SentinelOne Reseller and Solutions ConsultantsSentinelOne's Singularity product family is a subscription-based, cloud-centered threat management platform that includes AI algorithms and expert services to deliver enterprise-class endpoint detection and response (Singularity Control and Complete) and managed detection and response (Singularity Complete with Vigilance MDR). SentinelOne's low-profile agents can be installed in minutes to guard popular endpoints against modern cyberthreats including ransomware, known and new malware, trojans, hacking toolkits, memory exploits, malicious scripts, invasive macros, and living-off-the-land (LotL) abuse. Singularity agents are offered for Microsoft Windows, macOS, Linux distributions, and Kubernetes endpoints. Supported form factors include physical, virtual, VDI desktops, customer and hybrid data centers, and cloud providers. Since SentinelOne agents are autonomous, they can deliver advanced behavior-based protection in real time even if endpoints are not cloud connected.

Progent is a certified SentinelOne Partner and reseller and oversees thousands of endpoints protected by SentinelOne technology. SentinelOne is invariably the initial EDR response tool activated by Progent to provide control and visibility of a customer's system at the outset of a ransomware recovery. SentinelOne is in addition the key EDR software powering Progent's Active Security Monitoring services. SentinelOne was ranked as a leading visionary in Gartner's 2022 Magic Quadrant for Endpoint Protection Platforms and scored the highest number of high-quality detections in real-time with zero delays during the 2022 MITRE ATT&CK Phase 4 Evaluation. According to Gartner's assessment, "This reaffirms its (SentinelOne's) ability to detect all attacks and provide full details of the techniques and tactics used." SentinelOne also surpassed all competition for every use scenario in Gartner's evaluation of Critical Capabilities for Endpoint Protection Platforms.

Singularity Packages for SentinelOne Endpoint Security
SentinelOne's Singularity family has several levels of endpoint protection product bundles provided as a worldwide SaaS platform that delivers high availability, centralized policy management by site and group, AI driven malware intelligence, rapid restoration, and an information-driven console for cyberthreat analytics. Packages include Control for enhanced management, Complete for smart root cause analysis, and Complete with Vigilance MDR for 24/7 advanced monitoring and response. The tiers are additive. Control and Complete each include all the features and options of the level beneath it. Pricing starts at $10 per endpoint per month for small customers with significant discounts for bigger accounts. There is no minimum endpoint count.

The SentinelOne Control Package
The SentinelOne Control Package is the base software and is 100% maintained by the client. For some examples: Endpoint agents need to be updated in the SentinelOne portal, allow rules need to be set, exclusions need to be made, blacklists should be created, threats must be responded to, and many other day-to-day activities that someone in your organization needs to manage and maintain. SentinelOne is just like any other security product in that it has frequent updates to keep its defenses current. Progent can assist with or directly handle these items, but there is additional time and materials billing for all services performed.

With the Control Package you manage your own portal and while Progent and SentinelOne personnel are monitoring and or receiving alerts of serious threats in your environment, we have no authorization to do any work in your environment and will only do best efforts to alert you in case of a serious threat.

Features of the SentinelOne Control Package include:

  • Endpoint Prevention (EPP) to stop a wide variety of malware, Trojans, hacking tools, and ransomware before they can get a foothold
  • ActiveEDR Basic for Endpoint Detection and Response (EDR) operates in real-time with or without cloud access. ActiveEDR identifies the latest malware, script misuse and other fileless attacks as they try to do damage.
  • ActiveEDR Recovery gets users up and running quickly and includes full repair as well as rollback for all non-legacy versions of MS Windows.
  • Device Control for Policy-based control of all USB and Bluetooth devices (Windows, Mac)
  • Firewall Control for Policy-based control of network connectivity to and from assets, including location awareness (Win, Mac, Linux)
  • Security Vulnerability Management, in addition to Application Inventory, for details of 3rd party applications with recognized vulnerabilities mapped to the MITRE CVE cybersecurity dictionary
  • Full Secure Remote Shell capability for direct endpoint connection by incident responders and forensics personnel
  • Autonomous SentinelOne agent Storyline Engine
  • Simultaneous Static AI and SentinelOne Cloud Intelligence file-based attack defense
  • Behavior-based AI fileless incursion detection
  • Autonomous Threat, Remediation, and Rollback
  • Quarantine device from system, Incident Analysis, Agent Anti-tamper, Application inventory
  • Rogue endpoint discovery
The SentinelOne Complete Package
The SentinelOne Complete Package includes all the basic features and operates with all the options of the Control bundle and also includes single-agent advanced endpoint detection and response, hunting throughout endpoints, cloud, and IoT. The bundle eliminates substantial time for cybersecurity admins, security operations center analysts, threat hunters, and incident responders by automatically correlating incidents and mapping it into the MITRE ATT&CK framework to determine root causes. The SentinelOne Complete Package provides an advanced EDR feature set:
  • Co-Managed environment with Progent receiving alarms and notices of all threats and activities in your system. Customers are responsible for resolving issues in their environment and optional support time and material is offered from Progent's security experts
  • ActiveEDR Advanced provides visibility of all benign data.
  • ActiveEDR Advanced provides enterprise threat hunting. SentinelOne stands out by the the ease-of-use personified by the active nature of the solution in autonomously responding to attacks.
  • Storyline feature for Automated Forensics and quick root cause analysis (RCA). All OS storylines are automatically contextualized with SentinelOne’s patented TrueContext technology, simplifying analysts' tedious task of event correlation before they can arrive at root causes with reduced MTTR.
  • Storyline Active Response mitigates zero-day attacks with custom detection and hunting rules.
  • Deep visibility Storyline Pivot and Hunt by MITRE ATT&CK technique
  • EDR Hunting Data retention from 14 days standard to 365 days optional
  • Timelines, file fetch, file integrity monitoring, sandbox integrations
  • Additional response options are available and personalized to your requirements. Includes an hour of training in advanced features and day-to-day management of the SentinelOne portal. During this time, Progent will demonstrate the specification of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts.
Add-in for the SentinelOne Singularity Complete Package package include adding software-defined network discovery and aggregated active/passive device mapping through SentinelOne's Vigilance with MDR package plus elimination of agent installation gaps with configurable job automation. Progent can also provide optional monthly customer portal checks and threat cleanup advice.

Complete with Vigilance Respond Managed Detection and Response (MDR) Services
Vigilance Respond and Vigilance Respond Pro are add-on MDR programs for subscribers to the Singularity Complete bundle. These packages include digital forensics and full 24x7 incident response provided by Tier-1, Tier-2, and Tier-3 IT security professionals. Vigilance Respond subscriptions include validation of cyberthreats, event prioritization, false positive management and dashboard updating, threat containment, management reporting, service level agreements, and escalation back to the customer's cybersecurity team.

Vigilance MDR analysts rank detected threat notifications based on a threat-handling hierarchy going from Benign to Urgent True Positive. This ranking dictates how the Vigilance analyst manages the detected threat. There are five classes of threats and consequent responses. Most alerts require no action by the client.

Benign Alert - False Positive
Vigilance takes care of the issue and annotates the SentinelOne dashboard. For isolated False Positive alerts, no other actions or alerts are required. For repeated False Positive alerts, Vigilance will escalate the issue to the client to submit or approve an appropriate exclusion or agent update as needed.

Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program (PuP)
Vigilance takes action to ensure the threat is blacklisted, resolved, and annotated. Typically, no notification will be transmitted to the customer unless the issue requires additional work.

Malicious Alert - True Positive / No Action Needed
Vigilance takes proper actions including remediation to ensure the threat is quarantined. After the analyst confirms the threat is eliminated, the analyst will transmit a confirmation notice to the customer.

Malicious Alert - True Positive Non-Urgent / Action Needed
Vigilance performs proper actions including remediation to ensure the threat is quarantined. Once the SentinelOne analyst verifies the threat is eliminated, the analyst will transmit a confirmation alert to the client. Follow-up procedures like re-imaging may be necessary in some cases.

Malicious Alert - True Positive Urgent / Action Needed
Vigilance may respond aggressively in high priority breach incidents including taking agent remediation actions and disconnecting compromised network endpoints to stall the attack and block further lateral progress. The analyst will send a proactive alert informing the customer of the issue and request immediate response.

In addition to including all the functions of SentinelOne Control and SentinelOne Complete, SentinelOne Complete with Vigilance MDR adds round-the-clock Monitoring with Near Real Time Threat Response, Remote Script Orchestration, and Ranger:

  • Fully Co-Managed Solution with Progent receiving alerts and notifications of all threats and activities in your environment and combined SOC response, providing 3 levels of 24x7x365 Detection and Response. Threats are mitigated and responded to in close to real-time. Further remediation options following threat mitigation are available and customized to your individual needs.
  • Remote Script Orchestration empowers enterprises to send scripts to one machine, several machines, or even millions of machines, to react to current and future cyberattacks instantly. Security Teams can send custom scripts or choose from a broad selection of tasks – ranging from incident response to forensics artifact collection and even IT administration. In conjunction with SentinelOne Storyline Active Response, analysts benefit from automated workflows that promote incident response to a higher level.
  • Ranger provides unparalleled visibility into your system. Ranger is network-efficient by intelligently designating a small number of SentinelOne agents per subnet to undertake network mapping activity. Elected "Rangers" passively listen for network broadcast data such as ARP, DHCP, and other network observances. Admins can customize current scan policies and select multiple IP Protocols for machine learning including ICMP, SNMP, UDP, TCP, SMB, and more. Rangers correlate all learned information in the backend to fingerprint familiar and unfamiliar devices. Ranger device inventories reveal what is connected to your system, where they are connected, and which protocols the devices listen on. Ranger enables you to discover and eliminate SentinelOne Agent deployment gaps using Ranger Deploy, a peer-to-peer deployment (Windows, Mac, Linux). Ranger enables you to determine how unknown devices communicate with managed hosts and quarantine suspect devices from managed devices with a click.
Includes 1 hour of training in advanced features and day-to-day management of the SentinelOne portal. During this time, we will train clients how to create Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts. Progent offers custom additional instruction for your organization's requirements on a time and materials basis.

Download Progent's SentinelOne Singularity Packages Datasheets
See datasheets about Progent's SentinelOne Singularity packages:

Why Progent?
Progent's roster of over 150 consultants includes certified experts in every aspect of network technology associated with small and mid-size businesses. With this scope of knowledge, Progent can be your single point of contact for building and managing a comprehensive cybersecurity solution that delivers significant business value. In addition to the endpoint security available from SentinelOne products, Progent offers a variety of managed services and specially-priced IT support packages created to help small and mid-size businesses to design, deploy, test, and administer networks that deliver enterprise-level security and low total cost of ownership.

Progent has expertise in all the endpoint devices, servers and virtual machines that can be protected by SentinelOne products. Progent can provide services that include Windows 11 migration expertise, Windows 10 management, Linux integration, Mac support, iPhone and iPad integration, Android support, Windows Server 2022 migration consulting, Windows Server 2019 integration consulting, Hyper-V virtualization expertise, and VMware vSphere integration consulting.

For fast rollback, Progent's Windows Server consultants can assist you to set up Windows Volume Shadow Copy Service (VSS). Progent can also provide online and onsite access to certified Cisco CCIE experts to assist you to plan, defend or debug your network infrastructure. If your network relies on cloud assets, Progent offers the support of Microsoft Azure consultants, Amazon AWS experts, and Google Cloud integration consultants.

Contact Progent about SentinelOne Sales and Configuration Services
To find out more about how Progent can help you to buy or configure SentinelOne endpoint security products, call 1-800-993-9400 or see Contact Progent.



An index of content::

  • 24-Hour Toledo Spora Crypto-Ransomware Cleanup Toledo Toledo Maze Ransomware Business Recovery
  • 24/7/365 Cisco Certified Experts Arkansas Outsourced IT Services Little Rock, AR Help Center
  • Allen At Home Workforce Management Solutions Consulting Experts Allentown, PA Work at Home Employees Allen Consulting Experts - Endpoint Management Solutions Expertise Allentown Bethlehem Easton
  • At Home Workforce Chesapeake Expertise - Video Conferencing Systems Consultants Chesapeake, South Hampton Roads South Hampton Roads Top Chesapeake At Home Workforce Conferencing Technology Assistance

  • Firewall Setup NoderZero Threat Assessment
    NodeZero Certified Penetration Testing Cybersecurity Organization

    Progent's certified cybersecurity consultants can run NodeZero-based threat assessments to make sure your security defense tools and policies are correctly configured and effective.

  • Award Winning IT Consulting SentinelOne Singularity and Vigilance Reseller SentinelOne Behavior-based Antivirus Consultancy
  • Baltimore Remote Workers Endpoint Security Systems Consulting and Support Services Baltimore Maryland, United States Telecommuters Baltimore Expertise - Network Security Systems Expertise Baltimore Maryland

  • MSP360 Managed Backup Computer Consulting
    MSP360 SQL Backup Online Troubleshooting

    Progent can help your company to design, deploy and debug a backup plan built around MSP360 software. MSP360 offers file/folder or image-based backup/recovery for VMs and physical computers, works with all popular public clouds, and permits you to build a data protection solution with a low RTO and a defined Recovery Point Objective. With ProSight Data Protection Services 360 Backup, Progent offers end-to-end monitoring and remote management of your backup environment to prevent data loss resulting from human miscues, computer glitches, ill-intentioned users, and external assaults such as ransomware.

  • Immediate Engineers SentinelOne Endpoint Virus Immunization
  • BlackBerry Exchange Implementation Support Fort Worth Texas Security Consulting Companies BlackBerry Redirector Fort Worth Texas
  • Consultants SentinelOne Singularity XDR
  • Boston At Home Workers Collaboration Technology Consulting and Support Services Boston Cambridge Boston At Home Workforce Collaboration Technology Consulting and Support Services
  • Carlsbad Locky Ransomware System-Restore Carlsbad-Encinitas Carlsbad Hermes Crypto-Ransomware Business-Recovery Carlsbad-Del Mar
  • Cisco Firewall Small Business Network Consulting Company Cisco Security Design
  • Computer Consultant Telecommute Job Livermore, CA Emergency Microsoft MCTS Consultant Work From Home Job Pleasanton, CA
  • Edmonton Avaddon Ransomware Settlement Negotiation Experts Edmonton Edmonton NotPetya Crypto-Ransomware Settlement Negotiation Help Edmonton, AB

  • Windows Server 2019 with Linux Professionals
    Windows Server 2019 LEDBAT Online Technical Support

    Progent's Windows Server 2019 disaster recovery planning experts can assist your organization to design a DR/BC system built around Microsoft's cloud-tested Failover Clustering technologies including Cluster Sets, Storage Replica, Storage Spaces Direct, VM Load Balancing, and Cloud Witness.

  • Fort Lauderdale Ransomware WannaCry Preparedness Checkup Fort Lauderdale Crypto-Ransomware DopplePaymer Preparedness Testing Fort Lauderdale
  • Fremont Network Solutions Award Winning Fremont Network Design
  • Help and Support Debian Linux, Sun Solaris, UNIX Saddle Brook-Bergen County, NJ Saddle Brook-Moonachie, America Professionals Ubuntu Linux, Sun Solaris, UNIX
  • Kansas Integration Consultant Wichita Kansas Network Engineers
  • Knoxville Work from Home Employees Security Solutions Consulting and Support Services Knoxville Telecommuters Guidance in Knoxville - Network Security Solutions Consulting Services Knoxville, TN

  • WatchGuard Firebox M370 Firewall Security Companies
    WatchGuard Firebox M390 Firewall Cybersecurity Consultancies

    Progent offers consulting services for WatchGuard Firewall security gateways such as the WatchGuard Firebox and XTM series of Firewalls and the Firebox SSL Core VPN Gateway. Progent's WatchGuard professionals can show you how to choose, deploy, and manage a WatchGuard Firewall/VPN product that fits your security requirements and budget. Progent can help you to manage legacy WatchGuard firewalls or upgrade efficiently to modern WatchGuard firewall solutions.

  • Linux Remote Support Services Maine, United States Online Troubleshooting UNIX

  • SCDPM 2012 and Exchange DAGs Remote Technical Support
    Professionals SCDPM 2012 Backup and Recovery

    Progent's Microsoft-certified consultants can provide remote or in-person support to help organizations of any size to design, implement, administer, and troubleshoot a backup/restore system built around System Center 2012 Data Protection Manager (SCDPM 2012). Progent's consultants can assist you to migrate from earlier releases of SCDPM or from another backup system, and Progent can integrate your SCDPM 2012 deployment for onsite, cloud, or hybrid environments. Progent offers occasional help for fixing particularly challenging issues, or comprehensive project management support. Progent can also assist your business to incorporate SCDPM 2012 into a comprehensive disaster recovery plan.

  • Mandrake Linux, Solaris, UNIX Outsourcing Charlotte Charlotte, NC CentOS Linux, Sun Solaris, UNIX Computer Consultant
  • Microsoft Exchange Server 2007 Solutions Provider Uniondale, NY Uniondale-Melville, NY, U.S.A. Exchange 2010 Server IT Outsourcing
  • Microsoft Hyper-V 3.0 Virtual Server Integration Support Microsoft Hyper-V Server Virtualization Consultant

  • High-Availability Failover Clustered Servers Help and Support
    High-Availability Failover Clustered Servers Support and Integration

    Progent offers Microsoft Windows Cluster Server consulting to help your organization implement non-stop server clusters that can provide 100% uptime. Clustered Windows servers for non-stop systems include Windows 2003 Cluster Server, Microsoft SQL Server Cluster, and Microsoft Exchange Server Cluster. By assisting you t plan zero-downtime clustered server solutions around Microsoft Windows Server 2003 Cluster, Progent's Certified Windows professionals ensure that your zero-downtime server clusters are configured to optimize the competitive advantage of your computer system.

  • Montgomery Ryuk Crypto-Ransomware System-Rebuild Consultants Montgomery Mobile Top Montgomery Sodinokibi Ransomware Repair Montgomery Mobile
  • Napa County Small Business IT Outsourcing Group Napa, California Support Outsourcing Services
  • Technology Professional SentinelOne Endpoint Protection and Response
  • Omaha Council Bluffs, US Offsite Workforce Omaha Consulting - Endpoint Security Solutions Expertise Offsite Workforce Consulting and Support Services in Omaha - Endpoint Security Systems Consulting Experts
  • Plano Locky Ransomware System-Restore Plano Plano Dharma Ransomware Business-Recovery Plano - Richardson
  • Providence Rhode Island Biggest Work from Home Employees Consulting and Support Services near me in Providence - Backup Technology Consulting Experts Providence Pawtucket Cumberland Providence Telecommuters Data Protection Systems Guidance
  • Providencia, Metropolitan Region Santiago Telecommuters Cloud Solutions Consulting Experts Remote Workforce Consulting Experts near Santiago - Cloud Integration Solutions Guidance uoa, Metropolitan Region
  • Ransomware Business Recovery Netwalker Ransomware Hot Line
  • Remote Workforce Southfield Consulting and Support Services - Collaboration Systems Consultants Southfield-Detroit, US Southfield Offsite Workforce Collaboration Technology Consulting Experts Southfield, Michigan

  • Exchange 2007 Server Engineer
    Microsoft Exchange 2007 Consult

    Progent's Microsoft certified support team can show you how to design and implement an efficient in-place Exchange Server 2007 upgrade plan that avoids productivity disruption, simplifies long-term support requirements, and makes your Microsoft Exchange Server 2007 easy to administer. For complex multi-server or multi-site migrations, Progent has the knowledge and experience to complete your move quickly and affordably. Progent's Microsoft Exchange 2007 help, repair, and design offerings include expertise with the integration of outside vendor enhancements of Microsoft Exchange Server 2007 that are in keeping with your business needs.

  • Santa Monica Teleworkers Endpoint Management Solutions Expertise Santa Monica-Marina Del Rey, CA Santa Monica Remote Workforce Management Tools Expertise Santa Monica-Culver City, CA
  • Schaumburg Ryuk Crypto-Ransomware Settlement Expertsn Schaumburg-Des Plaines, IL Schaumburg-Elgin Schaumburg WannaCry Ransomware Settlement Help
  • SharePoint Small Business IT Consulting Firm Alabama - Birmingham, AL, Montgomery, AL, Mobile, AL, Huntsville, AL SharePoint Information Technology Outsourcing Firm Alabama
  • Shreveport Bossier City , U.S.A. Remote Workers Shreveport Consulting Experts - Support Consulting Experts Teleworkers Consulting in Shreveport - Support Consultants Shreveport Bossier City , US
  • Spora Ransomware Hot Line Port Newark Ransomware Cleanup and Restore Newark
  • Technology Consulting Services Help Desk Outsourcing Services Helpdesk Management Services Remote Support
  • Top Telecommuters Consulting Services in Garland - Network Security Solutions Consultants Garland Remote Workforce Garland Consulting Services - Security Solutions Consulting and Support Services Garland Centerville
  • Work from Home Employees Guidance nearby Calgary - Collaboration Technology Expertise Calgary Calgary At Home Workers Collaboration Technology Assistance Calgary

  • Hornetsecurity Altaro 365 Total SharePoint Backup Support and Setup
    Hornetsecurity 365 Total Backup Support and Setup

    Progent is an authorized Hornetsecurity/Altaro partner and can design, configure, and manage a deployment of 365 Total Backup to preserve your Microsoft 365 user and group mailboxes, files stored on your company's OneDrive Accounts and SharePoint sites, Teams Chats, plus files on Windows-powered endpoints.


    © 2002-2024 Progent Corporation. All rights reserved.