SentinelOne Reseller and Integration ExpertsSentinelOne's Singularity product family is a subscription-based, cloud-centric threat management platform that includes AI software and expert services to provide comprehensive endpoint detection and response (EDR). SentinelOne's compact software agents can be installed in minutes to defend endpoints against increasingly sophisticated cyberthreats including ransomware, familiar and zero-day malware, trojans, hacking tools, memory exploits, script misuse, pernicious macros, and living-off-the-land attacks. Agents are available for Windows, Mac, Linux, and Kubernetes endpoints. Supported form factors include physical, virtual, VDI, customer data centers, hybrid data centers, and cloud service providers. Because SentinelOne agents are autonomous, they can provide advanced behavior-based protection in real time even when endpoints are not cloud connected.

Progent is a certified SentinelOne Partner and reseller and manages thousands of endpoints protected by SentinelOne technology. SentinelOne is always the first incident response tool deployed by Progent to gain control and visibility of a client's network during a ransomware recovery emergency. SentinelOne is also the key technology behind Progent's Active Security Monitoring services. SentinelOne was recognized as a leading visionary in Gartner's 2021 Magic Quadrant for Endpoint Protection Platforms and scored the most analytic detections in the MITRE ATT&CK Evaluation.

Singularity Packages for SentinelOne Endpoint Security
SentinelOne's Singularity family includes three tiers of endpoint protection product bundles delivered as a global SaaS platform that features high availability, hierarchical policy management by site and group, AI driven threat intelligence, fast recovery, and data-driven dashboard security analytics. Bundles include Core, Control, and Complete. The higher tiers are additive. Control and Complete include all the features and options of the tier below it. Pricing starts at $5 per endpoint per month for small customers with appropriate discounts for larger deployments. There is no minimum device requirement.

Singularity Core provides basic anti-virus (AV) and next-generation anti-virus (NGAV) capability and offers rudimentary Endpoint Detection and Response (EDR). Standard features include:

  • Autonomous Sentinel agent Storyline engine
  • Integrated static AI and SentinelOne Cloud Intelligence file-based attack prevention
  • Behavioral AI fileless attack detection
  • Autonomous Threat Response / Kill, Quarantine (Win, Mac, Linux)
  • Autonomous Remediation Response / 1-Click, no scripting (Win, Mac)
  • Autonomous Rollback Response / 1-Click, no scripting (Win)
  • Quarantine device from network
  • Incident Analysis (MITRE ATT&CK, timeline, explorer, team annotations)
  • Agent anti-tamper
  • App inventory
Options for the Singularity Core bundle include live global asset inventory and advanced ML device fingerprinting via the Singularity RANGER package, elimination of agent deployment gaps with p2p job automation via the Singularity RANGER PRO package, rogue device discovery, and cloud workload security for Kubernetes and VMs plus cloud provider metadata integration via the Singularity Cloud package. (Note: SentinelOne Singularity Core is not currently offered by Progent. This product does not include threat visibility options required by Progent to co-manage the security of the client environment.)

Singularity Control includes all the standard features and options of the Core bundle and adds features for improving endpoint management including secure remote shell, firewall control with location awareness (Win, Mac, Linux), device control for USB and Bluetooth peripherals (Win, Mac), and management for apps with known vulnerabilities mapped to the MITRE CVE database.

Options for the Singularity Control bundle include the ability to isolate suspicious and malicious devices via the Singularity RANGER package plus automated app control for Kubernetes via the Singularity Cloud package.

Singularity Complete offers single-agent, enterprise-grade prevention, detection, response and hunting across endpoint, cloud, and IoT. The package saves significant time for security administrators, SOC analysts, threat hunters, and incident responders by automatically correlating telemetry and mapping it into the MITRE ATT&CK CVI framework. Complete offers an advanced EDR feature set that includes:

  • Storyline technology for automatic correlation and contextualization of alerts for fast root cause analysis (RCA)
  • Storyline Active Response (STAR) mitigates new and emerging zero-day threats with custom detection and automated hunting rules
  • Integrated ActiveEDR visibility to both benign and malicious data
  • Deep visibility Storyline pivot and hunt by MITRE ATT&CK technique
  • EDR Hunting Data retention options from 14 days standard to 365 days optional
  • File integrity monitoring
  • Timelines, remote shell, file fetch, sandbox integrations
Options for the Singularity Complete bundle include Cloud Funnel for copying endpoint telemetry from SentinelOne's cloud to your data lake, the ability to upload malicious and benign executables to the SentinelOne cloud for automated analysis, and automated App control for Linux VMs.

Vigilance Respond MDR Services
Vigilance Respond and Vigilance Respond Pro are optional Managed Detection and Response (MDR) service programs for subscribers to the Singularity Complete bundle. These packages include full 24x7 incident response provided by Tier-1, Tier-2, and Tier-3 cybersecurity experts. Vigilance Respond services include validation of threats, event prioritization and triage, false positive handling and dashboard cleanup, proactive threat deactivation, accelerated threat resolution, management reporting, SLAs, and escalation back to the customer's cybersecurity organization. Pricing averages around $17 per device per month and there is no minimum device requirement.

Vigilance Respond Pro adds a 2x faster SLA, assigned incident response case managers, root cause analysis, incident-driven threat hunting, digital forensics with malware reversing, containment and eradication, comprehensive security assessment, plus post-mortem consultation. In most cases Vigilance Respond Pro interprets and resolves threats in minutes and only contacts customers for urgent matters. Because most of these services do not require the participation of the Vigilance Respond subscriber, customers are able to focus on strategic projects rather than day-to-day security issues.

Vigilance MDR analysts classify detected threat alerts according to a hierarchy ranging from Benign to Urgent True Positive. This classification determines the SentinelOne analyst's response. There are five categories of alerts and associated responses. Most alerts require no action by the customer.

Benign Alert - False Positive
Vigilance resolves the issue and annotates the SentinelOne dashboard. For isolated False Positive alerts, no additional actions or notifications are required. For repeated False Positive alerts, Vigilance will escalate the issue to the customer to offer or approve an appropriate exclusion or agent upgrade as needed.

Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program (PuP)
Vigilance takes action to ensure the threat is blocklisted, resolved, and annotated. Usually, no notification will be sent to the customer unless the issue calls for follow up activity.

Malicious Alert - True Positive / No Action Needed
Vigilance takes appropriate actions including Remediation to ensure the threat is isolated. Once the SentinelOne analyst verifies the threat is eliminated, the analyst will send a confirmation notice to the customer.

Malicious Alert - True Positive Non-Urgent / Action Needed
Vigilance takes appropriate actions including Remediation to ensure the threat is isolated. Once the SentinelOne analyst verifies the threat is eliminated, the analyst will send a notification to the customer. Subsequent procedures like re-imaging may be called for in certain cases.

Malicious Alert - True Positive Urgent / Action Needed
Vigilance may respond aggressively in high priority breach cases including taking agent remediation actions and disconnecting affected network devices to isolate the attack and prevent further lateral movement and spread. The Analysts will send a proactive notification alerting the customer to the situation and request immediate response.

Download Progent's Singularity Control and Complete Comparison Datasheet
To download a single-page printable datasheet in PDF format comparing SentinelOne's Singularity Control and Singularity Complete endpoint detection and response products, click:
Progent's Singularity Control and Singularity Complete EDR Comparison Datasheet. (PDF - 340 KB)

The Progent Advantage
Progent's team of more than 125 consulting professionals includes certified experts in every aspect of information technology related to small and mid-size businesses. With this breadth of expertise, Progent can be your one-stop source for integrating a comprehensive security solution that delivers immediate business value. In addition to the endpoint protection provided by SentinelOne products and services, Progent offers a variety of managed services and specially-priced support packages designed to help small and mid-size businesses to deploy, validate, and manage networks that feature enterprise-class information assurance and low total cost of ownership (TCO).

Progent has expertise in all the endpoints, servers and virtual machines that can be protected by SentinelOne products and offers services that include Windows 11 planning and migration consulting, Windows 10 integration, Linux support, Mac OS X and macOS consulting, iPhone and iPad configuration, Android integration, Windows Server 2022 integration expertise, Windows Server 2019 migration consulting, Hyper-V virtualization support, and VMware vSphere consulting. For single-click or manual rollback capability, Progent's Windows Server consultants can help you set up Windows Volume Shadow Copy Service (VSS). Progent can also provide online and onsite access to certified Cisco CCIE consultants to help you plan, protect or troubleshoot your network infrastructure. If your network incorporates cloud resources, Progent offers the guidance of Microsoft Azure consultants, Amazon AWS experts, and Google Cloud integration consultants.

Contact Progent about SentinelOne Sales and Integration Services
To find out more about how Progent can help you purchase or integrate SentinelOne technology, call 1-800-993-9400 or visit Contact Progent.



An index of content::

  • 24/7 Austin Remote Workers IP Voice Solutions Consulting Offsite Workforce Consulting and Support Services - Austin - IP Voice Solutions Guidance Austin, Travis County

  • Cybersecurity Team ISSAP Certified
    Virus Protection Information Technology Consulting

    For small and midsize organizations, computer security and regulatory compliance is excessively complicated to master yet too dangerous to ignore. The largest biggest institutions have been breached, and the leading cloud service providers have on occasion been knocked out. It seems as though there's nowhere to hide. Progent has made it economical for small and midsize organizations to implement vital IT security tasks effectively by offering the advantage of billable time to the nearest minute with no minimum charge for online support. This means you can have access to a world-class information consultant to provide just the knowledge you need when you need it. Progent's CISA, CISM, GIAC, CISSP and ISSAP premier security experts can help you with any aspect of system security including security assessments, virus screening and recovery, spam and email content filtering, email data loss prevention, regulatory compliance reporting, and creating a complete security strategy.

  • 24x7 Microsoft Windows Server 2019 Phone Support Services San Francisco East Bay Windows Server 2016 Online Technical Support Livermore, Alameda County

  • Service Reporting IT Services
    Services Documentation Online Technical Support

    Progent uses an enterprise-class support reporting system that stores and organizes detailed documentation for all billed services. Unlike many independent consultants or local support firms who offer scant documentation or specifics of tasks performed, each service provided by Progent is tracked by full documentation. Every Progent staff member has use of the service reports transmitted by every consultant to each customer. The discipline of detailing and organizing service activity results in more effective service and avoids a slew of typical misfortunes such as when a support client is virtually held hostage to a consultant who refuses to release vital service information.

  • Allentown, PA Temporary IT Staffing for Network Support Teams Allentown Short Term IT Staffing Services

  • WatchGuard Firebox M4600 Firewall Cybersecurity Firm
    WatchGuard Fireware Evaluation

    Progent provides consulting expertise for WatchGuard Firewall security appliances including the WatchGuard Firebox and XTM series of Firewalls and the Firebox SSL Core VPN Gateway. Progent's WatchGuard professionals can help you choose, deploy, and manage a WatchGuard Firewall product that aligns with your security requirements and budget. Progent can help you to manage legacy WatchGuard firewalls or upgrade smoothly to current WatchGuard firewalls.

  • Barueri-Alphaville Spora Crypto-Ransomware Settlement Guidance Alphaville Barueri-Alphaville NotPetya Crypto-Ransomware Negotiation Services Barueri
  • Boston Teleworkers Collaboration Solutions Assistance Boston Massachusetts Boston At Home Workforce Collaboration Solutions Consulting Experts Boston Cambridge
  • Curitiba Teleworkers Backup/Recovery Technology Consultants Work at Home Employees Consulting and Support Services nearby Curitiba - Backup Systems Consulting Paraná
  • Exchange Computer Consulting Group Manhattan Beach California Exchange Server 2016 Network Consultants Manhattan Beach-El Segundo
  • Fremont Ransomware Maze Susceptibility Evaluation Fremont Alameda County Top Fremont Ransomware Avaddon Preparedness Review Fremont, CA
  • SentinelOne Singularity Control Reseller IT Consultant
  • Gold Coast Tweed Microsoft MCP Consultant From Home Job MCSE MCSA MCDBA MCIPT MCA Consulting Virtual Office Job Australia
  • Immediate IT Staffing for Network Support Groups Edison-Princeton, New Jersey Edison-New Brunswick, New Jersey Short-Term Network Support Staffing Support Services Consulting Services
  • Microsoft Certified Consultant Full-Time Jobs Computer Support Freelancing Jobs Sacramento - Carmichael
  • Microsoft Dynamics GP Dealer near me in London - Reporting Consultants England London Docklands London MS Dynamics GP Reporting Support
  • Microsoft Exchange Server 2013 Integration Specialist Petaluma Sonoma County Petaluma Exchange Small Business IT Outsourcing Firm

  • Exchange 2003 to Exchange 2010 Upgrade Professionals
    Exchange Upgrade Technology Professional

    Progent can provide expert help for every phase of your Microsoft Exchange Server 2010 upgrade with services that include end-to-end project management, site prep, project design and documentation, cost estimates of all new software licenses and hardware required, recommended vendor sourcing, system testing at customer site or at Progent's test facility, managing temporary coexistence of Exchange Server 2010 and Exchange Server 2003 or 2007, implementation of the production system, decommissioning the previous system, and training for client's IT staff and end users.

  • Microsoft Office XP Networking Consultant On-site Support Microsoft Windows

  • ProSight Hosting for Virtual Servers Consultant
    Specialist ProSight Virtual Server Private Cloud Hosting

    Progent's ProSight Virtual Hosting outsourcing provides complete hosting of a small or mid-size company's production servers in an environment that gives the highest level of availability and expandability and is also simple to transfer to another host. ProSight Virtual Hosting options are based upon mature virtualization platforms that enable small companies with mixed- platform IT systems to save significantly on the costs of capital investments, infrastructure maintenance, and network management while achieving enterprise-class fault tolerance and an unprecedented level of vendor flexibility.

  • Morgan Hill At Home Workers Backup/Recovery Systems Expertise Morgan Hill, CA, U.S.A. Telecommuters Consultants nearby Morgan Hill - Backup/Recovery Technology Guidance

  • Dynamics Business Central Help and Support
    Dynamics Business Central Support and Setup

    Progent offers online and on-premises configuration, migration, customization, reporting for Dynamics 365 Business Central/NAV.

  • New York City-Wall Street, New York Debian Linux, Sun Solaris, UNIX Computer Consultants Gentoo Linux, Solaris, UNIX Support and Help Downtown Manhattan-East Village, New York
  • Office Word 2010 Consultant Office Word compatibility Engineers
  • Redhat Onsite Technical Support Virginia Beach Virginia IT Consulting Linux Virginia Beach, Norfolk, Chesapeake, VA
  • SQL Server 2019 Network Setup Pasadena, CA Outsourcing Firm Microsoft SQL Server 2016 Pasadena Carson Hawthorne Lynwood
  • Suse Linux, Sun Solaris, UNIX Consultant Services Red Hat Linux, Sun Solaris, UNIX Network Consulting Saddle Brook
  • SentinelOne Singularity and Vigilance Reseller Online Troubleshooting
  • Windows Server 2019 Network Administration Tucson Arizona Windows Server 2016 Consulting Service Firm Tucson International Airport TUS, USA

  • Windows Server 2012R2 Consulting Services
    Windows Server 2012R2 Data Deduplication Computer Consultant

    Progent's certified consultants can help you to evaluate the benefits of Microsoft Windows Server 2012 R2 for your company, develop pilot environments and rollout strategies, optimize your infrastructure for local, multi-location, cloud-based, and partial-cloud environments, educate your IT management team, create a corporate-wide security plan, streamline IT administration, help with creating applications, and generate and test a DR/BC plan.


    © 2002-2022 Progent Corporation. All rights reserved.