SentinelOne Reseller and Integration ExpertsSentinelOne's Singularity product family is a subscription-based, cloud-centric threat management platform that includes AI software and expert services to provide comprehensive endpoint detection and response (Singularity EDR) and extended detection and response (Singularity XDR). SentinelOne's compact software agents can be installed in minutes to defend endpoints against increasingly sophisticated cyberthreats including ransomware, familiar and zero-day malware, trojans, hacking tools, memory exploits, script misuse, pernicious macros, and living-off-the-land attacks. Agents are available for Windows, macOS, Linux, and Kubernetes endpoints. Supported form factors include physical, virtual, VDI, customer data centers, hybrid data centers, and cloud service providers. Because SentinelOne agents are autonomous, they can provide advanced behavior-based protection in real time even when endpoints are not cloud connected.

Progent is a certified SentinelOne Partner and reseller and manages thousands of endpoints protected by SentinelOne technology. SentinelOne is always the first incident response tool deployed by Progent to gain control and visibility of a client's network during a ransomware recovery emergency. SentinelOne is also the key technology behind Progent's Active Security Monitoring services. SentinelOne was recognized as a Leader in Gartner's 2022 Magic Quadrant for Endpoint Protection Platforms and scored the most analytic detections in the MITRE ATT&CK Phase 4 Evaluation. According to Gartner's assessment, "This reaffirms its (SentinelOne's) ability to detect all attacks and provide full details of the techniques and tactics used." SentinelOne also outscored all competition for every use case in Gartner's assessment of Critical Capabilities for Endpoint Protection Platforms (EPPs).

Singularity Packages for SentinelOne Endpoint Security
SentinelOne's Singularity family includes three tiers of endpoint protection product bundles delivered as a global SaaS platform that features high availability, hierarchical policy management by site and group, AI driven threat intelligence, fast recovery, and data-driven dashboard security analytics. Bundles include Core, Control, and Complete. The higher tiers are additive. Control and Complete include all the features and options of the tier below it. Pricing starts at $5 per endpoint per month for small customers with appropriate discounts for larger deployments. There is no minimum device requirement.

Singularity Core provides basic anti-virus (AV) and next-generation anti-virus (NGAV) capability and offers rudimentary Endpoint Detection and Response (EDR). Standard features include:

  • Autonomous Sentinel agent Storyline engine
  • Integrated static AI and SentinelOne Cloud Intelligence file-based attack prevention
  • Behavioral AI fileless attack detection
  • Autonomous Threat Response / Kill, Quarantine (Win, Mac, Linux)
  • Autonomous Remediation Response / 1-Click, no scripting (Win, Mac)
  • Autonomous Rollback Response / 1-Click, no scripting (Win)
  • Quarantine device from network
  • Incident Analysis (MITRE ATT&CK, timeline, explorer, team annotations)
  • Agent anti-tamper
  • App inventory
Options for the Singularity Core bundle include live global asset inventory and advanced ML device fingerprinting via the Singularity RANGER package, elimination of agent deployment gaps with p2p job automation via the Singularity RANGER PRO package, rogue device discovery, and cloud workload security for Kubernetes and VMs plus cloud provider metadata integration via the Singularity Cloud package. (Note: SentinelOne Singularity Core is not currently offered by Progent. This product does not include threat visibility options required by Progent to co-manage the security of the client environment.)

Singularity Control includes all the standard features and options of the Core bundle and adds features for improving endpoint management including secure remote shell, firewall control with location awareness (Win, Mac, Linux), device control for USB and Bluetooth peripherals (Win, Mac), and management for apps with known vulnerabilities mapped to the MITRE CVE database.

Options for the Singularity Control bundle include the ability to isolate suspicious and malicious devices via the Singularity RANGER package plus automated app control for Kubernetes via the Singularity Cloud package.

Singularity Complete offers single-agent, enterprise-grade prevention, detection, response and hunting across endpoint, cloud, and IoT. The package saves significant time for security administrators, SOC analysts, threat hunters, and incident responders by automatically correlating telemetry and mapping it into the MITRE ATT&CK CVI framework. Complete offers an advanced EDR feature set that includes:

  • Storyline technology for automatic correlation and contextualization of alerts for fast root cause analysis (RCA)
  • Storyline Active Response (STAR) mitigates new and emerging zero-day threats with custom detection and automated hunting rules
  • Integrated ActiveEDR visibility to both benign and malicious data
  • Deep visibility Storyline pivot and hunt by MITRE ATT&CK technique
  • EDR Hunting Data retention options from 14 days standard to 365 days optional
  • File integrity monitoring
  • Timelines, remote shell, file fetch, sandbox integrations
Options for the Singularity Complete bundle include Cloud Funnel for copying endpoint telemetry from SentinelOne's cloud to your data lake, the ability to upload malicious and benign executables to the SentinelOne cloud for automated analysis, and automated App control for Linux VMs.

Vigilance Respond MDR Services
Vigilance Respond and Vigilance Respond Pro are optional Managed Detection and Response (MDR) service programs for subscribers to the Singularity Complete bundle. These packages include full 24x7 incident response provided by Tier-1, Tier-2, and Tier-3 cybersecurity experts. Vigilance Respond services include validation of threats, event prioritization and triage, false positive handling and dashboard cleanup, proactive threat deactivation, accelerated threat resolution, management reporting, SLAs, and escalation back to the customer's cybersecurity organization. Pricing averages around $17 per device per month and there is no minimum device requirement.

Vigilance Respond Pro adds a 2x faster SLA, assigned incident response case managers, root cause analysis, incident-driven threat hunting, digital forensics with malware reversing, containment and eradication, comprehensive security assessment, plus post-mortem consultation. In most cases Vigilance Respond Pro interprets and resolves threats in minutes and only contacts customers for urgent matters. Because most of these services do not require the participation of the Vigilance Respond subscriber, customers are able to focus on strategic projects rather than day-to-day security issues.

Vigilance MDR analysts classify detected threat alerts according to a hierarchy ranging from Benign to Urgent True Positive. This classification determines the Vigilance analyst's response. There are five categories of threats and associated responses. Most alerts require no action by the customer.

Benign Alert - False Positive
Vigilance resolves the issue and annotates the SentinelOne dashboard. For isolated False Positive alerts, no additional actions or notifications are required. For repeated False Positive alerts, Vigilance will escalate the issue to the customer to offer or approve an appropriate exclusion or agent upgrade as needed.

Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program (PuP)
Vigilance takes action to ensure the threat is blocklisted, resolved, and annotated. Usually, no notification will be sent to the customer unless the issue calls for follow up activity.

Malicious Alert - True Positive / No Action Needed
Vigilance takes appropriate actions including remediation to ensure the threat is isolated. Once the SentinelOne analyst verifies the threat is eliminated, the analyst will send a confirmation notice to the customer.

Malicious Alert - True Positive Non-Urgent / Action Needed
Vigilance takes appropriate actions including Remediation to ensure the threat is isolated. Once the SentinelOne analyst verifies the threat is eliminated, the analyst will send a notification to the customer. Subsequent procedures like re-imaging may be called for in certain cases.

Malicious Alert - True Positive Urgent / Action Needed
Vigilance may respond aggressively in high priority breach cases including taking agent remediation actions and disconnecting affected network devices to isolate the attack and prevent further lateral movement and spread. The Analysts will send a proactive notification alerting the customer to the situation and request immediate response.

Download Progent's Singularity Control and Complete Comparison Datasheet
To download a single-page printable datasheet in PDF format comparing SentinelOne's Singularity Control and Singularity Complete endpoint detection and response products, click:
Progent's Singularity Control and Singularity Complete EDR Comparison Datasheet. (PDF - 340 KB)

The Progent Advantage
Progent's team of more than 150 consulting professionals includes certified experts in every aspect of information technology related to small and mid-size businesses. With this breadth of expertise, Progent can be your one-stop source for integrating a comprehensive security solution that delivers immediate business value. In addition to the endpoint protection provided by SentinelOne products and services, Progent offers a variety of managed services and specially-priced support packages designed to help small and mid-size businesses to deploy, validate, and manage networks that feature enterprise-class information assurance and low total cost of ownership (TCO).

Progent has expertise in all the endpoints, servers and virtual machines that can be protected by SentinelOne products and offers services that include Windows 11 planning and migration consulting, Windows 10 integration, Linux support, Mac OS X and macOS consulting, iPhone and iPad configuration, Android integration, Windows Server 2022 integration expertise, Windows Server 2019 migration consulting, Hyper-V virtualization support, and VMware vSphere consulting. For single-click or manual rollback capability, Progent's Windows Server consultants can help you set up Windows Volume Shadow Copy Service (VSS). Progent can also provide online and onsite access to certified Cisco CCIE consultants to help you plan, protect or troubleshoot your network infrastructure. If your network incorporates cloud resources, Progent offers the guidance of Microsoft Azure consultants, Amazon AWS experts, and Google Cloud integration consultants.

Contact Progent about SentinelOne Sales and Integration Services
To find out more about how Progent can help you purchase or integrate SentinelOne technology, call 1-800-993-9400 or visit Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to guide organizations to take the urgent first phase in responding to a ransomware attack by putting out the fire. Progent's remote ransomware engineer can help you to locate and quarantine infected devices and guard undamaged resources from being penetrated. If your network has been penetrated by any strain of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.

An index of content::

  • At Home Workers Cheyenne Consultants - Cloud Integration Solutions Guidance Cheyenne Wyoming Cheyenne Remote Workforce Cloud Solutions Consulting and Support Services Cheyenne-Cheyenne, Wyoming, U.S.A.
  • At Home Workers Florianópolis Assistance - Endpoint Management Systems Consulting Florianópolis, Estado de Santa Catarina Florianópolis At Home Workforce Endpoint Management Systems Assistance Florianopolis, SC
  • Atlanta, Georgia Computer Services Atlanta Troubleshooters
  • BlackBerry Wireless Software Recovery Raleigh Durham Cary BlackBerry Professional Software Small Office IT Consulting Services Durham County North Carolina
  • Brisbane Work at Home Employees Consulting Experts nearby Brisbane - Backup Systems Consulting Services Work at Home Employees Consulting Services near me in Brisbane - Backup/Restore Solutions Consultants Brisbane CBD
  • Calgary At Home Workers Management Systems Expertise Calgary, Alberta Calgary Calgary Telecommuters Endpoint Management Tools Assistance
  • Charleston Crypto-Ransomware Operational Restoration Charleston Mount Pleasant Charleston South Carolina 24/7 Charleston Spora Ransomware Operational Recovery

  • 24-7 Sun Solaris Migration
    Immediate Solaris to Windows Migration Consulting

    Progent can assist your business to design and implement an efficient transition from a Solaris-powered IT environment to a network based on Microsoft Windows and suited for running Microsoft's powerful office productivity suites, business applications, and software development platforms. Progent's Sun Solaris, Windows and Cisco engineers and application experts can show you how to preserve your information and reduce productivity discontinuity by developing an effective migration strategy that protects your existing investments in Solaris application and infrastructure. UNIX-to-Windows transition consulting expertise offered by Progent include evaluation of current environment, migration strategy and testing, Microsoft Exchange migration services, information and application software transition, and processor and storage transition and economization.

  • Detroit Netwalker Ransomware Mitigation Detroit, Wayne County Detroit Sodinokibi Ransomware System-Restore Detroit
  • Emergency IT Consulting Group Urgent Network Macomb County Michigan Warren Clinton Township Small Business Network Networking Consultancy

  • Microsoft Operations Manager Configuration
    Integration Remote Monitoring and Reporting

    Progent offers a selection of IT support bundles for small organizations. These information technology outsourcing and server monitoring services are built around the anticipatory problem solving abilities of System Center Operations Manager, a next-generation server and system management software platform that monitors the reliability, throughput, and safety of your information system and identifies incipient problems before they can bring down your system. With Progent's economically priced network service packages, small companies can select a simple co-sourcing package built around Microsoft Operations Manager with network monitoring, reporting, Help Desk and remote troubleshooting or a complete 24x7 outsourcing solution.

  • Firewall Network Install Juniper Junos Network and Security Manager Juniper Junos Protecting
  • FreeBSD Information Technology Consultant Consultant Services Sun Solaris
  • Garland Locky Ransomware Repair Garland Garland DopplePaymer Crypto-Ransomware Cleanup Garland, USA
  • SentinelOne Singularity Complete Reseller Configuration
  • Jundiai, State of São Paulo Security Technical Support Services Security Consulting Services

  • Top Hyper-V 3.0 Shared Nothing Live Migration Specialists
    Engineer Microsoft Hyper-V 3.0 Virtual Machines

    Microsoft Windows Server 2012 R2 Hyper-V enhances server virtualization in critical areas such as multitenancy, agile infrastructure, cloud readiness, scalability and throughput, and high availability. Progent's Microsoft-certified consultants can help your business to take advantage of Hyper-V to install and manage virtual servers to reduce network costs and improve availability.

  • Kansas - Wichita, KS, Overland Park, KS, Kansas City, KS, Topeka, KS Firewall Cybersecurity Companies Wichita, KS Audit Firewall
  • Lima-Callao Consulting Team Solution Provider Lima-Miraflores
  • Londrina Offsite Workforce Setup Consulting Experts Londrina Offsite Workforce Infrastructure Consulting Londrina, PR
  • MSP360 Exchange Mailbox Backup IT Consulting MSP360 B2 Backup Storage Online Help
  • Network Consultants Windows Server 2019 and SQL Server Windows 2019 Hyper-V Computer Consulting
  • Offsite DPM Backup Service Services Consultant Services Data Protection Manager Backup Service

  • Windows Server 2016 Hyper-V Specialists
    Windows Server 2016 Hyper-V Technology Consulting Services

    Progent's Microsoft-certified IT consultants offer Windows Server 2016 integration consulting to assist businesses of any size to design and implement an efficient move to Windows Server 2016 and Hyper-V 2016 using a local, cloud-centric, or hybrid deployment model. Progent can help your company to evaluate the benefits of Windows Server 2016 for your enterprise and can help you with any aspect of planning, deploying, administering or debugging your Windows Server 2016 and Hyper-V 2016 solution. Progent can assist your organization to benefit from the many new high-availability and security features of Windows Server 2016 and Hyper-V 2016 like Windows Containers for isolating applications, Shielded Virtual Machines, Credential Guard and Remote Credential Guard, JIT Privileged Access Management, VM load balancing, Storage Replica for zero-data-loss disaster recovery, plus multi-domain clusters.

  • Ohio, America Cisco Troubleshoot Ohio Biggest IT Consultants Cisco
  • Phoenix MongoLock CryptoLocker Removal Phoenix - Tempe - Mesa Phoenix, Maricopa County Ransomware Cleanup Help

  • Technology Consulting Office 365 Skype for Business Integration
    Integration Office 365 Publisher Integration

    Microsoft 365, previously called Office 365, is Microsoft's growing family of productivity programs and cloud services offered on a subscription basis. Microsoft 365 applications and cloud services are available in a variety of product bundles targeted at markets from individuals and households to enterprises. Progent can provide quick and affordable remote access to consultants with expertise in Microsoft, macOS, Apple iOS, and Android platforms. Progent can help your business to evaluate the many subscription options available with Microsoft 365 and configure your information network with Microsoft 365 in a way that delivers top business value. Progent offers expertise with multi-vendor networks that include Windows, macOS, and Linux technology. Progent can also assist you to create and manage hybrid networks that transparently integrate on-premises and cloud-based products and services.

  • Pleasanton-Sunol Security Consultant System Consulting Services Pleasanton-Alameda County
  • SQL Server 2012 Small Business Computer Consulting Brooklyn Brooklyn New York SQL 2012 Server Install
  • SQL Technology Consulting Company Michigan SQL Networking Consultant Detroit, MI, Grand Rapids, MI, Warren, MI, Lansing, MI
  • Salinas, CA Remote Workers Consultants in Salinas - Endpoint Management Solutions Assistance At Home Workers Consulting and Support Services - Salinas - Endpoint Management Systems Guidance Salinas
  • Security Network Security Auditor CISSP Cybersecurity Contractor Southfield-Troy
  • Teleworkers Consulting Services in Fargo - Connectivity Guidance Fargo-Williston, ND Work at Home Employees Consulting nearby Fargo - Integration Consulting Fargo-Fargo, North Dakota

  • Technology Professional Lync Server 2013 Back End Server
    Immediate Lync Server 2013 IM Engineers

    Progent's Microsoft-certified consultants can assist your company to evaluate the benefits of Lync Server for your business and can assist you to plan and carry out a rollout of Lync Server 2010 that centralizes the control of Instant Messaging and Presence and increases the productivity of your office staff, at-home workers, and mobile workforce. Progent's consultant's can in addition assist your company to carry out an efficient migration to Lync Server from Microsoft Office Communications Server or from Microsoft Live Communications Server, interface Lync Server with Exchange Server, SharePoint, and SQL Server, show you how you can use Lync Server 2010 to improve the collaborative capabilities of Microsoft Office programs, and provide webinar training and ongoing technical support for Lync Server and other Microsoft platforms.

  • Top Ranked Dynamics GP VAR in Carlsbad - Business Intelligence Outsourcing Carlsbad-Temecula Dynamics GP-Great Plains Partner nearby Carlsbad - Installation Consultant Carlsbad-Vista, CA, United States
  • Urgent Huntington Beach Dynamics GP Training Consultants Huntington Beach Southern California Huntington Beach Dynamics GP Upgrade Consultants Huntington Beach, CA
  • Vitória Ryuk Crypto-Ransomware Remediation Consultants Vitória Ryuk Crypto-Ransomware Cleanup Experts Espírito Santo
  • West Palm Beach Nephilim Ransomware Operational Recovery West Palm Beach-Boynton Beach West Palm Beach Locky Crypto-Ransomware System-Rebuild West Palm Beach-Boynton Beach, FL
  • Windows Server 2016 Network Services Western New York Rochester Windows Server 2016 Repair Rochester, NY

  • 24-7 ransomware rebuild Consultants
    Nephilim ransomware recovery Professional

    Progent's ransomware experts can assist your business to evaluate your ransomware defenses, monitor and protect your IT environment, help with settlement negotiations with a hacker, and reconstruct a network victimized by a ransomware cryptoworm like Ryuk, Maze, Sodinokibi, DopplePaymer, LockBit or Egregor.

    © 2002-2023 Progent Corporation. All rights reserved.