SentinelOne Reseller and Solutions ExpertsSentinelOne's Singularity portfolio is a subscription-based, cloud-centered threat defense platform that features AI algorithms and professional services to deliver enterprise-class endpoint detection and response. SentinelOne's compact agents can be installed in minutes to guard popular endpoints against increasingly sophisticated cyberthreats including ransomware, familiar and zero-day malware, trojans, hacking tools, RAM exploits, malicious scripts, invasive macros, and living-off-the-land (LotL) abuse. SentinelOne software agents are available for Windows, Mac, Linux, and Kubernetes powered endpoints. Supported form factors include physical, virtual, VDI desktops, customer and hybrid data centers, and cloud providers. Since SentinelOne software agents are autonomous, they are able to provide advanced behavior-based security in real time even when endpoints are not interfaced to the cloud.

Progent is a SentinelOne Partner and reseller and oversees thousands of endpoints secured by SentinelOne Singularity technology. SentinelOne Singularity is invariably the initial EDR response tool deployed by Progent to provide control and visibility of a client's system in the first stages of a ransomware breach. SentinelOne Singularity is also the key technology powering Progent's Active Security Monitoring managed services. SentinelOne has been ranked as a leading visionary in Gartner's 2021 Magic Quadrant for Endpoint Protection Platforms and scored the highest number of analytic detections in real-time with zero delays during the gold-standard MITRE ATT&CK Evaluation.

Singularity Packages for SentinelOne Endpoint Security
SentinelOne's Singularity product line includes three levels of endpoint security product bundles provided as a global cloud-based platform that delivers high availability, hierarchical policy management by site and group, AI powered threat intelligence, fast recovery, and an information-driven dashboard for security analytics. Packages consist of Core for basic protection, Control for enhanced management, and Complete for automated forensics. The product tiers are additive. Control and Complete each have all the features of the level below it. Pricing starts at $5 per endpoint per month for small customers with substantial discounts for larger deployments. Progent has no minimum device count.

SentinelOne Singularity Core offers traditional AV and next-generation anti-virus support and delivers rudimentary Endpoint Detection and Response. Standard features of Singularity Core include:

  • Autonomous Sentinel agent Storyline technology
  • Built-in static AI and SentinelOne Cloud Intelligence file-based attack defense
  • Behavioral AI to identify fileless attacks
  • Autonomous Threat Response / Delete, Quarantine (Win, Mac, Linux)
  • Autonomous Remediation Response / 1-Click, no scripting (Win, Mac)
  • Autonomous Rollback / 1-Click, no scripting (Win)
  • Isolate endpoint from network
  • Incident Analysis (MITRE ATT&CK, timeline, team annotations)
  • Sentinel agent anti-tamper
  • Application inventory
Options for the Singularity Core bundle include global network visibility and advanced network device fingerprinting through SentinelOne's RANGER bundle, elimination of agent deployment gaps with p2p job automation via SentinelOne's RANGER PRO package, rogue device identification, and cloud workload security for Kubernetes and virtual machines via SentinelOne's Cloud package. (Note: SentinelOne Singularity Core is not currently sold by Progent. This package does not by itself provide the threat visibility features needed by Progent to co-manage the cybersecurity of the customer deployment.)

Singularity Control includes all the standard features and supports all the add-ons of the Core bundle and adds capabilities for enhancing device management including secure remote shell, firewall control with location awareness (Win, Mac, Linux), device control for USB and Bluetooth/BLE peripherals (Win, Mac), and application vulnerability management.

Options for the Singularity Control package include isolation of suspicious and malicious devices using the Singularity RANGER package plus automated app management for containers through SentinelOne's Singularity Cloud bundle.

Singularity Complete comes with all the basic capabilities and works with all the options of the Control bundle and adds single-agent world-class prevention, detection, reaction and hunting across endpoints, cloud, and IoT. This high-end package saves substantial work for security administrators, Security Operations Center analysts, threat hunters, and incident responders by correlating events and mapping it into the MITRE ATT&CK database to expose root causes. Complete offers an advanced EDR feature set that includes:

  • Storyline technology with auto correlation and contextualization of alerts for fast forensic analysis (RCA)
  • SentinelOne's Storyline Active Response (STAR) to mitigate surfacing zero-day threats with customized, automated rules for detection and hunting
  • Built-in ActiveEDR visibility to benign as well as harmful data
  • Storyline hunt and pivot utilizing MITRE ATT&CK technique
  • EDR Hunting Data retention periods from two weeks (standard) to 365 days (special option)
  • File integrity checking
  • Timelines, remote shell, sandboxing for additional dynamic analysis
Add-in features for SentinelOne's Singularity Complete package include Cloud Funnel for copying telemetry from the cloud to your own data lake, the capability to send harmful and harmless executables to the cloud for automated inspection, and automated application control for Linux VMs.

Vigilance Respond Managed Detection and Response Services
Vigilance Respond and Vigilance Respond Pro are add-on Managed Detection and Response programs for subscribers to the Singularity Complete bundle. These bundles include full 24x7x365 incident response provided by Tier-1, Tier-2, and Tier-3 cybersecurity professionals. Vigilance Respond services include validation of threats, event prioritization and triage, false positive handling and dashboard updating, threat containment, management reporting, SLAs, and escalation back to the client's cybersecurity organization. Subscription pricing averages around $17 per endpoint per month and there is no minimum device count.

Vigilance Respond Pro includes a 2x faster SLA, assigned IR case managers, root cause analysis (RCA), incident-driven threat hunting, digital forensics investigation, expert containment, comprehensive security assessment including threat actors trends, plus post-mortem analysis. In almost all cases, Vigilance Respond Pro resolves threats in minutes and only gets in touch with clients for urgent matters. Because these services typically do not call for the activity from the Vigilance Respond client, customers can focus on strategic tasks instead of routine cybersecurity issues.

Vigilance MDR analysts rank detected threat notifications based on a hierarchy going from Benign to Malicious Urgent. This classification determines how the Vigilance analyst manages the threat. There are five categories of threats and associated responses. The majority of alerts require no action by the client.

Benign Alert - False Positive
Vigilance takes care of the issue and annotates the SentinelOne dashboard. For isolated False Positive alerts, no additional responses or notifications are necessary. For persistent False Positive alerts, Vigilance will escalate the issue to the client to submit or approve a proper exclusion or agent update as needed.

Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program (PuP)
Vigilance takes action to make sure the threat is blocklisted, resolved, and documented. Typically, no notification will be transmitted to the client unless the threat calls for follow up activity.

Malicious Alert - True Positive / No Action Necessary
Vigilance takes proper actions including remediation to make sure the threat is quarantined. Once the analyst confirms the threat is deleted, the analyst will send a confirmation alert to the customer.

Malicious Alert - True Positive Non-Urgent / Action Needed
Vigilance performs proper actions including remediation to ensure the threat is isolated. Once the analyst confirms the threat is eliminated, the analyst will send a verification notice to the customer. Subsequent activity such as re-imaging may be necessary in some circumstances.

Malicious Alert - True Positive Urgent / Action Necessary
Vigilance may react aggressively in serious breach cases including taking agent remediation actions and isolating compromised network endpoints to stall the attack and block additional lateral progress. The analyst will send an urgent notification apprising the customer of the issue and request immediate response.

Download Progent's Singularity Control and Complete Comparison Datasheet
To see a one-page datasheet in PDF format comparing SentinelOne's Singularity Control and Singularity Complete EDR packages, click:
Progent's Singularity Control and Singularity Complete EDR Comparison. (PDF - 340 KB)

Why Progent?
Progent's roster of over 125 consulting professionals includes certified experts in every aspect of information technology associated with small and mid-size organizations. With this breadth of knowledge, Progent can be your single point of contact for integrating a cohesive security solution that delivers significant business value. In addition to the endpoint protection provided by SentinelOne products, Progent offers a variety of managed services and affordably-priced IT support packages created to assist small and mid-size businesses to design, implement, test, and administer networks that feature enterprise-class cybersecurity and low total cost of ownership.

Progent has in-depth experience with all the endpoints, servers and VMs that can be protected by SentinelOne products. Progent can provide services that include Windows 11 planning and migration expertise, Windows 10 management, Linux integration, Mac OS X and macOS support, iPhone and iPad integration, Android consulting, Windows Server 2022 migration expertise, Windows Server 2019 integration consulting, Hyper-V virtualization expertise, and VMware vSphere configuration experts.

For single-click or manual rollback, Progent's Windows Server consultants can assist you to configure Windows Volume Shadow Copy Service (VSS). Progent can also provide online and onsite access to certified Cisco CCIE experts to assist you to design, defend or optimize your infrastructure. If your network incorporates cloud resources, Progent offers the guidance of Microsoft Azure consultants, Amazon AWS experts, and Google Cloud integration experts.

Contact Progent about SentinelOne Sales and Integration Services
To find out more about how Progent can assist you to buy or configure SentinelOne products, call 1-800-993-9400 or see Contact Progent.



An index of content::

  • Award Winning Firewall Protect Sacramento Sacramento CISSP Firewall Support

  • NetDocs ndMail Engineer
    NetDocs Migration Consultants

    NetDocuments (NetDocs) is a cloud-based document management system (DMS) designed specifically for the legal profession. Progent offers remote access to NetDocuments consultants who can assist legal departments and law firms to plan, deploy, manage, tune, or debug a document management system (DMS) solution based on NetDocuments.

  • Birmingham Work at Home Employees Management Systems Assistance Jefferson County Alabama Birmingham Teleworkers Endpoint Management Tools Expertise Jefferson County Alabama

  • Internal Network Security Inventory Engineers
    Security Scan Consultants

    Progent has put together two low-cost service packages designed to allow small companies to get a professional security assessment from a premier security engineer. With Progent's External Security Inventory Checkup, a security engineer administers a comprehensive test of your IT infrastructure from outside your company firewall to determine potential weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security engineer runs a system scan from an authorized computer inside your firewall to uncover the risk to inside attacks. Both security inventory packages are configured and executed from a protected external site.

  • Chatsworth Sodinokibi Ransomware Negotiation Consulting Chatsworth-Woodland Hills Top Ranked Chatsworth Lockbit Ransomware Settlement Support Chatsworth

  • Open Now On-site Technical Support Exchange 2007 Edge Server
    Support and Integration Exchange Server 2007

    Progent's Microsoft certified consultants can help you design and implement a smooth in-place Microsoft Exchange 2007 migration plan that avoids network downtime, reduces ongoing support requirements, and makes your Microsoft Exchange 2007 Server easy to manage. For complicated multi-server or multi-location upgrades, Progent has the experience to complete your move rapidly and affordably. Progent's Microsoft Exchange 2007 support, troubleshooting, and consulting offerings include assistance with the configuration of outside vendor enhancements of Exchange 2007 Server and the creation of unified messaging implementations powered by Microsoft Exchange 2007 Server.

  • Cisco Software Outsourcing Consultant Richmond Piedmont Cisco Consulting Organization Chesterfield County Virginia
  • Detroit-Dearborn Tech Consultant 24 Hour Detroit-Sterling Heights Implementation
  • Greensboro Winston-Salem Greensboro Ransomware Hermes Susceptibility Consultation Greensboro Ransomware Testing Greensboro Piedmont Triad
  • Hayward Conti Ransomware Rollback Castro Valley, CA Hayward Ryuk Ransomware Removal
  • IT Outsourcing Consulting Services Firm Small Business IT Outsourcing Group Microsoft Exchange Dayton Centerville Trotwood, USA
  • Immediate Vancouver Crypto Remediation Vancouver Vancouver WannaCry Crypto Removal Vancouver , British Columbia
  • Immediate Work at Home Employees Consulting Services nearby Plano - Backup/Recovery Solutions Consulting and Support Services Plano Plano Telecommuters Backup/Recovery Systems Expertise
  • Joinville Avaddon Ransomware Settlement Negotiation Services Joinville Joinville DopplePaymer Crypto-Ransomware Negotiation Consulting Joinville, SC
  • Lakeland Crypto-Ransomware Locky Vulnerability Audit Lakeland Lakeland Ransomware Avaddon Vulnerability Checkup Lakeland-Lakeland, Florida
  • Liverpool IT Staffing Services Liverpool, North West England Liverpool IT Staff Augmentation Support Liverpool, North West England
  • Lockbit Ransomware Hot Line Long Beach, CA Long Beach Southern California, America Top Quality Sodinokibi Ransomware Hot Line
  • Microsoft MCA Consulting Employment Opportunities Lexington, KY Microsoft MCA Engineer Careers Lexington Blue Grass Airport LEX, United States
  • Microsoft Windows 10 Configuration Manager Technology Professional Windows 10 Configuration Online Technical Support
  • Morgan Hill, California Computer Network Consultant Morgan Hill Hollister Computer System Consultant
  • Network Specialists BlackBerry Software Livermore, CA, United States BlackBerry Professional Software IT Outsourcing Pleasanton California, US
  • Oakland Oakland Ryuk Crypto-Ransomware Counter-Measures Emergency Oakland DopplePaymer Crypto-Ransomware Removal Union City CA

  • Emergency Non-stop Network Support Services
    Consulting Services Fault Tolerant Interoffice Connectivity

    Progent's high availability network experts offer non-stop computing support, disaster recovery planning, network load balancing, fault-tolerant interoffice connectivity, 24x7 Internet architecture design, 24x7 data center support, and other 24x7 operations support to help your organization configure a 24x7 network for mission-critical applications. Progent possesses the knowledge and experience to design economical, 24x7 systems by deploying the expanding suite of Windows Cluster servers such as Microsoft Windows 2003 Cluster Server, Microsoft SQL Server Cluster, and Microsoft Exchange Cluster. Progent's Microsoft and Cisco certified consultants can show you how to you design a fault tolerant mutli-site network with a fully redundant Internet connection and intelligent system load balancing.

  • Online Consulting Ubuntu Linux, Solaris, UNIX Estado do Paraná Engineer Suse Linux, Sun Solaris, UNIX Londrina
  • Parsippany-Wayne, NJ, United States At Home Workforce Consulting Services nearby Parsippany - Video Conferencing Solutions Consulting Experts Work at Home Employees Assistance near Parsippany - Voice/Video Conferencing Solutions Consulting
  • SentinelOne Behavior-based Antivirus Consultant Services
  • Phoenix Microsoft SQL 2014 Outsourced IT Support SQL Server 2012 Integration Group
  • Pomona California Award Winning Microsoft Exchange Computer Help 24x7 Urgent Network IT Solution Providers Pomona, County
  • Providers SQL Indianapolis, Fort Wayne, Gary, IN, USA Indiana Small Business Network Support SQL
  • SentinelOne Singularity Complete Integration Technology Professional
  • Ransomware Business Recovery Chandler Ransomware Removal and Data Restore

  • Symantec Security Cybersecurity Company
    24x7 Symantec VPN Network Security Evaluation

    Progent's Symantec experts can help you support legacy Symantec firewall and VPN products such as the Raptor and VelociRaptor line or help you upgrade to newer firewall/VPN technology. Progent can also enable you to design and implement a complete security strategy that can incorporate firewall/VPN devices and utilities, outsourced security and network protection services, system monitoring software, and formal policies and processes. Progent has the expertise to be your one-stop resource for continuing technical support, maintenance, education, and security consulting.

  • Remote Teleworkers Consulting Services - Durham - Infrastructure Consulting Experts 24-7 Durham At Home Workers Setup Consulting Services Durham, NC
  • Remote Troubleshooting BlackBerry Synchronization Lower Manhattan-Lower Manhattan, New York Design Companies BlackBerry Desktop Manager Manhattan-Downtown, NY
  • Riverside Egregor Crypto-Ransomware Business Recovery Riverside - Chino Riverside Egregor Ransomware Repair Riverside - Chino

  • Cisco CCIE Remote Setup Consultancy Services
    Computer Network Support Firms Cisco

    Progent's Cisco CCIE network infrastructure experts can assist your business to configure, manage, update and debug Cisco products. Progent offers Cisco, Meraki and Nexus switch consulting, ASA firewall expertise, Meraki and Aironet Wi-Fi access point support, Cisco IP phone expertise, and CUCM/CallManager software consulting.

  • Roseville-Granite Bay, CA Roseville Remote Workers Connectivity Solutions Consulting Services Offsite Workforce Guidance - Roseville - Integration Solutions Assistance Roseville-Rocklin, CA

  • Development Firm Amazon Marketplace Web Service programming
    Amazon Marketplace Web Service integration Developer

    Amazon Marketplace Web Service is a library of APIs that enables Amazon sellers to improve the efficiency of their operations by automating crucial sales functions including listings, orders, payments, inbound and outbound fulfillment, and reports. By tapping into Amazon's vast online ecosystem and automating their sales processes, vendors can expand their reach, lower their operating costs, improve response time to customers, and increase their bottom line. Progent's Amazon Marketplace Web Service developers can collaborate with your development team and provide programming, workflow integration, project management support, and training to help you cut development time and costs and speed up your return on investment.

  • Sandy Springs-Fulton County Troubleshoot Sandy Springs Server Consultant
  • Savannah Maze Ransomware Cleanup Savannah Garden City Savannah Netwalker Ransomware Business Recovery Savannah, GA
  • SharePoint Server 2019 Network Consulting Salt Lake City, Tooele County SharePoint 2010 IT Services
  • SharePoint Server 2019 Professional Toronto-Mississauga Microsoft SharePoint IT Consultants Mississauga

  • Engineer Lync Server 2013 Mobility Services
    Lync Server 2013 Reverse Proxy Server Technology Professional

    Lync 2013, rebranded Skype for Business, allows businesses of all sizes to build a centrally managed and protected communications ecosystem that permits the modern Bring-Your-Own-Device computing style with instant messaging, presence, audio/video and web conferencing with application sharing, as well as IP-based and PSTN telephony enabled for a broad range of desktop and mobile clients. Progent's Microsoft-certified Lync Server 2013 consultants and system architects can help you to assess the business benefits of Lync 2013, create an in-house, cloud-based (with Lync Online) or hybrid topology appropriate for your current and long-term plans, deploy Lync 2013 in a way that expedites your ROI, and deliver custom online and on-premises training to your IT team and users. Progent offers in-depth expertise in critical components of a Lync Server 2013 deployment including Windows Server, SQL Server and Exchange, and Progent can assist you to combine Lync Server 2013 with popular Microsoft Office and Microsoft 365 applications such as Outlook and PowerPoint.

  • Southfield Offsite Workforce Help Desk Outsourcing Assistance Southfield-Livonia, MI 24/7 Southfield Teleworkers Call Desk Augmentation Consulting and Support Services

  • Solaris Cybersecurity Companies
    Emergency Solaris Consultant

    If your business has a Sun Solaris network or a multi-OS network, Progent's CISM and ISSAP-premier consultants can assist your whole enterprise in a wide range of security areas such as security administration practices, security architecture and models, connection control systems and methodology, software development security, business processes security, physical security, communications, infrastructure and Internet security, and workplace recovery preparedness. CISM, CISSP and ISSAP define the core skills and international standards of performance that information security professionals are required to possess. These accreditations provide IT management the confidence that those who have achieved their CISM, CISSP or ISSAP certification have demonstrated the experience and knowledge to deliver world-class security management and consulting services.

  • Systems Engineer Cisco Portland, Oregon Technology Consulting Cisco Portland, OR, Salem, OR, Eugene, OR, Gresham, OR
  • Telecommuters Consultants near me in Fort Collins - VoIP Solutions Consulting Fort Collins Colorado Fort Collins Work from Home Employees VoIP Systems Consulting Services Larimer County Colorado

  • Consultant Windows Server 2022 Azure Arc
    Windows Server 2022 Secured-core server Technical Support

    Progent's Microsoft Gold-certified Windows Server 2022 consultants can help your organization to design and implement a cost-effective migration to Windows Server 2022 using a self-hosted deployment architecture or a hybrid model that combines cloud-hosted Windows Server on Azure with an on-site implementation of Windows Server 2022.

  • Toronto MongoLock Ransomware Mitigation Toronto Top Toronto Spora Crypto-Ransomware Rollback Mississauga

  • Consult Linux RedHat Phone-based
    Linux Phone-based Small Business Network Support

    Progent offers nationwide online phone support and troubleshooting services for businesses who operate networks powered by variants of Linux or whose information systems include a combination of Linux platforms/Linux and Microsoft Windows technology. Remote technical support offers maximum leverage for your IT budget by extending client efficiency and limiting the hours charged for network analysis and repair. Advanced remote access technology and experienced technicians and engineers combine to enable Progent to solve the majority of network issues without wasting time and money by traveling to your location. In the vast majority of cases your IT issues can be remediated by telephone or via a combination of phone help and online connectivity. Progent can make available Cisco CCIE network experts and CISA and CISM certified security specialists to help you with the most difficult network issues.

  • Uniondale NY Telecommuters Consulting Experts nearby Uniondale - Backup Technology Consulting and Support Services Remote Workforce Consulting and Support Services near Uniondale - Backup/Restore Solutions Assistance Uniondale-Westbury , NY
  • Urgent Chesapeake Crypto-Ransomware Locky Readiness Review Chesapeake Ransomware Ryuk Readiness Assessment Chesapeake Virginia
  • Windows Server 2022 Clusters Sets Technical Support Windows Server 2022 Encrypted Networks Services

  • Professionals Flexential Tampa Colocation Center
    Urgent Flexential Data Center Consultant

    Progent makes use of the Flexential Tampa data center primarily to provide private cloud hosting. Progent maintains a group of network experts based in the vicinity of Tampa, and Progent also offers remote expertise from Progent's countrywide team of Microsoft-certified experts, Cisco-certified CCIE network engineers, CISM and CISSP-certified security consultants, Hyper-V and VMware professionals, and veteran DRBC preparedness experts. Progent can also help your business to plan and carry out a migration to the Flexential facility with services like planning solution configuration, specifying hardware components, system configuration and testing, troubleshooting, setting up remote management, and educating your network staff.


    © 2002-2022 Progent Corporation. All rights reserved.