SentinelOne Reseller and Integration ExpertsSentinelOne's Singularity product line is a subscription-based, cloud-centric cyberthreat defense stack that features computer learning software and professional services to deliver enterprise-class endpoint detection and response (Singularity EDR) and managed detection and response (Singularity Complete with Vigilance MDR). SentinelOne's small-footprint agents can be loaded in a few minutes to defend popular endpoints against increasingly sophisticated assaults including ransomware, familiar and zero-day malware, trojan viruses, hacking toolkits, RAM exploits, malicious scripts, harmful macros, and living-off-the-land attacks. Singularity agents are offered for Microsoft Windows, Apple macOS, Linux distributions, and Kubernetes powered endpoints. Supported deployment models include physical, virtual, VDI desktops, hybrid data centers, and cloud service providers. Since SentinelOne software agents operate autonomously, they can provide advanced behavior-based security in real time even when endpoints are unattached to the cloud.

Progent is a certified SentinelOne Partner and dealer and oversees thousands of endpoints secured by SentinelOne Singularity technology. SentinelOne is invariably the first incident response software activated by Progent to provide control and visibility of a customer's network at the outset of a ransomware recovery emergency. SentinelOne is also the root EDR software powering Progent's Active Security Monitoring (ASM) managed services. SentinelOne was recognized as a top visionary in Gartner's 2022 Magic Quadrant for Endpoint Protection Platforms and attained the highest number of high-quality detections in real-time during the 2022 MITRE ATT&CK Phase 4 Evaluation. Gartner concludes, "This reaffirms its (SentinelOne's) ability to detect all attacks and provide full details of the techniques and tactics used." SentinelOne also surpassed all competition for each use case in Gartner's evaluation of Critical Capabilities for Endpoint Protection Platforms (EPPs).

Singularity Packages for SentinelOne Endpoint Detection and Response
SentinelOne's Singularity family has several tiers of endpoint protection product packages provided as a global cloud-based platform that features high availability, centralized policy management by site and group, AI powered malware intelligence, fast recovery, and an information-driven console for cyberthreat analytics. Packages include Singularity Control for streamlined management, Singularity Complete for advanced protection plus automated root cause analysis, and Singularity Complete with Vigilance MDR for 24/7 advanced monitoring and response. The tiers are incremental. Singularity Complete and Singularity Complete with Vigilance MDR each include all the features and options of the level below it. Subscription rates start at $10 per endpoint per month with appropriate discounts for larger deployments. Progent has no minimum device requirement.

The SentinelOne Control Package
The SentinelOne Control Package is the base software and is 100% maintained by the client. For some examples: Endpoint agents need to be updated in the SentinelOne portal, allow rules need to be set, exclusions need to be made, blacklists should be created, threats must be responded to, and many other day-to-day activities that someone in your organization needs to manage and maintain. SentinelOne is just like any other security product in that it has frequent updates to keep its defenses current. Progent can assist with or directly handle these items, but there is additional time and materials billing for all services performed.

With the Control Package you manage your own portal and while Progent and SentinelOne personnel are monitoring and or receiving alerts of serious threats in your environment, we have no authorization to do any work in your environment and will only do best efforts to alert you in case of a serious threat.

Features of the SentinelOne Control Package include:

  • Endpoint Prevention (EPP) to stop a wide range of malware, Trojans, hacking tools, and ransomware before they start
  • ActiveEDR Basic for Endpoint Detection & Response (EDR) works in real-time with or without cloud connectivity. ActiveEDR detects highly sophisticated malware, memory exploits, script misuse and other fileless attacks as they attempt to do damage.
  • ActiveEDR Recovery gets users up and running in minutes and includes 100% remediation as well as rollback for all supported non-legacy releases of Microsoft Windows.
  • Device Control for Policy-based control of all USB devices and Bluetooth peripherals (Win, Mac)
  • Firewall Control for Policy-based control of network connectivity to and from assets, including location awareness (Win, Mac, Linux)
  • Vulnerability Management, in addition to Application Inventory, for insight into 3rd party apps that have known vulnerabilities mapped to the MITRE CVE database
  • Full Secure Remote Shell capability for direct endpoint access by incident responders and forensics personnel
  • Autonomous SentinelOne agent Storyline Engine
  • Integrated Static AI and SentinelOne Cloud Intelligence file-based attack prevention
  • Behavioral AI fileless attack detection
  • Autonomous Threat, Remediation, and Rollback Response
  • Quarantine device from network, Incident Analysis, Agent Anti-tamper, App inventory
  • Rogue device discovery
The SentinelOne Complete Package
The SentinelOne Complete Package includes all the basic features and works with all the add-ons of the Control package and adds single-agent enterprise-grade prevention, detection, response and hunting throughout endpoints, cloud, and IoT. The package saves substantial time for cybersecurity administrators, SOC analysts, threat hunters, and incident responders by automatically correlating events and mapping it into the MITRE ATT&CK framework to determine root causes. The SentinelOne Complete Package offers an advanced EDR feature set that includes:
  • Co-Managed environment with Progent receiving alerts and notifications of all threats and activities in your environment. Client is responsible for resolving threats in their environment and optional support time and material is available
  • ActiveEDR Advanced adds visibility of all benign data.
  • ActiveEDR Advanced adds enterprise threat hunting. SentinelOne differentiates with ease-of-use personified by the active nature of the solution in autonomously responding to attacks.
  • Storyline technology for Automated Forensics and fast root cause analysis (RCA). All OS stories are automatically contextualized with SentinelOne’s patented TrueContext function, saving analysts tedious event correlation tasks and getting them to the root cause with reduced MTTR.
  • Storyline Active Response (STAR) mitigates zero-day threats with custom detection and hunting rules.
  • Deep visibility Storyline Pivot and Hunt by MITRE ATT&CK technique
  • EDR Hunting Data retention options from 14 days standard to 365 days optional
  • Timelines, file fetch, file integrity monitoring, sandbox integrations
  • Additional response options are available and customized to your needs. Includes 1 hour of training in advanced features and day to day management of the SentinelOne portal. During this time, we will train in the creation of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts.
Options for the SentinelOne Singularity Complete Package bundle include adding software-defined network discovery and aggregated active/passive device mapping through SentinelOne's Vigilance with MDR package plus elimination of agent installation gaps with configurable job automation. Progent also offers optional monthly client portal review and threat recommendations.

SentinelOne Complete with Vigilance MDR Managed Detection and Response Services
Vigilance Respond is an add-on MDR program for subscribers to the Singularity Complete bundle. Complete with Vigilance MDR includes digital forensics and full 24x7 incident response provided by Tier-1, Tier-2, and Tier-3 IT security experts. SentinelOne Complete with MDR services include confirmation of threats, event prioritization and triage, false positive handling and dashboard updating, accelerated threat resolution, management reporting, SLAs, and escalation back to the client's cybersecurity team.

Vigilance MDR consultants classify detected threat notifications according to a threat-handling hierarchy ranging from Benign False Positive to Malicious Urgent. This classification determines how the Vigilance analyst responds to the detected threat. There are five categories of threats and corresponding responses. Most alerts require no response by the customer.

Benign Alert - False Positive
Vigilance resolves the issue and annotates the SentinelOne dashboard. For isolated False Positive alerts, no additional actions or notifications are necessary. For persistent False Positive alerts, Vigilance will escalate the issue to the client to submit or approve an appropriate exclusion or agent update as needed.

Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program (PuP)
Vigilance takes action to make sure the threat is blacklisted, resolved, and documented. Typically, no notification will be sent to the customer unless the threat requires additional activity.

Malicious Alert - True Positive / No Action Needed
Vigilance performs appropriate actions including remediation to ensure the threat is quarantined. Once the analyst verifies the threat is eliminated, the analyst will send a verification notice to the customer.

Malicious Alert - True Positive Non-Urgent / Action Needed
Vigilance performs proper actions including remediation to ensure the threat is isolated. After the analyst confirms the threat is deleted, the analyst will send a verification alert to the client. Subsequent procedures such as re-imaging may be called for in some cases.

Malicious Alert - True Positive Urgent / Action Needed
Vigilance may respond strongly in serious breach cases including taking agent remediation actions and disconnecting affected network devices to stall the attack and prevent additional lateral movement and spread. The analyst will transmit a proactive alert apprising the customer of the issue and will ask for an immediate response.

In addition to providing all the features of SentinelOne Control and SentinelOne Complete, SentinelOne Complete with Vigilance MDR adds 24x7 Monitoring with Near Real Time Threat Response, Remote Script Orchestration, and Ranger:

  • Fully Co-Managed Environment with Progent receiving alerts and notifications of all threats and activities in your environment and combined SOC response, providing 3 levels of 24x7x365 Detection and Response. All threats are mitigated and responded to in near real-time. Additional remediation options after threat mitigation are available and customized to your individual needs.
  • Remote Script Orchestration empowers enterprises to send scripts to one machine, a few hundred machines, or even millions of machines, to respond to present and future cyberattacks at machine speed. Security Teams can send custom scripts or select from a wide range of tasks – ranging from incident response to forensics artifact collection and even IT administration. In combination with SentinelOne Storyline Active Response (STAR), analysts benefit from automated workflows that take incident response to the next level.
  • Ranger provides unparalleled visibility into your environment. Ranger is network-efficient by intelligently electing a few SentinelOne agents per subnet to participate in network mapping missions. Elected "Rangers" passively listen for network broadcast data including ARP, DHCP, and other network observances. Admins can customize active scan policies and specify multiple IP Protocols for learning including ICMP, SNMP, UDP, TCP, SMB, and more. Rangers correlate all learned information within the backend to fingerprint known and unknown devices. Ranger device inventories reveal what is connected to your environment, where and the protocols the devices listen on. Ranger allows you to find and close SentinelOne Agent deployment gaps with Ranger Deploy, a peer-to-peer deployment (Windows, Mac, Linux). Ranger allows you to monitor how unknown devices communicate with managed hosts and isolate suspicious devices from managed devices with a click.
Includes 1 hour of training in advanced features and day-to-day management of the SentinelOne portal. During this time, we will train clients in the creation of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts. Progent offers specialized additional training for your organization's needs on a time and materials basis.

Download Progent's SentinelOne Singularity Packages Datasheets
See datasheets describing Progent's SentinelOne Singularity products and services:

Why Progent?
Progent's roster of over 125 consultants includes certified experts in every aspect of network technology related to small and mid-size businesses. With this scope of knowledge, Progent can be your single point of contact for building and managing a cohesive cybersecurity environment that delivers immediate business value. In addition to the endpoint protection provided by SentinelOne products, Progent offers a variety of managed services and specially-priced support packages designed to help small and mid-size businesses to plan, deploy, validate, and manage networks that feature enterprise-level cybersecurity and low TCO.

Progent has expertise in all the endpoints, servers and virtual machines that can be protected by SentinelOne products and offers services that include Windows 11 planning and migration consulting, Windows 10 integration, Linux support, Mac OS X and macOS consulting, iPhone and iPad configuration, Android integration, Windows Server 2022 integration expertise, Windows Server 2019 migration consulting, Hyper-V virtualization support, and VMware vSphere consulting. For single-click or manual rollback capability, Progent's Windows Server consultants can help you set up Windows Volume Shadow Copy Service (VSS). Progent can also provide online and onsite access to certified Cisco CCIE consultants to help you plan, protect or troubleshoot your network infrastructure. If your network incorporates cloud resources, Progent offers the guidance of Microsoft Azure consultants, Amazon AWS experts, and Google Cloud integration consultants.

Contact Progent about SentinelOne Sales and Integration Services
To find out more about how Progent can help you purchase or integrate SentinelOne technology, call 1-800-993-9400 or visit Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to guide organizations to carry out the time-critical first phase in responding to a ransomware assault by putting out the fire. Progent's online ransomware engineer can assist you to locate and quarantine breached servers and endpoints and guard undamaged assets from being penetrated. If your system has been breached by any strain of ransomware, act fast. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800. For details, visit Progent's Ransomware 24x7 Hot Line.

An index of content::

  • At Home Workforce Guarulhos Assistance - IP Voice Technology Consulting Guarulhos, Sao Paulo Guarulhos Work from Home Employees VoIP Solutions Assistance Guarulhos, State of Sao Paulo
  • Austin, TX Open Now CentOS Linux, Solaris, UNIX Specialist Redhat Linux, Solaris, UNIX Information Technology Consulting Austin, TX
  • Bellevue Kirkland Bellevue Immediate Ransomware Recovery Consulting 24/7 Bellevue Crypto Recovery King County Washington, United States
  • Chandler Chandler MS Dynamics GP-Great Plains Implementation Consultants 24x7 Dynamics GP-Great Plains Gold Partner - Chandler - Installation Outsourcing Maricopa County Arizona, US
  • Cisco ASA Firewalls Security Auditing Computer Security IT Services
  • Cisco VoIP Phones and Presence Computer Consulting Cisco VoIP phones Single Number Reach IT Consultants

  • Ubuntu Linux Consult
    CentOS Linux Specialists

    If you are developing Linux-based applications on a network that has MS Windows-based servers, PCs, and office productivity products, Progent offers comprehensive network support outsourcing that allows you to concentrate on your field of high-value expertise while avoiding the continual hassle of managing your business network. Through the use of automated server monitoring and by delivering remote and on-site support as your company needs it, Progent represents an economical way for managing an information network that features high reliability, protection, and efficiency. Progent's UNIX/Linux developer assistance offerings feature comprehensive information technology outsourcing, virtual infrastructure, online and on-site service and repair, proactive network monitoring, and Help Desk Call Center support.

  • Consulting for Computer Support Providers nearby Milwaukee - Seamless Short-Term IT Support Help General Mitchell Airport Milwaukee MKE Consulting for Milwaukee Network Support Companies General Mitchell Airport Milwaukee MKE
  • Crypto Cleanup Consulting Lima, La Molina Lima, La Molina District Lima Emergency Crypto Remediation Consultants
  • Dynamics GP The Woodlands Reseller - Training Programming and Support The Woodlands Microsoft Dynamics GP (Great Plains) Vendor - The Woodlands - Database Consultants Montgomery County
  • Emergency System Center 2012 R2 Virtual Machine Manager Online Help Immediate SCVMM 2012 Live Migration Technology Consulting
  • Exchange 2013 Disaster Recovery Network Consultant Exchange 2013 Compliance Computer Consulting

  • Exchange 2013 Disaster Recovery Help and Support
    Support and Integration Exchange 2013 Management

    Microsoft Exchange 2013 includes significant enhancements to the capabilities of its predecessor Exchange Server 2010 and delivers important innovations plus a revamped structure. These enhancements favorably impact key facets of IT such as manageability, high availability (HA), compliance, operational costs, teamwork, scalability, performance, compatibility, and productivity. Progent's certified Exchange 2013 consulting experts can help you evaluate the possible advantages of migrating to Exchange Server 2013, design a cost-effective validation and deployment strategy, and train your IT staff to manage your Microsoft Exchange 2013 environment. Progent also offers affordable online support and management services for Microsoft Exchange Server 2013.

  • Exchange 2016 Computer Consultancy Firm Eugene Small Business IT Consultant Exchange 2019 Eugene Oregon

  • Largest SonicWall NSSP 12000 Firewall Firewall Network Install
    Top Ranked SonicWall Gateway Security Suite Auditing

    Progent's SonicWall firewall consultants can help you integrate, manage, and update SonicWall firewall/VPN appliances including the current SonicWall TZ, NSa and NSsp families of firewalls and the older SonicWall PRO 2040 devices. Progent's CISSP and CISA-certified network security consultants can help you incorporate SonicWall firewalls into a complete network protection plan and design security into your business operations.

  • Gentoo Linux, Solaris, UNIX IT Consultant Seaside Slackware Linux, Solaris, UNIX Remote Consulting Carmel
  • Greater London London Work from Home Employees VoIP Technology Guidance Telecommuters Assistance - London - VoIP Solutions Assistance

  • Online Troubleshooting Microsoft 365 OneNote Integration
    Remote Consulting Microsoft 365 Integration

    Progent can assist your business to evaluate the wealth of subscription options available with Microsoft 365, previously called Office 365, and configure your information network with Microsoft 365 so you realize top business value. Progent offers expertise with cross-vendor environments that include Windows, macOS or OS X, and Linux operating systems. Progent can also assist you to create and manage hybrid ecosystems that seamlessly combine on-premises and cloud products and services.

  • Healdsburg Migration Support Network Specialist Santa Rosa
  • IT Outsourcing Advantages White Paper Small Business IT Outsourcing Whitepaper
  • Juniper SSG Series Firewall Cybersecurity Consultancies Evaluation Juniper SSG520M Router
  • MSP360 GSuite Backup Online Support Urgent Network Consultant MSP360 Ultimate Backup

  • Help Desk Sharing Cost Savings Support
    24x7 Virtual Call Desk Economics Remote Technical Support

    Progent's Helpdesk outsourcing and co-sourcing services help businesses to save money and improve productivity.

  • Microsoft Configuration Manager Computer Network Specialists Migration Microsoft Configuration Manager
  • Microsoft SQL 2008 Network Engineer Estado de So Paulo Consolidation Microsoft SQL Server 2017 Ribeirao Preto, State of Sao Paulo
  • Microsoft and Cisco Authorized Expert Services Hybrid cloud integration Specialist Hybrid cloud
  • Migration Consulting SQL Server 2019 Shreveport Barksdale Air Force Base Security Consultants Microsoft SQL 2008 Shreveport Bossier City

  • ProSight Patch Management Automation Technical Consultant
    Automated Desktop Monitoring Consultant

    ProSight LAN Watch is Progent's server and desktop monitoring managed service that uses state-of-the-art remote monitoring and management technology to help keep your IT system operating at peak levels by checking the health of critical assets that drive your network environment. When ProSight LAN Watch uncovers a problem, an alert is transmitted automatically to your specified IT management staff and your assigned Progent consultant so all looming issues can be resolved before they have a chance to disrupt productivity.

  • SentinelOne Virus Recovery Experts Help and Support
  • Onsite and Remote Support Porto Alegre Microsoft, Cisco and Security Certified Experts Porto Alegre-Tristeza Security Consulting Companies
  • Open Now Firewall Network Consultants Rochester, Monroe County Security Protection Rochester, NY

  • Services County Government Exchange
    Consultancy City Government Exchange

    Progent has a long background delivering a broad range of online IT consulting and emergency troubleshooting services to local governments and school districts throughout the U.S. Progent is one of the industry's pioneers in delivering expert online IT support and has delivered IT support to organizations in all 50 states. Online support saves travel expenses and resolves issues faster than on-premises support.

  • Petaluma Sonoma County Petaluma Hermes Ransomware Repair Petaluma Avaddon Ransomware System-Rebuild Petaluma California, U.S.A.
  • ProSight Reporting Infrastructure Management IT Consulting ProSight Reporting ConnectWise Manage Ticketing Online Technical Support

  • Consult Skype for Business and Exchange UM Server
    Skype for Business Front End Pool Consultancy

    Progent's consultants can provide remote and on-premises expertise for organizations of any size to assess the benefits of migrating to Skype for Business or Skype for Business Online from any version of Lync Server or Office Communications Server. Progent can help your business to design a local, cloud or hybrid topology; integrate Skype for Business with Microsoft SQL Server,Exchange, SharePoint and Office or Microsoft 365; set up high-availability solutions; interface Skype for Business with your PBX system and PSTN gateway; and interface with other collaboration systems such as Cisco UC. Progent's certified network security consultants can assist you design and validate a security environment for your Skype for Business solution that is compliant with regulatory standards.

  • ProSight Reporting Infrastructure Monitoring Network Consultant 24x7 ProSight Reporting Infrastructure Management Integration

  • Security Scan Specialist
    24-Hour Consulting Network Security Inventory

    Progent provides small businesses a pair of ultra-affordable security inventory scanning packages that provide, for a set fee, remotely managed inventory scans of your security profile which are evaluated by professional information security engineers who assess the data collected by the remote scan, deliver objective evaluations of your existing network security, and make suggestions for enhancements. Progent offers two non-overlapping network security inventory packages for external and internal security scanning that are priced to fit the budgetary realities of small businesses while providing enterprise-class evaluations of your IT network's exposure to assault.

  • Engineers SentinelOne Singularity Control Integration
  • Ransomware Removal and Restore Ransomware Cleanup and Restore Quebec
  • Remote Workforce Guidance - Riverside - Infrastructure Assistance Inland Empire Riverside, America Riverside, US Riverside Teleworkers Infrastructure Guidance
  • Roseville, CA Roseville DopplePaymer Ransomware Settlement Consultants Roseville-Citrus Heights Roseville NotPetya Ransomware Settlement Services

  • 24-Hour Exchange Server 2016 Technical Support Services
    Exchange 2016 DAG Consulting Services

    Progent can help you in all facets of your migration to Microsoft Exchange Server 2016 such as planning high availability infrastructure for a local, Microsoft cloud connected or hybrid deployment; server and CAL licensing compliance for Exchange 2016 Server and Windows Server 2012 R2 or later; migrating mailboxes; Hyper-V strategy; specifying storage capacity required for your VMs, databases and logs; setting up hardware load balancing (HLB) for high-availability client access services; designing, building and testing Exchange and Windows Servers and Database Availability Groups (DAGs); integration with SharePoint Server or SharePoint Online; preparing your firewall; creating SSL certs; performing client integration with Office desktop or Microsoft 365; and setting up Outlook on the web.

  • SQL 2012 Security Consulting Company Broomfield-Thornton, CO SQL Server 2012 Migration Help Broomfield, Colorado

  • Biggest QTS Sacramento Data Center Specialists
    Urgent Specialists QTS Colocation Center

    The QTS Colocation Center is located in the earthquake-neutral Natomas neighborhood of Sacramento, CA. If your business is now utilizing the QTS data center as a colocation facility or if your company is planning on moving your main or offsite backup equipment to the Herakles data center, Progent can provide a variety of affordable consulting services including colocation migration, equipment deployment and upgrades, infrastructure optimization, comprehensive project management, virtual server configuration, offsite network monitoring, centralized network administration, software development, disaster recovery planning, data security assessment, and the use of Progent's Test Lab.

  • SQL Integration Consulting Ronald Reagan Washington Airport DCA SQL IT Consulting Companies District of Columbia
  • Immediate SentinelOne Singularity and Vigilance Reseller Remote Consulting
  • Sausalito Systems Engineer CISSP Certified Security Marin County Small Office IT Outsourcing
  • Security Protecting Security Technical Support
  • SentinelOne Behavior-based Virus Detection Technology Professional
  • Toledo Ohio, United States Computer Tech Cisco Cisco Network Security Consultant Toledo Bowling Green

  • Exchange 2003 Network Consultant
    Microsoft Exchange Engineer

    Progent's Microsoft certified support team can show you how to define and implement an efficient in-place Exchange Server 2003 migration strategy that minimizes productivity downtime, simplifies ongoing support demands, and makes your Exchange Server 2003 easy to administer. For complex multi-server or multi-location upgrades, Progent has the experience to finish your move rapidly and economically. Progent's Microsoft Exchange 2003 support, repair, and consulting offerings include assistance with the configuration of outside vendor add-ons to Microsoft Exchange 2003 Server that are in keeping with your business needs.

  • Top Quality Oxford IT Staff Augmentation Services Oxford Urgent Supplemental IT Staffing Support Services Consulting Expertise Oxford
  • Professional SentinelOne Phishing Defense
  • Windows Network Security Consultants Kansas City International Airport MCI Kansas City, Jackson County Windows Server 2012 R2 Server Installation

  • Solaris Small Business IT Consultant
    Top Ranked NetBSD Support Consultant

    Progent's UNIX family consulting services provide small companies and developers assistance with administering and maintaining UNIX, Linux or Solaris environments that coexist with Microsoft-based technology. Progent can give your organization access to UNIX consultants, support professionals certified by Microsoft and Cisco, and security specialists with CISM certification. This wide range of experience offers you a convenient single source to help you create and maintain a protected and reliable mixed-platform network and communications infrastructure that allows UNIX and Microsoft coexistence by integrating Windows with popular variants of UNIX including Apple macOS and OS X, Solaris, AIX, HP-UX (Hewlett Packard UNIX), Berkeley UNIX (BSD), SCO and SGI/Irix or major Linux platforms including RedHat, SuSE, Debian-GNU and Slackware.

    © 2002-2024 Progent Corporation. All rights reserved.