SentinelOne Dealer and Solutions ConsultantsSentinelOne's Singularity product family is a subscription-based, cloud-centered cyberthreat defense stack that includes computer learning algorithms and advanced services to deliver comprehensive endpoint detection and response (Singularity Control and Complete) and managed detection and response (Singularity Complete with Vigilance MDR). SentinelOne's small-footprint software agents can be loaded in a few minutes to defend endpoints against increasingly sophisticated threats such as ransomware, familiar and new malware, trojans, hacking tools, memory exploits, malicious scripts, invasive macros, and living-off-the-land (LotL) attacks. SentinelOne agents are available for Microsoft Windows, Apple macOS, Linux, and Kubernetes endpoints. Supported form factors include physical, virtual, VDI, customer and hybrid data centers, and cloud service providers. Because SentinelOne agents are autonomous, they are able to deliver cutting-edge behavior-based security in real time even when endpoints are not interfaced to the cloud.

Progent is a SentinelOne Partner and dealer and manages thousands of endpoints secured by SentinelOne Singularity technology. SentinelOne Singularity is invariably the first EDR response tool activated by Progent to gain control and visibility of a client's system in the first stages of a ransomware recovery. SentinelOne is in addition the root technology behind Progent's Active Security Monitoring services. SentinelOne has been recognized as a leading visionary in Gartner's 2022 Magic Quadrant for Endpoint Protection Platforms and attained the highest number of correlated tactics and techniques in real-time during the gold-standard MITRE ATT&CK Phase 4 Evaluation. Gartner concludes, "This reaffirms its (SentinelOne's) ability to detect all attacks and provide full details of the techniques and tactics used." SentinelOne also outscored all competition for every use case in Gartner's assessment of Critical Capabilities for Endpoint Protection Platforms (EPPs).

Singularity Packages for SentinelOne Endpoint Detection and Response
SentinelOne's Singularity family has several levels of endpoint protection product packages delivered as a global SaaS solution that delivers high availability, centralized policy management, AI powered malware intelligence, rapid recovery, and an information-driven dashboard for cyberthreat analytics. Bundles include Control for enhanced management, Complete for automated root cause analysis, and Complete with Vigilance MDR for 24/7 advanced monitoring and response. The product tiers are incremental. Control and Complete each have all the features of the tier below it. Subscription rates begins at $10 per endpoint per month for smaller clients with significant discounts for larger deployments. There is no minimum endpoint count.

The SentinelOne Control Package
The SentinelOne Control Package is the base software and is 100% maintained by the client. For some examples: Endpoint agents need to be updated in the SentinelOne portal, allow rules need to be set, exclusions need to be made, blacklists should be created, threats must be responded to, and many other day-to-day activities that someone in your organization needs to manage and maintain. SentinelOne is just like any other security product in that it has frequent updates to keep its defenses current. Progent can assist with or directly handle these items, but there is additional time and materials billing for all services performed.

With the Control Package you manage your own portal and while Progent and SentinelOne personnel are monitoring and or receiving alerts of serious threats in your environment, we have no authorization to do any work in your environment and will only do best efforts to alert you in case of a serious threat.

Major Features of the SentinelOne Control Package include:

  • Endpoint Prevention (EPP) to block a broad range of malware, Trojans, hacking tools, and ransomware before they can get a foothold
  • ActiveEDR Basic for Endpoint Detection and Response operates in real-time with or without cloud connectivity. ActiveEDR identifies highly sophisticated malware, memory exploits and other fileless assaults as they attempt to do damage.
  • ActiveEDR Recovery gets users back in business quickly and features full remediation as well as rollback for all supported versions of MS Windows.
  • Device Control for Policy-based control of all USB and Bluetooth devices (Windows, Mac)
  • Firewall Control for Policy-based control of network connectivity to and from assets, including location awareness (Win, Mac, Linux)
  • Vulnerability Management, along with Application Inventory, for details of 3rd party apps with recognized security gaps mapped to the MITRE CVE security database
  • Full Secure Remote Shell capability for direct endpoint access by event responders and forensics personnel
  • Autonomous SentinelOne agent Storyline Engine
  • Simultaneous Static AI and SentinelOne Cloud Intelligence file-based assault prevention
  • Behavior-based AI fileless attack detection
  • Autonomous Threat, Remediation, and Rollback Response
  • Quarantine device from system, Incident Analysis, Agent Anti-tamper, App inventory
  • Rogue device discovery
The SentinelOne Complete Package
The SentinelOne Complete Package includes all the basic features and operates with the options of the Control package and adds single-agent advanced endpoint detection and response (EDR), hunting for all endpoints, cloud, and IoT. The bundle saves significant time for cybersecurity administrators, security operations center (SOC) analysts, threat hunters, and incident responders by automatically correlating incidents and mapping it into the MITRE ATT&CK framework to determine root causes. The SentinelOne Complete Package offers an advanced EDR feature set:
  • Co-Managed solution with Progent being sent alarms and notifications of all threats and activities in your environment. Customers are responsible for reacting to threats in their environment and optional help time and material is offered from Progent
  • ActiveEDR Advanced adds visibility of all benign data.
  • ActiveEDR Advanced adds enterprise threat hunting. SentinelOne stands out by the the ease-of-use characterized by the active quality of the solution in autonomously responding to threats.
  • Storyline feature for Automated Forensics and quick root cause analysis. All OS stories are automatically contextualized with SentinelOne’s patented TrueContext technology, simplifying analysts' complex job of event correlation before they can get to root causes with reduced MTTR.
  • Storyline Active Response (STAR) combats zero-day threats with customized detection and hunting rules.
  • Deep visibility Storyline Pivot and Hunt by MITRE ATT&CK technique
  • EDR Hunting Data retention ranging from 14 days standard to 365 days optional
  • Timelines, file fetch, file integrity monitoring, sandbox integrations
  • Other response alternatives are available and personalized to your requirements. Includes an hour of training in advanced features and routine management of the SentinelOne portal. During this training, Progent will train in the creation of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts.
Options for the SentinelOne Singularity Complete Package package include adding software-defined network discovery and aggregated active/passive device mapping through SentinelOne's Vigilance with MDR package plus elimination of agent installation gaps with configurable job automation. Progent can also provide monthly customer portal checks and threat cleanup guidance.

Complete with Vigilance Respond Managed Detection and Response Services
Vigilance Respond and Vigilance Respond Pro are add-on MDR services for subscribers to the Singularity Complete package. These bundles include digital forensics and full 24x7 incident response provided by Tier-1, Tier-2, and Tier-3 IT security professionals. Vigilance Respond services include validation of threats, event prioritization, false positive management and console cleanup, proactive threat deactivation, management reporting, SLAs, and escalation to the customer's cybersecurity team.

Vigilance MDR consultants classify detected threat notifications based on a hierarchy ranging from Benign False Positive to Malicious Urgent. This classification determines how the analyst responds to the threat. There are five categories of threats and consequent responses. Most alerts do not require a response by the customer.

Benign Alert - False Positive
Vigilance takes care of the issue and annotates the SentinelOne console. For single False Positive alerts, no other actions or alerts are necessary. For persistent False Positive alerts, Vigilance will escalate the issue to the customer to offer or approve an appropriate exclusion or agent update as needed.

Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program
Vigilance takes action to ensure the threat is blocklisted, resolved, and annotated. Usually, no alert will be sent to the customer unless the threat calls for additional work.

Malicious Alert - True Positive / No Action Necessary
Vigilance performs proper actions including remediation to make sure the threat is quarantined. Once the analyst verifies the threat is deleted, the analyst will send a confirmation alert to the client.

Malicious Alert - True Positive Non-Urgent / Action Needed
Vigilance performs proper actions including remediation to ensure the threat is quarantined. After the analyst verifies the threat is deleted, the analyst will transmit a confirmation alert to the client. Subsequent activity like re-imaging may be necessary in certain cases.

Malicious Alert - True Positive Urgent / Action Needed
Vigilance may react strongly in high priority breach incidents including pursuing agent remediation actions and isolating affected network endpoints to stall the attack and block further lateral movement and spread. The analyst will transmit a proactive alert apprising the customer of the situation and ask for immediate response.

In addition to providing all the features of SentinelOne Control and SentinelOne Complete, SentinelOne Complete with Vigilance MDR adds 24x7 Monitoring with Immediate Threat Response, Remote Script Orchestration, and Ranger:

  • Co-Managed Solution with Progent seeing warnings and notifications of all threats and activities in your system and combined SOC response, delivering 3 levels of 24x7x365 Detection and Response. Threats are mitigated and responded to in close to real-time. Extra remediation alternatives following threat mitigation are available and customized to your organization's requirements.
  • Remote Script Orchestration enables enterprises to send scripts to one machine, several machines, or even millions of machines, to respond to current and future cyberattacks instantly. Security Teams can dispatch custom scripts or choose from a broad selection of jobs – ranging from incident response to forensics artifact collection and even IT administration. In conjunction with SentinelOne Storyline Active Response (STAR), analysts benefit from automated workflows that take incident response to a higher level.
  • Ranger allows unmatched visibility into your system. Ranger is network-efficient by intelligently designating a small number of SentinelOne agents per subnet to participate in network mapping missions. Elected "Rangers" passively track network broadcast data such as ARP, DHCP, and other network observances. Admins can customize current scan policies and specify multiple IP Protocols for learning including ICMP, SNMP, UDP, TCP, SMB, and more. Rangers correlate all learned information within the backend to fingerprint known and unfamiliar devices. Ranger device inventories reveal what is connected to your system, where they are connected, and which protocols the devices listen on. Ranger enables you to expose and eliminate SentinelOne Agent deployment oversights using Ranger Deploy, a peer-to-peer deployment (Windows, Mac, Linux). Ranger allows you to monitor how unknown devices communicate with managed hosts and isolate suspect devices from managed devices with a single click.
Includes one hour of training in advanced features and day-to-day management of the SentinelOne portal. During this time, Progent will instruct clients in the creation of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts. Progent can provide custom additional instruction for your organization's needs on a time and materials basis.

Download Progent's SentinelOne Singularity Packages Datasheets
See datasheets describing Progent's SentinelOne Singularity products and services:

Why Progent?
Progent's roster of more than 150 consulting professionals includes experts in every facet of information technology related to small and mid-size businesses. With this breadth of expertise, Progent can be your single point of contact for integrating a cohesive cybersecurity solution that offers immediate business value. In addition to the endpoint security available from SentinelOne products, Progent offers a variety of managed services and specially-priced support packages created to assist small and mid-size businesses to plan, deploy, validate, and administer networks that deliver enterprise-class security and low total cost of ownership.

Progent has in-depth experience with all the endpoints, servers and VMs that can be secured by SentinelOne products. Progent can provide services that include Windows 11 planning and migration consulting, Windows 10 integration, Linux integration, Mac OS X and macOS consulting, iPhone and iPad configuration, Android consulting, Windows Server 2022 integration consulting, Windows Server 2019 integration expertise, Hyper-V virtualization consulting, and VMware vSphere support consulting.

For single-click or manual rollback capability, Progent's Windows Server experts can assist you to configure Windows Volume Shadow Copy Service (VSS). Progent also offers online and onsite support from certified Cisco CCIE consultants to assist you to plan, protect or debug your network infrastructure. If your network incorporates cloud resources, Progent can provide the guidance of Microsoft Azure experts, Amazon AWS consultants, and Google Cloud integration consultants.

Contact Progent about SentinelOne Sales and Configuration Services
To find out more about how Progent can help you to purchase or configure SentinelOne endpoint security products, call 1-800-993-9400 or visit Contact Progent.



An index of content::

  • Best At Home Workforce Baltimore Consulting Experts - Help Desk Call Center Solutions Guidance Port of Baltimore Baltimore Downtown After Hours Teleworkers Consulting Experts nearby Baltimore - Help Desk Solutions Consulting Experts
  • Best Remote Workers Jundia Consulting Experts - Help Desk Augmentation Consulting Experts Jundiai Jundia Remote Workforce Help Desk Augmentation Consulting Jundiai, SP
  • BlackBerry BES Server IT Consultant BlackBerry Desktop Manager Engineers
  • Brighton At Home Workers Endpoint Management Tools Guidance Brighton Brighton Remote Workforce Brighton Consulting Experts - Endpoint Management Tools Guidance
  • Charleston Mount Pleasant Charleston Work from Home Employees Endpoint Security Systems Consultants Charleston Work at Home Employees Endpoint Security Systems Consulting Charleston Mount Pleasant
  • 24/7/365 SentinelOne Virus Recovery Experts Onsite Technical Support
  • Cisco Integration Group Ciudad de Mxico Cisco Network Design Mexico City
  • Computer Consultants SharePoint Server 2007 Roseville-Citrus Heights, California Roseville-North Highlands Microsoft SharePoint 2010 Support and Help
  • SentinelOne Singularity XDR Consultants
  • Computer Outsourcing Consultant Raleigh-Wake County Award Winning Raleigh, North Carolina Network Design and Configuration
  • Consultants for Computer Support Firms in Vacaville - Temporary Support Staff Augmentation Vacaville Solano County Consulting Experts for Network Service Providers nearby Vacaville - Temporary Support Team Help Fairfield CA
  • Estado de Pernambuco Recife Lockbit Ransomware Forensics Recife Ryuk Ransomware Forensics Investigation Estado de Pernambuco

  • Windows Server 2022 Cybersecurity Specialist
    Online Support Services Windows Server 2022 Hybrid Configuration

    Progent's certified Windows Server 2022 consultants can help your company to design and implement an efficient upgrade to Windows Server 2022 using a self-hosted deployment architecture or a hybrid deployment model that combines cloud-based Windows Server Online with an on-site installation of Windows Server 2022.

  • Exchange Server 2000 Upgrade Consultants 24x7 Exchange 2000 Server Upgrade Consultant
  • SentinelOne Singularity Control Reseller Information Technology Consulting
  • Fresno Work at Home Employees Management Solutions Consulting and Support Services Fresno, CA Remote Workers Fresno Guidance - Management Solutions Consulting Experts Fresno, CA

  • SCCM Endpoint Protection Technology Consulting
    SCCM Migration Technical Consultant

    Configuration Manager automates software provisioning and updating, simplifies security and compliance settings control, keeps track of network assets, protects against corporate data leakage, performs health monitoring, allows safe end-user self service, and delivers a common point of control for managing multi-operating system ecosystems based on on-premises, cloud, or hybrid deployment models. Progent's Microsoft-certified SCCM consulting team and Microsoft Azure cloud integration experts can help your organization with any facet of designing, installing, using and repairing a System Center Configuration Manager solution for on-premises, cloud, or hybrid networks.

  • Houston, TX, San Antonio, TX, Dallas-Fort-Worth, TX, Austin, TX Solution Providers Texas IT Specialists

  • wireless IP phones and Cisco Unified Communications Manager Support and Setup
    wireless VoIP phones and Meraki APs Information Technology Consulting

    Progent's Cisco Wi-Fi VoIP phone configuration and troubleshooting experts can provide remote and on-premises support to help your organization build and administer a Cisco wireless IP phone solution by providing integration services that can range from troubleshooting the set up of an IP phone or access point to offering project management outsourcing or co-sourcing for modernizing the Wi-Fi architecture of an entire campus.

  • SentinelOne Ransomware Rollback Technology Professional
  • IT Staffing Temps for Network Service Organizations West Palm Beach-Lake Worth, Florida West Palm Beach IT Staff Augmentation Help West Palm Beach-Boynton Beach
  • IT Staffing for IT Support Teams Nashville Goodlettsville Nashville Goodlettsville 24 Hour Nashville IT Staff Augmentation Services
  • SentinelOne XDR Specialists
  • Immediate SharePoint Technical Support Services Las Vegas Nevada, America Las Vegas Nevada Open Now Microsoft SharePoint Server 2010 Support Outsourcing
  • Largest Data Protection Manager Support and Setup Network Consulting SCDPM Backup and Recovery
  • Maricopa County Arizona Chandler Microsoft Dynamics GP Implementation Expert Chandler Dynamics GP-Software Customization Support Chandler, AZ

  • Flex Series Wireless Controller Consultant Services
    3504 wireless controller Computer Consultant

    Cisco's Catalyst Wi-Fi controllers streamline the administration of Wi-Fi networks by unifying the configuration and management of Wi-Fi APs, tuning wireless throughput by reducing the impact of radio frequency congestion, enhancing Wi-Fi availability with fast auto-failover, and strengthening data security by detecting threats and filtering network traffic based on user type and locale. Progent can assist your business to configure Cisco wireless LAN controllers to manage and monitor Wi-Fi networks of any size. Progent can help you to maintain and debug your current Cisco Wi-Fi environment or carry out an efficient upgrade to Cisco's latest Wi-Fi controller solutions.

  • Microsoft MCTS Support Freelancing Jobs Network Consulting Telecommuter Jobs Lexington, KY
  • Microsoft and Cisco Certified Expert Cambridge-Colchester Small Business Computer Consulting MCSE Expert Certified Support Group Cambridge, U.K.
  • Midland Avaddon Ransomware Repair Midland Midland Egregor Ransomware Rollback
  • SentinelOne Singularity and Vigilance Integration Consultant
  • Mobile, AL Mobile Remote Workforce Help Desk Call Center Solutions Consultants At Home Workers Consulting in Mobile - Call Desk Solutions Consulting and Support Services Mobile Alabama
  • Monterey Work at Home Employees Collaboration Systems Consulting Monterey, CA Monterey Remote Workforce Collaboration Systems Consultants Monterey County
  • Niteri Crypto-Ransomware Forensics Investigation Niteri Niteri Egregor Ransomware Forensics Investigation
  • Pasadena Baytown Missouri City Pasadena Crypto-Ransomware Ryuk Susceptibility Audit Pasadena Crypto-Ransomware DopplePaymer Readiness Testing Pasadena Texas
  • Philadelphia Harrisburg Windows Server 2019 Security Consulting Firms Philadelphia Harrisburg Windows Server 2012 R2 Computer Outsourcing
  • Remote Workers Consulting nearby Chesapeake - Integration Solutions Guidance Telecommuters Expertise in Chesapeake - Support Guidance South Hampton Roads
  • Remote Workers Expertise nearby Glendale - Backup Technology Guidance Dallas Fort Worth Metroplex Glendale Telecommuters Data Protection Solutions Consultants Dallas County
  • Remote Workforce Consulting Services - Recife - Help Desk Call Center Solutions Consulting and Support Services Recife, Pernambuco Work from Home Employees Recife Consulting - Help Desk Call Center Augmentation Consulting Services Recife
  • SCOM Integration Services System Center Operations Manager Support Outsourcing
  • Salt Lake City, Utah Integration Firm Salt Lake City Integration Company
  • San Rafael, CA Teleworkers San Rafael Consulting Experts - Cybersecurity Systems Assistance San Rafael California, USA San Rafael Remote Workers Cybersecurity Systems Consulting
  • SentinelOne EDR Consultants
  • Santos Supplemetary IT Staffing Support Praia Grande, Estado de So Paulo IT Staffing Temps for IT Support Groups
  • Seattle Kirkland Everett, WA Work at Home Employees Consultants near me in Seattle - Infrastructure Expertise Top Rated Seattle Remote Workers Setup Consulting Experts Seattle, WA
  • SentinelOne EDR Professionals
  • Security Cybersecurity Firm San Antonio Airport SAT San Antonio, TX Network Consultants Firewall
  • Security Security Services 24/7 Firewall Network Security Auditor Indianapolis, Marion County, Indiana
  • SharePoint programming Technology Professional Contract Programmer ASP

  • 24x7 CRISC Certified Risk and Information Systems Control Architect Consultants
    Consultant CRISC Certified Risk and Information Systems Control Auditor

    Progent offers the guidance of a CRISC-certified risk management expert to help your company to plan and implement an enterprise risk management solution based on leading practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and budgetary guidelines.

  • Small Office IT Consulting Firm Small Business Network Assessments
  • Southfield At Home Workers Collaboration Systems Consulting and Support Services Southfield-Troy Southfield Work at Home Employees Collaboration Technology Guidance Southfield-Farmington Hills, MI
  • Spartanburg Offsite Workforce Collaboration Technology Expertise Spartanburg-Duncan, SC Work from Home Employees Consulting Services in Spartanburg - Collaboration Technology Assistance Spartanburg-Duncan, South Carolina
  • Specialists Exchange and Apple Mac Information Technology Consulting PST files and Outlook for Mac
  • System Engineers Windows 2008 Server Fresno Madera Windows 2008 Server Specialists California Central Valley
  • Teleworkers Expertise nearby Seattle - Cloud Integration Systems Assistance Seattle Puget Sound Seattle Teleworkers Cloud Systems Consulting Seattle Washington
  • Top Microsoft Exchange Server 2016 Upgrade Planning Technical Support Services Exchange 2016 Migration Planning Specialists
  • Top Ranked Exchange 2003 Server Information Technology Consulting Firms Saddle Brook-Paterson Exchange 2010 Server Technology Consulting Saddle Brook, New Jersey
  • Top Ranked Las Vegas Telecommuters Cloud Integration Technology Consulting and Support Services Clark County Nevada, United States Las Vegas At Home Workforce Cloud Systems Expertise Las Vegas
  • Urgent BlackBerry Exchange Small Business IT Outsourcing Companies Rio Grande do Sul State BlackBerry Smartphone Networking Organization Porto Alegre-Canoas
  • Vancouver IT Staff Augmentation Support Services Vancouver Staffing Help Vancouver

  • © 2002-2024 Progent Corporation. All rights reserved.