SentinelOne Dealer and Solutions ExpertsSentinelOne's Singularity product line is a subscription-based, cloud-centric cyberthreat management platform that includes computer learning software and advanced services to provide comprehensive endpoint detection and response (Singularity Control and Complete) and managed detection and response (Singularity Complete with Vigilance MDR). SentinelOne's low-profile agents can be installed in minutes to defend popular endpoints against modern threats including ransomware, familiar and zero-day malware, trojan viruses, hacking tool sets, memory exploits, malicious scripts, destructive macros, and living-off-the-land (LotL) attacks. SentinelOne software agents are offered for Windows, macOS, Linux distributions, and Kubernetes powered endpoints. Compatible deployment models include physical, virtual, VDI desktops, hybrid data centers, and cloud service providers. Because SentinelOne software agents are autonomous, they can deliver cutting-edge behavior-based security in real time even if endpoints are not interfaced to the cloud.

Progent is a SentinelOne Partner and reseller and oversees thousands of endpoints protected by SentinelOne technology. SentinelOne Singularity is invariably the first EDR response software activated by Progent to gain control and visibility of a customer's network in the first stages of a ransomware recovery. SentinelOne Singularity is also the root EDR software powering Progent's Active Security Monitoring (ASM) services. SentinelOne was recognized as a top visionary in Gartner's 2022 Magic Quadrant for Endpoint Protection Platforms and attained the highest number of analytic detections in real-time with zero delays during the 2022 MITRE ATT&CK Phase 4 Evaluation. According to Gartner's assessment, "This reaffirms its (SentinelOne's) ability to detect all attacks and provide full details of the techniques and tactics used." SentinelOne also outscored all competition for each use case in Gartner's assessment of Critical Capabilities for Endpoint Protection Platforms (EPPs).

Singularity Packages for SentinelOne Endpoint Detection and Response
SentinelOne's Singularity product line offers several tiers of endpoint security product packages provided as a worldwide SaaS solution that delivers high availability, centralized policy management by site and group, AI powered malware intelligence, rapid recovery, and an information-driven dashboard for cyberthreat analytics. Bundles include Control for advanced management, Complete for smart forensics, and Complete with Vigilance MDR for 24/7 advanced monitoring and response. The product tiers are incremental. Control and Complete each have all the features of the level below it. Pricing begins at $10 per endpoint per month for smaller clients with substantial discounts for larger accounts. There is no minimum endpoint requirement.

The SentinelOne Control Package
The SentinelOne Control Package is the base software and is 100% maintained by the client. For some examples: Endpoint agents need to be updated in the SentinelOne portal, allow rules need to be set, exclusions need to be made, blacklists should be created, threats must be responded to, and many other day-to-day activities that someone in your organization needs to manage and maintain. SentinelOne is just like any other security product in that it has frequent updates to keep its defenses current. Progent can assist with or directly handle these items, but there is additional time and materials billing for all services performed.

With the Control Package you manage your own portal and while Progent and SentinelOne personnel are monitoring and or receiving alerts of serious threats in your environment, we have no authorization to do any work in your environment and will only do best efforts to alert you in case of a serious threat.

Major Features of the SentinelOne Control Package include:

  • Endpoint Prevention (EPP) to stop a broad range of malware, Trojans, hacking tools, and ransomware before they can get a foothold
  • ActiveEDR Basic for Endpoint Detection and Response works in real-time even without cloud connectivity. ActiveEDR detects the latest malware, memory exploits and other fileless attacks as they attempt to do damage.
  • ActiveEDR Recovery gets users back in business in minutes and includes full repair plus rollback for all non-legacy releases of MS Windows.
  • Device Control for Policy-based control of all USB and Bluetooth devices (Win, Mac)
  • Firewall Control for Policy-based control of network connectivity to and from assets, including location awareness (Win, Mac, Linux)
  • Vulnerability Management, in addition to Application Inventory, for insight into third party apps that have known security gaps mapped to the MITRE Common Vulnerabilities and Exposures (CVE) security dictionary
  • Secure Remote Shell support for direct endpoint connection by event responders and forensics personnel
  • Autonomous SentinelOne agent Storyline Engine
  • Integrated Static AI and SentinelOne Cloud Intelligence file-based assault prevention
  • Behavior-based AI fileless incursion detection
  • Autonomous Threat, Remediation, and Rollback
  • Quarantine device from network, Incident Analysis, Agent Anti-tamper, App inventory
  • Rogue device discovery
The SentinelOne Complete Package
The SentinelOne Singularity Complete Package includes the basic capabilities and works with the options of the Control package and also includes single-agent advanced endpoint detection and response (EDR), hunting throughout endpoints, cloud, and Internet-of-Things (IoT). The bundle saves substantial time for security admins, security operations center analysts, cyberthreat hunters, and incident responders by automatically correlating incidents and mapping it into the MITRE ATT&CK framework to determine root causes. The SentinelOne Singularity Complete Package provides an advanced EDR feature set:
  • Co-Managed solution with Progent being sent alarms and notifications of all threats and activities in your system. Clients are responsible for resolving threats in their environment and optional support time and material is available from Progent's security experts
  • ActiveEDR Advanced provides visibility of all benign data.
  • ActiveEDR Advanced provides enterprise threat hunting. SentinelOne stands out by the the ease-of-use personified by the active nature of the solution in autonomously reacting to threats.
  • Storyline technology for Automated Forensics and fast root cause analysis. All OS storylines are automatically contextualized with SentinelOne’s patented TrueContext function, streamlining analysts' laborious task of event correlation so they can get to the root cause with reduced MTTR.
  • Storyline Active Response (STAR) mitigates zero-day attacks with customized detection and hunting rules.
  • Deep visibility Storyline Pivot and Hunt by MITRE ATT&CK technique
  • EDR Hunting Data storage ranging from 14 days standard to one year optional
  • Timelines, file fetch, file integrity monitoring, sandbox integrations
  • Other response options are offered and customized to your requirements. Includes an hour of training in advanced features and routine management of the SentinelOne portal. During this time, Progent will train in the specification of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts.
Options for the SentinelOne Complete Package bundle include adding software-defined network discovery and aggregated active/passive device mapping through SentinelOne's Vigilance with MDR package plus elimination of agent installation gaps with configurable job automation. Progent also offers optional monthly client portal checks and threat cleanup advice.

Complete with Vigilance Respond MDR Services
Vigilance Respond and Vigilance Respond Pro are optional Managed Detection and Response (MDR) services for subscribers to the Singularity Complete package. These packages include full 24x7 incident response provided by Tier-1, Tier-2, and Tier-3 cybersecurity professionals. Vigilance Respond subscriptions include confirmation of cyberthreats, event prioritization, false positive management and console cleanup, threat containment, thorough reporting, service level agreements, and escalation back to the client's cybersecurity organization.

Vigilance MDR consultants classify threat notifications according to a hierarchy going from Benign to Urgent True Positive. This ranking dictates how the Vigilance analyst handles the threat. There are five classes of threats and associated responses. Most alerts require no action by the client.

Benign Alert - False Positive
Vigilance resolves the issue and updates the SentinelOne console. For single False Positive alerts, no other actions or notifications are required. For repeated False Positive alerts, Vigilance will escalate the issue to the customer to submit or approve an appropriate exclusion or agent upgrade as needed.

Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program (PuP)
Vigilance takes action to make sure the threat is blocklisted, resolved, and documented. Usually, no notification will be transmitted to the client unless the issue calls for follow up work.

Malicious Alert - True Positive / No Action Needed
Vigilance performs proper actions including remediation to make sure the threat is isolated. After the analyst confirms the threat is deleted, the analyst will transmit a verification alert to the client.

Malicious Alert - True Positive Non-Urgent / Action Needed
Vigilance takes appropriate actions including remediation to make sure the threat is quarantined. Once the analyst confirms the threat is deleted, the analyst will transmit a confirmation alert to the customer. Follow-up procedures like re-imaging may be necessary in some circumstances.

Malicious Alert - True Positive Urgent / Action Necessary
Vigilance may respond strongly in serious breach cases including taking agent remediation actions and disconnecting compromised network devices to isolate the attack and block additional lateral progress. The analyst will send a proactive notification apprising the customer of the issue and ask for immediate response.

In addition to providing all the functions of SentinelOne Control and SentinelOne Complete, SentinelOne Complete with Vigilance MDR adds round-the-clock Monitoring with Immediate Threat Response, Remote Script Orchestration, and Ranger:

  • Fully Co-Managed Environment with Progent seeing warnings and notifications of all threats and activities in your environment and combined SOC response, offering 3 levels of 24x7x365 Detection and Response. Threats are neutralized and responded to in near real-time. Additional remediation options following threat mitigation are available and tailored to your organization's needs.
  • Remote Script Orchestration empowers enterprises to send scripts to one machine, several machines, or even millions of machines, to react to present and future cyberattacks at machine speed. Security Teams can dispatch customized scripts or choose from a broad selection of jobs – ranging from incident response to forensics artifact collection and even network administration. In conjunction with SentinelOne Storyline Active Response, analysts benefit from automated workflows that take incident response to the next level.
  • Ranger enables unmatched visibility into your system. Ranger is network-efficient by intelligently electing a small number of SentinelOne agents per subnet to undertake network mapping activity. Elected "Rangers" passively track network broadcast data including ARP, DHCP, and other network observances. Admins can modify current scan policies and select multiple IP Protocols for learning including ICMP, SNMP, UDP, TCP, SMB, and others. Rangers correlate all learned information in the backend to fingerprint familiar and unfamiliar devices. Ranger device inventories show what is connected to your system, where they are attached, and what protocols the devices listen on. Ranger enables you to find and close SentinelOne Agent deployment gaps with Ranger Deploy, a peer-to-peer deployment (Windows, Mac, Linux). Ranger permits you to monitor how unfamiliar devices communicate with managed hosts and quarantine suspicious devices from managed devices with a click.
Includes one hour of training in advanced features and day-to-day management of the SentinelOne portal. During this time, Progent will instruct clients how to create Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts. Progent offers tailored extra instruction for your company's requirements on a time and materials basis.

Download Progent's SentinelOne Singularity Packages Datasheets
See datasheets about Progent's SentinelOne Singularity packages:

The Progent Advantage
Progent's team of over 150 consulting professionals includes certified experts in every aspect of information technology associated with small and mid-size organizations. With this scope of expertise, Progent can be your single point of contact for building and managing a comprehensive cybersecurity solution that delivers immediate business value. In addition to the endpoint protection available from SentinelOne products and services, Progent offers a catalog of managed services and affordably-priced support packages created to help SMBs to plan, implement, validate, and manage networks that feature enterprise-level cybersecurity and low TCO.

Progent has in-depth experience with all the endpoint devices, servers and virtual machines that can be protected by SentinelOne technologies and services. Progent offers services that include Windows 11 planning and migration expertise, Windows 10 integration, Linux support, Mac OS X and macOS consulting, iPhone and iPad support, Android support, Windows Server 2022 migration expertise, Windows Server 2019 integration consulting, Hyper-V virtualization consulting, and VMware vSphere integration experts.

For single-click or manual rollback capability, Progent's Windows Server experts can assist you to configure Windows Volume Shadow Copy Service (VSS). Progent can also provide remote and onsite support from certified Cisco CCIE consultants to assist you to plan, defend or debug your infrastructure. If your network incorporates cloud assets, Progent offers the support of Microsoft Azure consultants, Amazon AWS experts, and Google Cloud integration consultants.

Contact Progent about SentinelOne Sales and Configuration Services
To learn more about how Progent can help you to buy or configure SentinelOne products, call 1-800-993-9400 or see Contact Progent.



An index of content::

  • 24-Hour BlackBerry Redirector Integration Companies Providence Small Office Server Support BlackBerry Email Providence

  • Tandberg Video Conferencing Consultant
    LifeSize 220 Series Telepresence Consultancy

    Progent can provide the support of a veteran consultant with extensive experience installing, managing, and enhancing immersive telepresence systems from leading suppliers including Cisco, TANDBERG, Polycom, LifeSize, and Radvision. Progent's consultants can work with your internal network support team, your Internet Service Provider, and your telepresence platform vendor to assist your organization increase the strategic value of your telepresence solution.

  • 24x7 Consulting Support for Sherman Oaks IT Service Organizations Sherman Oaks-North Hollywood, CA, U.S.A. Consulting Experts for Network Service Companies nearby Sherman Oaks - Transparent Short-Term Staff Assistance Sherman Oaks-Van Nuys, California, United States
  • Albuquerque Teleworkers Conferencing Systems Consulting Experts Albuquerque Albuquerque Work from Home Employees Video Conferencing Technology Expertise Albuquerque

  • Hornetsecurity Altaro VM Backup IT Consultant
    Hornetsecurity Altaro VM Backup and vSphere Online Consulting

    Altaro VM Backup from Hornetsecurity provides small organizations a dependable and budget-friendly platform for backing up and recovering Hyper-V and VMware-powered VMs. Altaro VM Backup can be deployed in local, remote, multi-site, and cloud-hosted architectures and also enables low-cost cloud backup to Microsoft Azure Block Blob storage. Altaro VM Backup defends against ransomware attacks by leveraging Immutable Cloud Storage. This creates tamper-proof data that cannot be erased or modified by anyone including root users. Progent is a certified Hornetsecurity/Altaro partner and offers a wide range of online or on-premises services to help you to design, install, manage and debug a comprehensive backup and disaster recovery solution based on Altaro VM Backup software. With ProSight DPS Altaro VM Backup, Progent offers a fully managed backup/recovery service based on Altaro VM Backup software.

  • At Home Workers Consultants in Denver - Setup Consulting and Support Services Denver Mile High City Denver, CO Denver Work from Home Employees Setup Guidance
  • At Home Workforce Consulting and Support Services near me in Cleveland - Video Conferencing Technology Consulting Services Cleveland, OH Cleveland At Home Workers Conferencing Technology Expertise
  • At Home Workforce Consulting near Manaus - Cloud Integration Systems Consulting Services Manaus Teleworkers Cloud Integration Systems Consulting and Support Services Manaus, Amazonas

  • Network Integration Enterprise Windows 2003
    Network Consulting Firm Enterprise Active Directory

    For enterprises with branch offices in California or any area covered by Progent's consultants, Progent's Microsoft-Premier network consulting experts and certified Cisco network specialists can provide a range of IT consulting services such as project planning, SOX compliance, site relocations, corporate security, network architecture, on-site or phone-based branch office support, and technical support for data center hosting environments. A Progent IT consultant can show you how to plan a multi-site information system that makes efficient use of colocation services and Internet data centers. Progent's Microsoft Premier engineers can help large corporations plan, integrate and support massive rollouts of updated releases of Microsoft products such as Active Directory, Exchange Server, SharePoint, SQL Server, and Enterprise Windows. Progent's CCIE and CCNP consultants can assist you to deploy Cisco technology for connectivity solutions that incorporate basic, high-speed, integrated, and remote networking.

  • At Home Workforce Detroit Consulting Services - Help Desk Outsourcing Expertise Wayne County Michigan Detroit, MI At Home Workforce Consultants - Detroit - Help Desk Call Center Solutions Consulting Services

  • Chief Information Officer Integration Support
    Emergency Microsoft and Cisco Authorized Expert Part-Time CIO Integration Support

    Progent can supply small businesses with an IT management expert who can act as a part-time Chief Information Officer. This part-time Chief Information Officer can provide strategic direction to help you deploy sensible technology to improve business processes so they align more closely with your corporate goals. Your business can create and implement a well thought out information technology plan without absorbing the cost of a full-time senior IT executive.

  • Audit CISSP Fresno Madera Fresno Audit CISSP
  • Award Winning Miami Teleworkers Endpoint Management Solutions Guidance Coconut Grove 24 Hour Remote Workforce Consulting Services nearby Miami - Management Systems Assistance South Beach
  • Award Winning Work from Home Employees Consulting and Support Services nearby Recife - Backup/Restore Systems Consulting and Support Services Recife, Estado de Pernambuco Recife, Pernambuco Work from Home Employees Assistance near Recife - Backup/Restore Solutions Consulting Services

  • Forefront TMG Consultant Services
    Computer Consultants Microsoft Forefront TMG 2010

    Forefront Threat Management Gateway 2010 builds on the proven security technologies of Microsoft Internet Security and Acceleration Server 2006 and offers a easily administered Internet gateway that delivers a single-server solution for a variety of security functions including an application and network layer firewall, URL filtering, malware inspection, IPS, reputation services, VPN control, and HTTP/HTTPS inspection. Forefront TMG 2010 includes advanced web security reporting features, allows custom reports generated by Microsoft SQL Server, works with Active Directory to streamline authentication, and can be deployed as a virtual machine to cut expenses and improve availability. Progent's Microsoft-certified consultants can help you to design and execute pilot and production implementations; integrate Microsoft Forefront TMG 2010 with Windows 2008, AD, Microsoft SQL Server, Microsoft Exchange Server, and Microsoft SharePoint 2010; set up Forefront Threat Management Gateway to operate on a virtual server with Microsoft Windows Hyper-V; and deliver continuing support and troubleshooting. Progent's consultants can also help your organization to upgrade economically to Forefront TMG 2010 from Microsoft ISA Server 2006 or 2004.

  • BlackBerry Email Network Support Technician Lakeland Florida BlackBerry Smartphone Consultancy Services Company Lakeland-Lakeland, Florida

  • SCCM 2012 Migration Consulting
    Emergency SCCM 2012 Patch Management Professional

    Progent's Microsoft-certified consultants can assist you to prepare for, implement, and administer Microsoft System Center 2012 R2 Configuration Manager (SCCM 2012). Progent can help you to migrate efficiently to SCCM 2012 from a legacy device and application management solution or help you to modify your existing SCCM 2012 ecosystem to support your evolving IT needs. Also, Progent can help you to create an infrastructure that fully supports SCCM by delivering expertise with associated Microsoft technologies including ADDS, Microsoft SQL Server and SQL Server Reporting Services, and Internet Information Services.

  • BlackBerry Smartphone IT Service Providers Midland County Texas Setup Service BlackBerry BES Server
  • Chatsworth Crypto-Ransomware Ryuk Susceptibility Report Chatsworth-Canoga Park, California Chatsworth Crypto-Ransomware Avaddon Vulnerability Report
  • Cincinnati Remote Workers Collaboration Technology Expertise Cincinnati, OH Work from Home Employees Consulting Experts near me in Cincinnati - Collaboration Technology Consulting Services Cincinnati, OH
  • Cisco Small Business IT Consulting Companies Kansas City, Jackson County Emergency Cisco Computer Systems Consulting Kansas City Missouri
  • Computer Engineer Microsoft SharePoint Server 2013 Fairfield County Connecticut Microsoft SharePoint Server Technology Consulting Services Stamford Norwalk Shelton
  • Consultant Solaris Remote Network Design Consultant UNIX Online
  • Dallas DopplePaymer Ransomware Recovery Dallas Texas, USA Dallas Crypto-Ransomware Malware Cleanup Dallas - Irving Texas, United States
  • Livermore Cisco Troubleshooters San Ramon CA, United States Cisco Networking Help
  • Londrina Work at Home Employees Backup/Recovery Solutions Consultants Londrina Remote Workers Backup/Restore Systems Consulting Londrina, Paraná

  • Online Consulting Fault Tolerant Internet Data Center
    High Availability Data Center Technology Consulting Services

    Progent's Data Center professionals can show you how to select fault-tolerant data centers that match the specific requirements of your business. High availability off-site data centers are particularly appealing to small companies because of their low cost and convenience compared to pursuing a do-it-yourself approach. Trying to create an on-site data center with even a minimum level of fault tolerance is too costly for typical small organizations. Progent can show you how to reap all the advantages of non-stop data centers and 24x7 colo sites by providing a complete array of consulting and support services.

  • Lynnwood Telecommuters Help Desk Augmentation Expertise Lynnwood-Edmonds Lynnwood Telecommuters Help Desk Call Center Augmentation Consulting Experts Lynnwood-Edmonds, Washington
  • Microsoft Office SharePoint Server 2019 Remote Support Office SharePoint Server 2016 Support Services
  • Midland Snatch Crypto-Ransomware Business-Recovery Midland Odessa Midland Lockbit Crypto-Ransomware Business-Recovery Midland, TX
  • Milwaukee Wisconsin Technology Consultancy Firm Microsoft and Cisco Certified Expert Milwaukee, WI, Madison, WI, Green Bay, WI, Kenosha, WI Computer Installation
  • Morgan Hill Telecommuters Support Consulting and Support Services Morgan Hill, CA Morgan Hill Teleworkers Connectivity Solutions Consultants Gilroy CA
  • Network Consultant Ekahau On-premises Wi-Fi Site Survey Support Services Ekahau Wi-Fi Site Survey
  • Offsite Workforce Sarasota Consulting - Endpoint Management Tools Consultants Fargo-Cass County, ND Fargo-Minot, ND Telecommuters Sarasota Consulting - Management Solutions Consultants
  • Orlando DopplePaymer Crypto-Ransomware Negotiation Guidance Orlando, FL Orlando Ryuk Crypto-Ransomware Settlement Negotiation Helpn Orlando
  • ProSight Endpoint Protection Engineer Professionals Signature-matching Virus Protection
  • Recife Lockbit Ransomware Forensics Analysis Estado de Pernambuco Recife Netwalker Ransomware Forensics Analysis
  • Remote Workforce Consultants nearby Sarasota - Backup/Recovery Systems Consulting Experts Fargo ND Teleworkers Consultants nearby Sarasota - Backup/Restore Technology Expertise Fargo North Dakota
  • Rochester After Hours Telecommuters Rochester Expertise - Backup Technology Consulting Remote Workers Expertise near Rochester - Backup Solutions Consultants Rochester New York, United States
  • Roseville Work from Home Employees Solutions Assistance Roseville-Citrus Heights, CA Telecommuters Roseville Assistance - Integration Assistance Roseville-Placer County, California

  • Wireless Integration Case Study
    Wireless Case Study

    Progent provided a wireless integration environment that enabled a school to improve productivity and eliminate the ongoing costs of a dedicated data connection. Progent proposed a Proxim Tsunami high-speed wireless bridge. The low-cost building-to-building Proxim wireless bridge is intended for connecting remote locations up to 2.5 miles apart and can reach even greater ranges. This wireless solution offered improved bandwidth and dependability than simply amplifying the 802.11b wireless connection, and since it uses the 5.8Ghz spectrum it offered immunity to local interference.

  • Short-Term IT Staffing Support Consulting Specialist San Diego-University City Open Now IT Staff Augmentation for Computer Support Groups San Diego-UCSD

  • Snatch ransomware hot line Consultants
    Consulting Maze ransomware hot line

    Progent's Ransomware Hot Line provides 24x7 access to a proven ransomware recovery consultant who can help you to halt the progress of an active ransomware attack. Call 800-462-8800

  • Solano County Server Installation Solano County Small Office Server Support
  • Teleworkers Wichita Consulting - Integration Expertise Wichita Remote Workforce Consulting Services near me in Wichita - Setup Expertise Wichita Airport ICT
  • Top SQL Server 2012 Network Engineers New Haven County Connecticut Microsoft SQL Server Network Consulting Experts New Haven
  • Tucson Offsite Workforce Cybersecurity Systems Expertise Pima County After Hours Tucson At Home Workforce Security Systems Expertise Tucson, AZ

  • Palo Alto Networks PA-3000 Series Firewalls Consulting Services
    Firewall Audit Palo Alto Networks PA-5200 Series Firewalls

    Progent's Palo Alto Networks firewall experts can show you how to choose, configure, and manage Palo Alto Networks firewalls to create a modern security ecosystem that extends across your data center and cloud resources and protects all users at any location with any device.


    © 2002-2025 Progent Corporation. All rights reserved.