response, providing 3 levels of 24x7x365 Detection and Response. All threats are neutralized and responded to in close to real-time. Further remediation alternatives following threat mitigation are available and tailored to meet your individual needs.
  • Remote Script Orchestration enables enterprises to send scripts to one machine, several machines, or even millions of machines, to respond to current and future cyberattacks instantly. Security Teams can send tailored scripts or choose from a wide selection of tasks – ranging from incident response to forensics artifact collection and even IT administration. In combination with SentinelOne Storyline Active Response, analysts can save time with automated workflows that take incident response to the next level.
  • Ranger provides unparalleled visibility into your system. Ranger is network-efficient by intelligently electing a small number of SentinelOne agents for each subnet to undertake network mapping activity. Selected "Rangers" passively listen for network broadcast data such as ARP, DHCP, and other network observances. Admins can customize active scan policies and specify multiple IP Protocols for machine learning including ICMP, SNMP, UDP, TCP, SMB, and more. Rangers correlate all learned information within the backend to characterize familiar and unknown devices. Ranger device inventories show what is attached to your system, where they are attached, and what protocols the devices listen on. Ranger enables you to discover and close SentinelOne Agent deployment oversights with Ranger Deploy, a peer-to-peer deployment (Windows, Mac, Linux). Ranger permits you to monitor how unknown devices communicate with managed hosts and isolate suspicious devices from managed devices with a click.
Includes 1 hour of training in advanced features and routine management of the SentinelOne portal. During this time, Progent will instruct customers in the creation of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts. Progent offers custom extra instruction for your organization's needs on a time and materials basis.

Download Progent's SentinelOne Singularity Packages Datasheets
Download datasheets describing Progent's SentinelOne Singularity products and services:

The Progent Advantage
Progent's roster of more than 150 consultants includes certified experts in every facet of network technology related to small and mid-size organizations. With this scope of expertise, Progent can be your single point of contact for building and managing a comprehensive security solution that offers significant business value. In addition to the endpoint protection provided by SentinelOne products, Progent offers a catalog of managed services and specially-priced support packages created to assist small and mid-size businesses to design, implement, test, and administer networks that deliver enterprise-level cybersecurity and low total cost of ownership.

Progent has expertise in all the endpoint devices, servers and virtual machines that can be protected by SentinelOne products. Progent can provide services that include Windows 11 migration consulting, Windows 10 integration, Linux support, Mac OS X and macOS consulting, iPhone and iPad support, Android configuration, Windows Server 2022 migration expertise, Windows Server 2019 integration consulting, Hyper-V virtualization support, and VMware vSphere configuration consulting.

For fast rollback capability, Progent's Windows Server experts can help you to set up Windows Volume Shadow Copy Service (VSS). Progent can also provide remote and onsite support from certified Cisco CCIE consultants to assist you to design, defend or troubleshoot your network infrastructure. If your network relies on cloud resources, Progent can provide the support of Microsoft Azure experts, Amazon AWS consultants, and Google Cloud solutions experts.

Contact Progent about SentinelOne Sales and Configuration Services
To find out more about how Progent can help you to purchase or integrate SentinelOne endpoint security products, call 1-800-993-9400 or see Contact Progent.



An index of content::

  • 24 Hour IT Staff Augmentation for Network Support Teams Tacoma, Pierce County IT Staff Temps for Network Support Teams Tacoma, Pierce County
  • SentinelOne Singularity EDR Engineers
  • At Home Workforce Consulting Services near Akron - Integration Consulting and Support Services Remote Workforce Akron Consulting Services - Infrastructure Expertise Summit County Ohio
  • CISA Certified Security Expert Atlanta Integration Company Atlanta, Georgia IT Management
  • CISSP Cybersecurity Consultancy Minnesota Minneapolis, MN Security Organization Firewall

  • Stabilizing Phase: Design Tuning Information Technology Consulting Firms
    Network Help Stabilizing Phase: Design Tuning

    In conducting IT projects for corporate clients, Progent follows a phased approach based on defined milestones in order to meet budgetary, scheduling and technical goals while minimizing business disruption. Progent's Enterprise Services Project Methodology follows accepted project management standards based on the best practices defined by the Microsoft MSF methodology which specifies requirements definition, design proposals, pilots, design adjustments, and professional deployment. All facets are recorded to make available a detailed description of IT services delivered and to help in downstream network maintenance.

  • SentinelOne Behavior-based Antivirus Consulting Services
  • Cisco Manager Manchester Nashua Merrimack Hillsborough County New Hampshire Cisco Computer Consultancy Firms
  • Citrus Heights Information Technology Consultants Network Help Citrus Heights

  • 24x7 Network Help and Support
    Microsoft System Center Operations Manager Online Help

    Even if your business has a minimal network services group and a modest technology budget, your information network can still have the same high availability and responsiveness that once required a large internal support organization. Progent's 24x7 Network Support Services for small businesses combine the experience of skilled Microsoft-expert and Cisco-certified IT consultants, the most recent system management products for proactive monitoring and threshold alarms, and economical support packages such as a help desk service to keep your mission-critical network applications and hardware operating.

  • Computer Engineer Fortinet Firewall Web Filtering Fortinet 3000 Series Firewalls Outsourcing
  • Consulting Services for Network Support Organizations nearby Nashville - Short-Term Staff Help Nashville, Davidson County Nashville, Davidson County Specialists for Nashville Computer Support Companies
  • Dynamics GP Salinas Dealer - Upgrade Programming and Support Marina, CA MS Dynamics GP Gold Partner nearby Salinas - Upgrade Consulting Salinas California, United States
  • Emergency At Home Workers Petaluma Consulting Services - Endpoint Management Solutions Consulting and Support Services Petaluma, CA Remote Workers Assistance near me in Petaluma - Endpoint Management Tools Assistance Sonoma CA

  • Remote Locky ransomware hot line Engineers
    After Hours Consultant NotPetya ransomware hot line

    Progent's Ransomware Hot Line provides 24x7 access to a experienced ransomware recovery expert who can assist you to contain the progress of an ongoing ransomware attack. Call 800-462-8800

  • SentinelOne Singularity Complete Integration Specialist
  • Emergency Phone Support Networking Consultancy Lakewood Littleton Golden Windows Security Service Providers Lakewood
  • Exchange 2003 Server Systems Consultant Irving, TX, US Computer Support Exchange Server 2013 Irving Dallas Plano
  • Exchange 2016 Integration Technical Consultant Exchange 2016 Data Loss Prevention Computer Consultant
  • Exchange Server 2013 Contractor Harris County Texas Urgent Microsoft Exchange 2010 Technical Support Organizations Houston, TX
  • Exchange Server 2013 Network Designers Alpharetta-Fulton County, Georgia Microsoft Exchange Server 2013 Network Security Consulting
  • Glendale, Maricopa County Emergency Phone Support Security Consulting Companies Small Business IT Outsourcing Emergency Phone Support Glendale Arizona
  • SentinelOne Singularity Control Integration Specialists
  • IT documentation management Engineer ProSight certificate expiration management Specialist
  • Integration Wireless LAN Site Survey Online Wireless Site Survey Information Technology Consulting
  • Irving Egregor Crypto-Ransomware Settlement Consultants Dallas County Texas, USA Irving Dharma Ransomware Negotiation Consultants Irving, Dallas County
  • Los Angeles Work at Home Employees Help Desk Call Center Outsourcing Consulting West Covina Telecommuters Los Angeles Consulting Services - Help Desk Solutions Expertise
  • MS Dynamics GP-Software Dealer near me in Lubbock - Training Development Lubbock MS Dynamics GP (Great Plains) Implementation Consultants Lubbock Texas, U.S.A.
  • Madison Consulting Experts for Network Service Providers Madison Dane County Wisconsin Emergency Madison Specialists for IT Support Providers
  • Microsoft Exchange 2010 IT Outsourcing Company Oxford, Oxfordshire, South East England Exchange 2010 Server Small Business Computer Consultant Oxford
  • Monterey, CA System Repair 24 Hour Monterey Information Technology Consultant

  • Best Mid-sized Office Information Technology Consulting Firm
    Midsize Business Small Office Computer Consultant

    Progent offers network support for medium size companies who have 100 to 250 system users. The medium size business or office has traditionally been an overlooked part of the market for IT consulting expertise. The overhead and support access practices of major third-party support firms make them excessively costly for the ordinary mid-size company or small medium business (SMB), which usually has a minimal information technology budget with which to support an IT network whose complexity and sophistication are frequently comparable to the information systems of far larger enterprises. Progent's support delivery model, which takes full advantage of online support, virtual network infrastructure and 24x7 network monitoring, significantly reduces the IT support expenses of an SMB while providing the small company with enterprise-level support from certified, IT consultants knowledgeable in a broad range of small business network solutions. If your mid-sized company or small business is looking for levels of network support appropriate for a mid-size office without paying enterprise costs, call Progent.

  • Napa Technician Napa County Outsourced IT Support
  • Network Consultant Windows Server 2016 Load Balancing Windows Server 2016 Hyper-V Integration Services

  • Microsoft Project Server Workflow Training Professional
    Project Server Time Reporting Integration

    Progent's Microsoft consultants offer in-depth expertise in deploying, managing and troubleshooting all versions of Project Server and can provide a wide variety of cost-effective online consulting services following industry best practices to assist organizations of any size to receive all the benefits of this powerful project management solution. Support services offered by Progent include system planning, installation and migration, setting up safe collaboration among local and remote or mobile users, network infrastructure optimization, and customized online training.

  • Offsite Workforce Campinas Consulting - Connectivity Consulting Services Campinas, State of Sao Paulo Campinas Teleworkers Integration Consulting and Support Services Piracicaba, Campinas
  • SentinelOne Endpoint Virus Immunization Consulting
  • On-site Support Windows 2012 R2 Clustering Windows 2012 R2 Clustering Consultants
  • Perth Work from Home Employees Perth Consulting Services - Endpoint Management Tools Guidance Remote Workers Consulting and Support Services nearby Perth - Management Tools Consultants Perth
  • Pinellas County Florida, U.S.A. Security Firewall Configuration CISSP Consulting Clearwater, America

  • System Center MOM Specialists
    System Center Operations Manager Help and Support

    Mid-sized businesses can enjoy all the benefits of Operations Manager and have quick access to Progent's Microsoft and Cisco Certified IT support experts. With Progent's affordably priced network support programs, medium-size organizations can select a simple co-sourcing service program based on Operations Manager with network monitoring, proactive warnings, comprehensive system analysis, Help Desk support, and remote service. For companies with line-of-business environments who need zero-downtime networking, Progent can provide a complete round-the-clock outsourcing solution. Progent offers expertise in Microsoft System Center Operations Manager 2007 to offer mid-size business networks world-class reliability, security and productivity.

  • Ransomware Removal and Data Restore Hermes Ransomware Hot Line Glendale, Los Angeles County
  • SentinelOne Singularity EDR Consulting Services
  • Redhat Linux, Solaris, UNIX Integration Santa Monica-Culver City, United States Slackware Linux, Solaris, UNIX On-site Technical Support Santa Monica-Westwood, California
  • Remote Microsoft Exchange 2013 Outsourcing IT Consulting Microsoft Exchange 2013

  • Dynamics GP/Great Plains Support Services
    Award Winning Dynamics GP/Great Plains Features Remote Support

    Key features of Dynamics GP/Great Plains software include a modular design that allows you to license only the components you require, a standardized foundation built on Microsoft technologies to protect your investment and offer a tightly interconnected environment, advanced reporting services that permit you to monitor all operations, income and spending and sales patterns, integration with Microsoft Office to enable access to corporate data, the ability to process information from almost any database or desktop software into Microsoft Dynamics GP/Great Plains, plus an open architecture that makes it easy to develop specialized programs. Progent can help you configure and maintain a reliable, protected server and communications network to support Dynamics GP/Great Plains, and can provide expert GP support professionals to help you turn the powerful features of Dynamics GP business accounting software into a productive business management solution.

  • Sausalito Small Business IT Consulting Company Small Business Network Consulting Firms Corte Madera
  • Sherman Oaks Egregor Crypto-Ransomware System-Restoration Sherman Oaks-Burbank, CA Biggest Sherman Oaks Crypto-Ransomware Assault System-Rebuild Sherman Oaks-North Hollywood, California
  • Small Business Computer Consultants Windows Security West Jordan Top Microsoft and Apple Systems Engineer West Jordan, UT

  • Horizon3.ai NodeZero Certified Threat Assessment Firewall Configure
    Horizon3.ai NodeZero Certified Security Penetration Testing Network Security Test

    Progent's certified cybersecurity consultants can run NodeZero-powered penetration tests to verify your security defense systems and policies are correctly set up and effective.

  • South Carolina - Columbia, SC, Charleston, SC, Rock Hill, SC, Greenville, SC Exchange Configuration Network Security Consultants Exchange South Carolina
  • Spora Ransomware Hot Line San Diego-La Jolla, CA San Diego-La Jolla, CA Phobos Ransomware Hot Line
  • Stamford, CT Server Support Stamford-Norwalk Integration Specialists
  • Tampa Crypto-Ransomware Repair Consultants Tampa Tampa, U.S.A. 24-7 Tampa Emergency Crypto-Ransomware Removal
  • Telecommuters Allen Guidance - Backup/Recovery Systems Consulting Allentown Bethlehem Easton, US Remote Workforce Assistance - Allen - Backup Solutions Consulting Services Allentown Pennsylvania
  • Teleworkers Expertise nearby Modesto - Help Desk Augmentation Expertise Offsite Workforce Guidance nearby Modesto - Help Desk Augmentation Consultants Turlock, CA
  • Top Quality Network Services SQL Migration Support SQL Indiana
  • Tucson, AZ Networking Consultant Tucson, Arizona Network Engineers

  • Amazon AWS hybrid cloud integration Coder
    Enterprise hybrid cloud integration Professional

    Progent offers advanced online support services to help businesses connect their information networks with leading public cloud platforms such as Microsoft Azure and Amazon Web Services (AWS). Progent can help you to design and manage hybrid environments that can include Windows and Linux operating systems and apps in either cloud-only solutions or in hybrid network models that seamlessly combine on-premises resources along with public clouds. To assist you to incorporate cloud services with networks, Progent offers a variety of cloud migration support services such as Azure enterprise hybrid cloud planning and deployment consulting, Amazon AWS cloud migration, and Amazon Web Marketing Service (WMS) programming and troubleshooting. Progent has more than 20 years of background providing high-level consulting services remotely, and Progent can make sure you successfully carry out your cloud migration initiatives on schedule and within your budget.

  • Tulsa Maze Ransomware Removal Tulsa WannaCry Crypto-Ransomware Operational Recovery Tulsa
  • Valencia Short Term IT Staffing Support Services Valencia-San Fernando 24-Hour Valencia IT Staff Augmentation Support Valencia-Sylmar, CA, U.S.A.
  • SentinelOne Vigilance Respond MDR Reseller Remote Troubleshooting
  • West Palm Beach Ransomware DopplePaymer Vulnerability Evaluation Top Quality West Palm Beach Ransomware Avaddon Preparedness Checkup West Palm Beach-Boynton Beach
  • Wichita-Sedgwick County On-site and Remote Support Networking Consultants Wichita-Sedgwick County
  • Windows Guru Oklahoma City Oklahoma Oklahoma City, Oklahoma Support Outsourcing Windows
  • Windows Server 2019 with Linux Remote Consulting Microsoft Certified Partner Windows Server 2019 USB Drive Witness IT Consultants

  • © 2002-2025 Progent Corporation. All rights reserved.