SentinelOne Reseller and Solutions ConsultantsSentinelOne's Singularity product family is a subscription-based, cloud-centric threat management platform that includes AI software and expert services to deliver comprehensive endpoint detection and response (Singularity Control and Complete) and managed detection and response (Singularity Complete with Vigilance MDR). SentinelOne's low-profile agents can be installed in a few minutes to defend endpoints against modern cyberthreats such as ransomware, familiar and zero-day malware, trojans, hacking toolkits, RAM exploits, malicious scripts, harmful macros, and living-off-the-land (LotL) attacks. Singularity software agents are available for Windows, macOS, Linux, and Kubernetes powered endpoints. Compatible deployment models include physical, virtual, VDI, customer and hybrid data centers, and cloud service providers. Since SentinelOne software agents operate autonomously, they are able to deliver advanced behavior-based security in real time even when endpoints are not interfaced to the cloud.

Progent is a SentinelOne Partner and dealer and manages thousands of endpoints secured by SentinelOne Singularity technology. SentinelOne Singularity is invariably the first incident response software deployed by Progent to gain control and visibility of a client's network in the first stages of a ransomware breach. SentinelOne is also the key EDR software powering Progent's Active Security Monitoring managed services. SentinelOne was recognized as a top visionary in Gartner's 2022 Magic Quadrant for Endpoint Protection Platforms and scored the most analytic detections in real-time with zero delays during the gold-standard MITRE ATT&CK Phase 4 Evaluation. According to Gartner's assessment, "This reaffirms its (SentinelOne's) ability to detect all attacks and provide full details of the techniques and tactics used." SentinelOne also outscored all competitors for every use case in Gartner's evaluation of Critical Capabilities for Endpoint Protection Platforms (EPPs).

Singularity Packages for SentinelOne Endpoint Detection and Response
SentinelOne's Singularity family includes several levels of endpoint protection product packages provided as a global SaaS solution that delivers high availability, hierarchical policy management by site and group, AI powered threat intelligence, rapid restoration, and a data-driven console for security analytics. Bundles consist of Control for enhanced management, Complete for smart root cause analysis, and Complete with Vigilance MDR for 24/7 advanced monitoring and response. The product tiers are additive. Control and Complete each include all the features and options of the level beneath it. Subscription rates begins at $10 for each endpoint per month for smaller customers with appropriate discounts for larger deployments. There is no minimum endpoint count.

The SentinelOne Control Package
The SentinelOne Control Package is the base software and is 100% maintained by the client. For some examples: Endpoint agents need to be updated in the SentinelOne portal, allow rules need to be set, exclusions need to be made, blacklists should be created, threats must be responded to, and many other day-to-day activities that someone in your organization needs to manage and maintain. SentinelOne is just like any other security product in that it has frequent updates to keep its defenses current. Progent can assist with or directly handle these items, but there is additional time and materials billing for all services performed.

With the Control Package you manage your own portal and while Progent and SentinelOne personnel are monitoring and or receiving alerts of serious threats in your environment, we have no authorization to do any work in your environment and will only do best efforts to alert you in case of a serious threat.

Major Features of the SentinelOne Control Package include:

  • Endpoint Prevention (EPP) to stop a broad range of malware, Trojans, hacking tools, and ransomware before they start
  • ActiveEDR Basic for Endpoint Detection and Response (EDR) operates in real-time with or without cloud access. ActiveEDR identifies the latest malware, script misuse and other fileless attacks as they try to do damage.
  • ActiveEDR Recovery gets users up and running quickly and includes full repair as well as rollback for all non-legacy versions of Microsoft Windows.
  • Device Control for Policy-based control of all USB and Bluetooth devices (Win, Mac)
  • Firewall Control for Policy-based control of network connectivity to and from assets, including location awareness (Win, Mac, Linux)
  • Security Vulnerability Management, in addition to Application Inventory, for details of 3rd party applications that have known vulnerabilities mapped to the MITRE CVE cybersecurity database
  • Secure Remote Shell support for direct endpoint access by event responders and forensics personnel
  • Autonomous SentinelOne agent Storyline Engine
  • Combined Static AI and SentinelOne Cloud Intelligence file-based assault prevention
  • Behavioral AI fileless attack detection
  • Autonomous Threat, Remediation, and Rollback Response
  • Quarantine device from system, Incident Analysis, Agent Anti-tamper, Application inventory
  • Rogue device discovery
The SentinelOne Singularity Complete Package
The SentinelOne Complete Package has all the basic capabilities and works with the extra functions of the Control bundle and adds single-agent enterprise-grade endpoint detection and response, hunting for all endpoints, cloud, and IoT. The bundle eliminates substantial time for cybersecurity administrators, security operations center (SOC) analysts, cyberthreat hunters, and incident responders by automatically correlating events and mapping it into the MITRE ATT&CK framework to determine root causes. The SentinelOne Singularity Complete Package offers a powerful EDR feature set:
  • Co-Managed environment with Progent receiving alarms and notices of all activities in your environment. Clients are responsible for reacting to threats in their environment and optional support time and material is available from Progent's security experts
  • ActiveEDR Advanced provides visibility of all non-threatening data.
  • ActiveEDR Advanced provides high-level threat hunting. SentinelOne is differentiated by the the ease-of-use personified by the active nature of the solution in autonomously reacting to threats.
  • Storyline technology for Automated Forensics and quick root cause analysis. All OS storylines are automatically contextualized with SentinelOne’s patented TrueContext function, simplifying analysts' laborious task of event correlation before they can arrive at root causes with reduced MTTR.
  • Storyline Active Response (STAR) mitigates zero-day threats with customized detection and hunting rules.
  • Deep visibility Storyline Pivot and Hunt technology by MITRE ATT&CK technique
  • EDR Hunting Data storage ranging from 14 days standard to 365 days optional
  • Timelines, file fetch, file integrity monitoring, sandbox integrations
  • Other response options are available and customized to your needs. Includes one hour of training in key features and day-to-day management of the SentinelOne portal. During this time, Progent will train in the creation of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts.
Options for the SentinelOne Complete Package package include adding software-defined network discovery and aggregated active/passive device mapping through SentinelOne's Vigilance with MDR package plus elimination of agent installation gaps with configurable job automation. Progent also offers optional monthly client portal checks and threat cleanup advice.

Complete with Vigilance Respond Managed Detection and Response (MDR) Services
Vigilance Respond and Vigilance Respond Pro are optional Managed Detection and Response services for subscribers to the Singularity Complete bundle. These bundles include digital forensics and full 24x7x365 incident response delivered by Tier-1, Tier-2, and Tier-3 IT security experts. Vigilance Respond services include validation of threats, event prioritization, false positive management and dashboard cleanup, proactive threat deactivation, management reporting, SLAs, and escalation back to the customer's cybersecurity organization.

Vigilance MDR analysts classify detected threat notifications according to a hierarchy going from Benign False Positive to Urgent True Positive. This ranking dictates how the analyst handles the threat. There are five categories of threats and consequent responses. The majority of alerts do not require action by the customer.

Benign Alert - False Positive
Vigilance takes care of the issue and updates the SentinelOne console. For single False Positive alerts, no additional actions or notifications are required. For repeated False Positive alerts, Vigilance will escalate the issue to the client to offer or approve an appropriate exclusion or agent update as required.

Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program
Vigilance takes action to ensure the threat is blacklisted, resolved, and annotated. Usually, no alert will be sent to the client unless the issue requires additional work.

Malicious Alert - True Positive / No Action Needed
Vigilance performs appropriate actions including remediation to ensure the threat is isolated. Once the analyst confirms the threat is eliminated, the analyst will transmit a verification notice to the customer.

Malicious Alert - True Positive Non-Urgent / Action Needed
Vigilance performs proper actions including remediation to make sure the threat is isolated. Once the analyst confirms the threat is deleted, the analyst will send a confirmation alert to the client. Follow-up procedures such as re-imaging may be necessary in some cases.

Malicious Alert - True Positive Urgent / Action Necessary
Vigilance may react strongly in serious breach incidents including pursuing agent remediation actions and disconnecting affected network endpoints to stall the attack and block additional lateral movement and spread. The analyst will send an urgent alert apprising the customer of the issue and ask for immediate response.

In addition to providing all the features of SentinelOne Control and SentinelOne Complete, SentinelOne Complete with Vigilance MDR adds round-the-clock Monitoring with Immediate Threat Response, Remote Script Orchestration, and Ranger:

  • Co-Managed Solution with Progent receiving alerts and notifications of all threats and activities in your system and combined SOC response, offering 3 levels of 24x7x365 Detection and Response. All threats are mitigated and responded to in near real-time. Additional remediation alternatives following threat mitigation are offered and customized to meet your individual requirements.
  • Remote Script Orchestration enables enterprises to send scripts to a single machine, several machines, or even millions of machines, to respond to present and future cyberattacks instantly. Security Teams can dispatch custom scripts or choose from a broad selection of tasks – ranging from incident response to forensics artifact collection and even IT administration. In conjunction with SentinelOne Storyline Active Response (STAR), analysts can save time with automated workflows that take incident response to a higher level.
  • Ranger allows unparalleled visibility into your system. Ranger is network-efficient by intelligently designating a few SentinelOne agents for each subnet to undertake network mapping activity. Selected "Rangers" passively track network broadcast data including ARP, DHCP, and other network observances. Admins can modify active scan policies and select multiple IP Protocols for machine learning including ICMP, SNMP, UDP, TCP, SMB, and others. Rangers correlate all collected information within the backend to fingerprint known and unknown devices. Ranger device inventories show what is connected to your system, where they are connected, and which protocols the devices listen on. Ranger allows you to discover and eliminate SentinelOne Agent deployment gaps using Ranger Deploy, a peer-to-peer deployment (Windows, Mac, Linux). Ranger allows you to determine how unknown devices communicate with managed hosts and isolate suspicious devices from managed devices with a click.
Includes 1 hour of training in advanced features and routine management of the SentinelOne portal. During this time, Progent will train customers in the creation of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts. Progent offers custom additional training for your company's requirements on a time and materials basis.

Download Progent's SentinelOne Singularity Packages Datasheets
Download datasheets describing Progent's SentinelOne Singularity products and services:

The Progent Advantage
Progent's roster of more than 150 consultants includes certified experts in every facet of information technology associated with small and mid-size businesses. With this scope of knowledge, Progent can be your single point of contact for integrating a comprehensive security solution that delivers immediate business value. In addition to the endpoint protection available from SentinelOne products, Progent offers a catalog of managed services and specially-priced IT support packages designed to assist small and mid-size businesses to plan, implement, test, and manage networks that deliver enterprise-level security and low TCO.

Progent offers in-depth experience with all the endpoint devices, servers and virtual machines that can be secured by SentinelOne products. Progent offers services that include Windows 11 migration expertise, Windows 10 management, Linux integration, Mac OS X and macOS support, iPhone and iPad consulting, Android consulting, Windows Server 2022 integration expertise, Windows Server 2019 migration expertise, Hyper-V virtualization consulting, and VMware vSphere support consulting.

For single-click or manual rollback capability, Progent's Windows Server consultants can assist you to configure Windows Volume Shadow Copy Service (VSS). Progent also offers online and onsite access to certified Cisco CCIE experts to assist you to plan, defend or optimize your infrastructure. If your network incorporates cloud resources, Progent offers the support of Microsoft Azure experts, Amazon AWS consultants, and Google Cloud integration experts.

Contact Progent about SentinelOne Sales and Configuration Services
To learn more about how Progent can help you to purchase or integrate SentinelOne products, call 1-800-993-9400 or visit Contact Progent.



An index of content::

  • 24 Hour Remote Help Desk System Consultants Gainesville Alachua, USA Urgent Network Network Consultant Gainesville, FL
  • 24x7x365 Alexandria, Virginia Solution Providers Alexandria-Falls Church Network Solutions

  • CRISC Certified Integration Support
    Consultant Services Risk Response

    Progent's disaster recovery planning and business continuity consultants can help you design a disaster recovery plan in case of an IT network disaster. Progent can show you how to define a complete disaster recovery plan that includes scheduled disaster recovery evaluations and drills. Progent's Microsoft and Cisco-certified engineers can also show you how to create an affordable, fault-tolerant system solution that takes into account reliability issues involving a broad array of network technologies and procedures.

  • Antioch CA Windows Security Computer Network Support Company Microsoft Computer PC Consulting Walnut Creek Contra Costa County
  • Arkansas - Little Rock, AR, Fort Smith, AR, Fayetteville, AR, Jonesboro, AR SharePoint Software Consulting Contractor SharePoint Arkansas
  • At Home Workers Assistance in Alexandria - VoIP Technology Consultants Alexandria, Capital Beltway, USA Remote Workers Alexandria Guidance - VoIP Solutions Guidance

  • Security Group Barracuda Networks
    Barracuda Networks F12A Series Firewalls Cybersecurity Firms

    Barracuda's value-priced CloudGen Firewall devices offer web filtering, safe remote access, SSL tunnel VPN, high-security SD-WAN, and modern Zero-Trust protection along with centrally managed and monitored services encompassing your complete enterprise including on-premises, cloud, and hybrid deployment models. Public clouds supported include Microsoft Azure, AWS, and Google Cloud Platform (GCP). Progent has the skill to serve as your single source for technical support, administration, training, and security consulting.

  • Baltimore BlackBerry Desktop Manager Implementation Consulting Companies Computer Consultants BlackBerry BPS Baltimore
  • Beverly Hills Hermes Crypto-Ransomware Recovery Beverly Hills-Westwood, California Beverly Hills Lockbit Crypto-Ransomware Data-Recovery Beverly Hills-Bel Air, California
  • BlackBerry BPS Network Specialist São José dos Campos, Estado de São Paulo BlackBerry Redirector Computer Consulting Company
  • Botafogo, Ipanema Remote Workers Ipanema Consulting - Data Protection Systems Consulting Services Ipanema, Estado do Rio de Janeiro Top Ipanema Offsite Workforce Backup Systems Consulting and Support Services
  • Broomfield Ransomware Removal Help Broomfield-Thornton, CO 24-Hour Broomfield Crypto Removal Support Services Broomfield, Colorado
  • Calgary Netwalker Crypto-Ransomware Mitigation Calgary, Alberta Calgary Locky Crypto-Ransomware Data-Recovery
  • Cambridge Remote Workers Infrastructure Consulting and Support Services Cambridge Cambridge At Home Workers Setup Consulting and Support Services Peterborough
  • Catalyst Switch Upgrade Consultant Services CCDP Expert Certified Catalyst 3560 Switch Troubleshooting

  • Migration Online Cisco Certified CCIE
    Cisco CCIE Remote Network Consultants

    Progent's Cisco CCIE network experts can help your business to configure, manage, update and troubleshoot Cisco products. Progent offers Cisco, Meraki and Nexus switch support, ASA firewall expertise, Meraki and Aironet Wi-Fi access point consulting, Cisco IP phone support, and CUCM/CallManager software consulting.

  • Charleston County South Carolina At Home Workers Charleston Consultants - Setup Consulting Services At Home Workers Charleston Assistance - Integration Assistance Charleston County South Carolina
  • Cisco Certified Expert Tulsa Network Specialists CISA Certified Security Expert Tulsa, OK Network Consulting Organization
  • Computer Support Subcontractor Lafayette, CA, United States Computer Consultant Contract Lafayette, CA
  • Consulting Support for IT Service Providers near Minnetonka - Seamless Short-Term Support Staff Assistance Minnetonka Consulting Experts for Computer Support Organizations Minnetonka-Bloomington
  • Design Firm .NET VBA Expert Microsoft Certified .NET Blazor Integration Firm
  • Georgia - Atlanta, GA, Augusta, GA, Columbus, GA, Savannah, GA Technical Consultant Georgia Online Help

  • Hosting Facility Online Troubleshooting
    Network Architecture Information Technology Support

    For large businesses, Progent can supplement in-house IT staffs by offering extensive background in supporting key Microsoft and Cisco technologies. Progent's certified experts can provide Enterprise Active Directory consulting, Exchange Server 2010 integration, SharePoint experience, and Microsoft SQL Server consulting. For the national or worldwide businesses with branch offices, Progent can perform as a seamless nearby extension of corporate IT management. Progent's enterprise support services include corporate-wide security, remote branch office support, network architecture, Sarbox conformance, project planning, and world-class support for multi-site network environments powered by Enterprise Windows. Progent can offer on-site engineers and specialists to assist with a site relocation or branch move, or a network designer to assist with building or using an Internet Data Center or co-location site.

  • Hornetsecurity Altaro M365 OneDrive Backup On-site Technical Support Hornetsecurity Altaro M365 Teams Chat Backup Specialist

  • Top Rated Specialist Cybersecurity Inventory
    Consulting Internal Cybersecurity Inventory

    Progent provides small businesses two specially designed network security inventory scanning packages that provide, for a preset price, remotely managed scans of your security profile which are evaluated by professional security engineers who assess the results of the scan, deliver unbiased evaluations of your current network security, and offer suggestions for remediation. Progent offers two non-overlapping network security inventory scanning packages for external and internal scanning that are priced to fit the budgetary realities of small companies while delivering enterprise-quality evaluations of your network's exposure to assault.

  • ISSAP Consultant Telecommuter Job San Diego, CA Computer Engineer Jobs
  • Microsoft Exchange Server 2007 Outsourced IT Support Tlaquepaque Design Exchange Server 2013 Guadalajara Mexico, U.S.A.
  • SentinelOne Ransomware Recovery Specialists
  • Microsoft SQL 2008 Network Security Consulting SQL 2014 Computer Network Support Company Rancho Cordova
  • Microsoft Windows Server 2016 IT Consulting Firms Windows 2019 Server Consultancy Erie County New York

  • Cisco Router Computer Installation
    Cisco Remote Access System Support

    Progent's Cisco CCIE-certified network infrastructure consultants have extensive background assisting Internet Service Providers to architect, implement, manage, tune, and debug fault-tolerant, scalable network solutions suitable for shared public networks.

  • Minneapolis Offsite Workforce Call Desk Augmentation Expertise Minneapolis Hennepin County Top Quality Work from Home Employees Minneapolis Consulting - Call Desk Solutions Consultants Minneapolis, United States
  • Mobile Phobos Crypto-Ransomware Business Recovery Mobile Alabama Mobile Snatch Ransomware System-Restoration Mobile County Alabama, U.S.A.
  • Morgan Hill Gilroy System Consulting CISA Certified Security Expert IT Consultants Morgan Hill, CA
  • Network Specialists Cisco Midland County Texas 24/7 IT Service Providers Cisco Midland Odessa
  • Open Now Phoenix Ransomware DopplePaymer Vulnerability Audit Phoenix Arizona, USA Phoenix Ransomware Infection Susceptibility Consultation Phoenix Arizona

  • Skype for Business conference bridges Consultant
    Specialist Skype for Business dial plans

    Lync 2010 provides IM, Presence, audio and video conferencing, desktop sharing, as well as VoIP and traditional PSTN calling. Lync 2010 can extend the functionality of Exchange, SharePoint Server and Office desktop or cloud-based Microsoft 365 and streamlines management via integration with Windows AD. Lync can also cut capital and operational costs by eliminating Voice-over-IP equipment and subscription services, PBX gear, or legacy teleconferencing technology. Progent's Microsoft-certified IM and Presence experts can provide remote and on-premises support services to assist you to maintain and troubleshoot your existing Lync Server 2010 environment or evaluate the benefits of upgrading from Lync Server 2010 to Skype for Business, which is the new version of the product family. Progent can also assist you to plan and carry out an efficient Skype for Business migration or a migration to Microsoft Teams.

  • Pacific Grove Onsite Technical Support Seaside Experts
  • Remote Workers Calgary Consulting and Support Services - IP Voice Solutions Consulting Experts Calgary, AB Calgary Work from Home Employees Consulting Services near Calgary - VoIP Technology Expertise
  • Remote Workers Montgomery Expertise - Collaboration Solutions Consulting Experts Montgomery Montgomery Alabama Montgomery At Home Workforce Collaboration Technology Consulting Services
  • SQL Server 2014 Implementation Nashville Tennessee Microsoft SQL 2014 Information Technology Support
  • SQL Server 2019 Integration Consultant Aptos, CA SQL Server 2014 Information Technology Consulting Company Aptos, CA

  • Remote Workforce Security Technology Consulting Services
    Integration At Home Workers Cybersecurity

    Progent can assist small and mid-size organizations to set up endpoint device security defense systems and provide mitigation expertise for teleworkers.

  • San Isidro District Lima Sodinokibi Ransomware Settlement Negotiation Consultants Top Lima Crypto-Ransomware Negotiation Experts
  • Santa Ana-Garden Grove Tech Consulting Santa Ana-Costa Mesa Information Technology Support

  • Network Integration Mobile Laptop
    Telecommuting Small Business IT Consulting Firm

    Progent's remote connectivity and smartphone synchronization experts can assist your business to plan and configure connectivity solutions for off-site desktop PCs, notebooks, and wireless handhelds so they work seamlessly with your IT network, allowing your business to improve the efficiency of your remote workforce.

  • Scotts Valley Technical Support Company Scotts Valley Technical Consulting
  • Slackware Linux, Sun Solaris, UNIX Setup and Support Cleveland, Cuyahoga County On-site Support Slackware Linux, Solaris, UNIX Cleveland
  • Small Office Computer Consultant Fremont Newark On-Call Services
  • Small Office Networking Consultant Small Business Computer Tech
  • Stockton Snatch Ransomware System-Restoration Stockton, CA Stockton MongoLock Crypto-Ransomware Business Recovery Stockton, America
  • Technology Professional Hybrid cloud 24x7 Hybrid cloud integration Engineer
  • The Woodlands, Texas Work at Home Employees The Woodlands Consulting Services - Set up Assistance Work from Home Employees The Woodlands Consulting Experts - Solutions Consulting
  • Work at Home Employees Consulting Experts near me in Corpus Christi - Help Desk Call Center Augmentation Consulting Services Corpus Christi Texas Teleworkers Corpus Christi Consulting - Help Desk Solutions Consultants
  • Work from Home Employees Memphis Assistance - Voice/Video Conferencing Technology Guidance Memphis, TN Award Winning Memphis Telecommuters Voice/Video Conferencing Systems Assistance Memphis Bartlett Germantown Collierville

  • VPN Support and Integration
    Computer Consultants VPN

    Cisco's network security and offsite access technology for small companies represent a full range of easy-to-administer security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes experienced engineers with Cisco CCIE and Cisco Certified Network Professional certifications who are able to assist your company to evaluate Cisco VPN, Cisco RADIUS Security, Cisco Aironet and Meraki Wi-Fi access points, and additional Cisco security solutions that align most closely with your company objectives.

  • Zero Trust Security Network Engineer Identity Verification Online Consulting
  • Engineer SentinelOne Ransomware Defense

  • © 2002-2025 Progent Corporation. All rights reserved.