SentinelOne Reseller and Configuration ConsultantsSentinelOne's Singularity product line is a subscription-based, cloud-centric cyberthreat management stack that includes computer learning software and professional services to provide enterprise-class endpoint detection and response (Singularity EDR) and extended detection and response (Singularity XDR). SentinelOne's low-profile agents can be installed in a few minutes to defend popular endpoints against modern cyberthreats including ransomware, known and new malware, trojan viruses, hacking tool sets, memory exploits, malicious scripts, destructive macros, and living-off-the-land (LotL) attacks. SentinelOne agents are offered for Windows, Apple macOS, Linux distributions, and Kubernetes powered endpoints. Supported deployment models include physical, virtual, VDI, customer and hybrid data centers, and cloud service providers. Since SentinelOne software agents are autonomous, they can deliver advanced behavior-based security in real time even during periods when endpoints are not cloud connected.

Progent is a SentinelOne Partner and reseller and manages thousands of endpoints protected by SentinelOne Singularity technology. SentinelOne is always the first endpoint response tool activated by Progent to provide control and visibility of a customer's network in the first stages of a ransomware emergency. SentinelOne is in addition the key technology powering Progent's Active Security Monitoring (ASM) managed services. SentinelOne was recognized as a leading visionary in Gartner's 2022 Magic Quadrant for Endpoint Protection Platforms and attained the most high-quality detections in real-time during the 2022 MITRE ATT&CK Phase 4 Evaluation. Gartner concludes, "This reaffirms its (SentinelOne's) ability to detect all attacks and provide full details of the techniques and tactics used." SentinelOne also surpassed all competition for each use scenario in Gartner's assessment of Critical Capabilities for Endpoint Protection Platforms.

Singularity Bundles for SentinelOne Endpoint Detection and Response
SentinelOne's Singularity product line offers three levels of endpoint security product bundles delivered as a global SaaS solution that delivers high availability, centralized policy management, AI driven threat intelligence, fast restoration, and an information-driven dashboard for cyberthreat analytics. Bundles consist of Core for basic protection, Control for enhanced management, and Complete for smart forensics. The feature sets are additive. Control and Complete each have all the features and options of the tier beneath it. Subscription rates starts at $5 for each endpoint per month for smaller clients with appropriate discounts for bigger accounts. There is no minimum device requirement.

Singularity Core offers traditional AV and next-generation anti-virus support and features fundamental Endpoint Detection and Response (EDR). Standard capabilities of Core include:

  • Autonomous agent Storyline technology
  • Built-in static AI and SentinelOne Cloud Intelligence file-based attack defense
  • Behavioral analysis to identify fileless attacks
  • Autonomous Threat Response / Kill, Quarantine (Win, Mac, Linux)
  • Autonomous Remediation Response / 1-Click, no scripting (Win, Mac)
  • Autonomous Rollback / 1-Click, no scripting (Win)
  • Isolate device from network
  • Incident Analysis (MITRE ATT&CK, timeline, explorer)
  • Agent tamper prevention
  • App inventory
Add-ons available for the Singularity Core bundle include software-defined network discovery and aggregated active/passive device mapping via SentinelOne's RANGER package, closure of agent deployment gaps with configurable job automation via the Singularity RANGER PRO package, rogue device discovery, and cloud workload protection for containers and VMs via the Singularity Cloud package. (Note: SentinelOne Singularity Core is not currently sold by Progent. This package does not by itself provide the threat visibility features needed by Progent to co-manage the cybersecurity of the client deployment.)

Singularity Control includes all the basic features and supports all the options of the Core bundle and adds capabilities for enhancing endpoint management such as secure remote shell, OS firewall control with location awareness (Win, Mac, Linux), device control for USB and Bluetooth/Bluetooth Low Energy peripherals (Win, Mac), and app vulnerability.

Add-ons available for the Singularity Control package include the ability to isolate potentially dangerous devices using SentinelOne's Singularity RANGER package plus automated app management for Kubernetes through SentinelOne's Singularity Cloud package.

Singularity Complete includes all the standard features and allows all the options of the Control package and adds single-agent enterprise-grade prevention, detection, reaction and hunting across endpoints, cloud, and IoT. The bundle saves significant work for security administrators, SOC analysts, threat hunters, and attack responders by automatically correlating telemetry and using it with the MITRE ATT&CK database to expose root causes. Complete offers an advanced EDR feature set that includes:

  • SentinelOne's Storyline technology with auto correlation of alerts for rapid forensic analysis (RCA)
  • SentinelOne's Storyline Active Response (STAR) to mitigate emerging zero-day cyberthreats with custom, automated rules for threat detection and hunting
  • Built-in ActiveEDR visibility to benign as well as harmful data
  • Storyline hunt and pivot utilizing MITRE ATT&CK technique
  • EDR Hunting Data retention options from two weeks (standard) to 365 days (special option)
  • File integrity monitoring
  • Timelines, file fetch, sandbox integrations
Options for SentinelOne's Singularity Complete package include Cloud Funnel for downloading endpoint telemetry from the SentinelOne cloud to your data lake, the capability to send malicious and benign executables to the SentinelOne cloud for automated analysis, and automated App control for Linux VMs.

Vigilance Respond Managed Detection and Response (MDR) Services
Vigilance Respond and Vigilance Respond Pro are add-on MDR services for subscribers to SentinelOne's Singularity Complete package. These packages include digital forensics and full 24x7x365 incident response provided by Tier-1, Tier-2, and Tier-3 IT security experts. Vigilance Respond subscriptions include confirmation of cyberthreats, event prioritization and triage, false positive handling and console updating, threat containment, thorough reporting, service level agreements, and escalation back to the client's cybersecurity team. Pricing averages around $17 per device per month and there is no minimum device requirement.

Vigilance Respond Pro includes a two-times faster SLA, appointed IR case managers, root cause analysis (RCA), incident-driven threat hunting, digital forensics with malware reversing, expert containment and eradication, comprehensive security assessment including security architecture, plus post-mortem analysis. In most cases, Vigilance Respond Pro interprets and resolves threats in minutes and only gets in touch with subscribers for urgent issues. Since these services rarely call for the participation of the Vigilance Respond client, customers are able to focus on strategic tasks rather than routine cybersecurity issues.

Vigilance MDR consultants classify detected threat notifications according to a threat-handling hierarchy ranging from Benign False Positive to Urgent True Positive. This classification dictates how the Vigilance analyst handles the threat. There are five categories of threats and associated responses. The majority of alerts require no a response by the customer.

Benign Alert - False Positive
Vigilance takes care of the issue and updates the SentinelOne dashboard. For single False Positive alerts, no additional actions or notifications are necessary. For repeated False Positive alerts, Vigilance will escalate the issue to the customer to offer or approve a proper exclusion or agent upgrade as needed.

Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program (PuP)
Vigilance takes action to make sure the threat is blacklisted, resolved, and documented. Typically, no notification will be transmitted to the client unless the issue calls for additional work.

Malicious Alert - True Positive / No Action Necessary
Vigilance takes proper actions including remediation to make sure the threat is isolated. Once the analyst confirms the threat is deleted, the analyst will send a confirmation notice to the client.

Malicious Alert - True Positive Non-Urgent / Action Necessary
Vigilance performs proper actions including remediation to ensure the threat is quarantined. Once the SentinelOne analyst confirms the threat is deleted, the analyst will transmit a confirmation alert to the client. Subsequent activity such as re-imaging may be required in some cases.

Malicious Alert - True Positive Urgent / Action Necessary
Vigilance may react aggressively in serious breach incidents including pursuing agent remediation actions and disconnecting compromised network devices to stall the attack and prevent further lateral movement and spread. The analyst will transmit a proactive alert informing the customer of the situation and request immediate response.

Download Progent's Singularity Control and Complete Comparison Datasheet
To see a one-page printable datasheet in PDF format describing SentinelOne's Singularity Control and Singularity Complete endpoint detection and response bundles, click:
Progent's Singularity Control and Singularity Complete EDR Datasheet. (PDF - 340 KB)

Why Progent?
Progent's team of more than 150 consultants includes experts in every facet of information technology related to small and mid-size organizations. With this breadth of expertise, Progent can be your one-stop source for integrating a comprehensive cybersecurity environment that delivers significant business value. In addition to the endpoint security available from SentinelOne products and services, Progent offers a variety of managed services and specially-priced IT support packages designed to help small and mid-size businesses to plan, deploy, validate, and manage networks that feature enterprise-level cybersecurity and low total cost of ownership.

Progent has expertise in all the endpoints, servers and virtual machines that can be protected by SentinelOne products. Progent can provide services that include Windows 11 migration expertise, Windows 10 integration, Linux support, Mac support, iPhone and iPad integration, Android consulting, Windows Server 2022 migration expertise, Windows Server 2019 integration consulting, Hyper-V virtualization support, and VMware vSphere integration consulting.

For single-click or manual rollback, Progent's Windows Server consultants can assist you to configure Windows Volume Shadow Copy Service (VSS). Progent also offers remote and on premises access to certified Cisco CCIE experts to assist you to plan, protect or troubleshoot your infrastructure. If your network relies on cloud resources, Progent can provide the support of Microsoft Azure consultants, Amazon AWS consultants, and Google Cloud integration experts.

Contact Progent about SentinelOne Sales and Configuration Services
To learn more about how Progent can assist you to purchase or configure SentinelOne products, call 1-800-993-9400 or see Contact Progent.



An index of content::

  • 24/7 Uberlândia Snatch Ransomware Operational Recovery Uberlândia Netwalker Crypto-Ransomware Remediation
  • 24x7 Jersey City Dharma Crypto-Ransomware Mitigation Hudson County New Jersey Jersey City MongoLock Crypto-Ransomware Repair Hudson County New Jersey
  • Allen County Indiana Fort Wayne 24x7x365 Crypto-Ransomware Recovery Fort Wayne Emergency Crypto-Ransomware Cleanup Support Services Fort Wayne Indiana
  • SentinelOne Ransomware Rollback Professionals
  • At Home Workers Consulting Services nearby Raleigh - Call Desk Solutions Consulting Experts Raleigh Work from Home Employees Expertise - Raleigh - Call Desk Solutions Consulting Services Raleigh North Carolina, US

  • Database Application Development Technology Professional
    Database Programming On-site Support

    Progent's certified database consultants offer small and midsize businesses remote DBA and programming services for leading RDBMS platforms such as Microsoft SQL Server, Oracle, MySQL, and Microsoft Office Access. Consulting support offered by Progent include software installation and integration, application design and coding, management services, synchronization solutions, capacity planning, performance tuning, migration, information security, backup and recovery options, troubleshooting, and training.

  • SentinelOne Computer Virus Forensics Experts Consultants
  • BlackBerry Synchronization Network Architect Houston, TX Immediate BlackBerry Desktop Manager System Engineers Greenspoint, Houston
  • Buffalo, New York Network Assessments IT Consultants Buffalo
  • CISSP Security Firms Downers Grove-Naperville Firewall Firewall Configure Downers Grove-Bolingbrook
  • Cambridge At Home Workforce Support Expertise Bedford Cambridge Remote Workers Connectivity Consulting and Support Services Cambridgeshire, East of England
  • Carlsbad, CA BlackBerry Email Tech Support Networking Consultant BlackBerry Synchronization Carlsbad-Escondido, CA
  • Charlotte Dynamics GP-Software Implementation Consultants Charlotte North Carolina MS Dynamics GP Solution Provider in Charlotte - Reporting Help Mecklenburg County North Carolina, United States
  • Chatsworth, California Small Business IT Outsourcing Chatsworth, California Tech Services
  • SentinelOne Behavior-based Virus Detection Technology Professional
  • Cincinnati Maze Ransomware Data-Recovery Cincinnati, Hamilton County Cincinnati Netwalker Ransomware Data-Recovery Cincinnati Ohio
  • Consulting Experts for Salinas IT Service Companies Salinas California Consulting Experts for Salinas IT Service Organizations
  • Downers Grove Crypto-Ransomware NotPetya Preparedness Consultation Downers Grove-Oak Brook, IL Award Winning Downers Grove Ransomware Netwalker Preparedness Consultation Downers Grove
  • Dynamics GP (Great Plains) Gold Partner near Toronto - Upgrade Expert Toronto Dynamics GP-Software Premier Partner near Toronto - Upgrade Consultants Toronto, Ontario
  • Emergency Appleton Telecommuters Endpoint Management Tools Consulting Experts Appleton-Appleton, WI Urgent Appleton Telecommuters Management Systems Consulting Appleton-Fond du Lac, Wisconsin
  • Emergency Online Troubleshooting Edison Edison-New Brunswick Computer Network Support Companies
  • Emergency Work at Home Employees Consulting Experts in Lower Manhattan - Endpoint Management Tools Expertise Downtown Manhattan-Downtown Manhattan, New York Top Rated Lower Manhattan At Home Workers Endpoint Management Solutions Consulting and Support Services Downtown Manhattan, NY, U.S.A.
  • Firewall Consultant Immediate Technical Support Firewall
  • Florianópolis Maze Ransomware Operational Recovery Florianópolis Maze Crypto-Ransomware Mitigation

  • Microsoft 365 Yammer Integration Onsite Technical Support
    Support Services Microsoft 365 Management

    Microsoft 365, previously branded Office 365, is Microsoft's extensive family of productivity programs and cloud services offered on a subscription basis. Microsoft 365 applications and cloud services are available in a variety of product bundles intended for markets from individuals and households to global enterprises. Progent can provide fast and easy online access to consultants with expertise in Microsoft, macOS, Apple iOS, and Google Android technology. Progent can help your business to evaluate the wealth of subscription options available with Microsoft 365 and integrate your network with Microsoft 365 so you derive maximum business value. Progent offers expertise with multi-vendor networks that include Windows, macOS, and Linux software. Progent can also assist your business to create and manage hybrid ecosystems that seamlessly combine local and cloud products and services.

  • Fort Worth, Texas Designers Fort Worth, TX Consulting Services
  • Immediate Security Audit Services Firewall Barra da Tijuca, RJ Award Winning Security Cybersecurity Group Barra da Tijuca

  • Microsoft Virtual Machines IT Consultants
    Microsoft Virtual Machines Computer Consultants

    Microsoft Virtual Server 2005, run on the Microsoft Windows Server 2003 platform and based on technology originally produced by Connectix, delivers the performance needed to carry out hardware reduction, software upgrade, and server isolation projects through virtualization techniques in an enterprise-class computing network with advanced expandability, manageability, and reliability. Microsoft has aimed Virtual Server at companies wishing to improve ROI in application programming and testing, upgrading from outdated mission-critical applications, and server consolidation. Progent's certified Virtual Server consultants can help your business to evaluate and deploy MS Virtual Server 2005.

  • Jabber and VPN Consultant Services Jabber and SIP trunk Technical Support Services
  • Knoxville Teleworkers Help Desk Call Center Augmentation Assistance Knoxville Tennessee At Home Workforce Knoxville Consultants - Call Desk Solutions Consulting Services

  • Support and Setup Help Desk
    Microsoft Help Desk IT Services

    The Help Desk Call Center service model adopted by Progent offers small companies an dependable option to dependence on independent service individuals by offering extensive expertise accessible to multiple support teams, optional 24x7 availability of emergency assistance, escalation capability to top-level engineers for solving the most difficult issues, service consistency and reliability, prompt follow through overseen by seasoned IT service administrators, a variety of easy-to-use techniques for requesting service tasks, plus excellent process visibility enabled by trouble ticket updates and available through a web-based portal.

  • Lexington-Fayette Kentucky Cisco Service Fayette County Kentucky Cisco Upgrade
  • Miami Florida 24/7 Miami NotPetya Crypto-Ransomware Recovery Miami Egregor Ransomware Removal Miami-Dade County
  • Microsoft Certified Partner Outsourced IT Support Fort Collins, Colorado 24 Hour Fort Collins Small Business Network Consulting Firm
  • SentinelOne Extended Detection and Response Consulting
  • Microsoft Exchange Server 2000 Online Support Services Spam Filtering Consultancies

  • Troubleshooting SCOM 2012 Microsoft Azure Monitoring
    Support Outsourcing Datacenter Monitoring

    Progent's Microsoft-certified consultants have more than 10 years of background designing, implementing, enhancing and fixing SCOM solutions and can provide organizations of any size advanced remote or onsite consulting support for SCOM 2012. Progent can help your company to plan a topology for Microsoft SCOM 2012 servers that provides the performance and availability required to monitor your IT resources effectively, whether your infrastructure are onsite, cloud-based, or a mixed solution. Progent can also help you to install and customize Microsoft SCOM 2012 management packs according to best practices for tracking network fabric and both Microsoft and 3rd-party applications and services. In addition, Progent can deliver fast online or on-premises troubleshooting to assist you to remediate serious problems detected by Microsoft SCOM 2012.

  • Microsoft Exchange Server Migration Services Exchange Server 2010 Migration Professional
  • Milwaukee, WI, Madison, WI, Green Bay, WI, Kenosha, WI Professionals Wisconsin Outsourcing Technology
  • Urgent Specialist SentinelOne Next Generation Endpoint Protection
  • Network Consultants Cisco Ontario Cisco Remote Access Consulting Company Toronto-Mississauga

  • Integration Support Windows 11 Virtual Desktop
    Microsoft Certified Expert Microsoft Windows 11 Teams Consultants

    Progent's Microsoft-certified Windows 11 consulting experts offer an array of services for Windows 11 such as cloud solutions, mobile management and synchronization, telecommuter connectivity, security and compliance, centralized provisioning, and Call Center support services.

  • Oklahoma CIty Ryuk Crypto-Ransomware Forensics Analysis Oklahoma County 24-Hour Oklahoma CIty Egregor Crypto-Ransomware Forensics Investigation Oklahoma City Oklahoma
  • Onsite Support Windows Honolulu, Oahu, HI, Maui, HI, Kauai, HI Windows Tech Support For Small Business
  • Open Now CISSP Security Evaluation New York City New York, USA New York City, Buffalo, Rochester, NY Security Technical Support Services
  • Parsippany At Home Workers Collaboration Systems Guidance At Home Workers Consulting near me in Parsippany - Collaboration Technology Expertise
  • Remote Workers Consulting Services nearby Orlando - Management Systems Consultants Orlando Remote Workers Management Solutions Consultants Orlando-Kissimmee
  • Remote Workers Consulting nearby Boise - Endpoint Management Systems Consulting Experts Boise, Ada County Boise, Ada County At Home Workers Boise Consulting - Management Tools Consulting and Support Services
  • Remote Workforce Consultants nearby Ottawa - Backup/Restore Technology Consultants Ottawa, ON Telecommuters Ottawa Consulting and Support Services - Backup/Recovery Solutions Assistance Ottawa, Ontario
  • SQL Networking Firms Columbia, Charleston, Rock Hill, SC 24-Hour Solution Provider SQL South Carolina
  • SQL Server On-site IT Support Chattanooga, TN SQL Server 2019 IT Technical Support Company
  • San Juan IT Staffing Services San Juan, Puerto Rico San Juan San Juan IT Staff Temps Services
  • Slackware Linux, Solaris, UNIX Support and Integration Integration Services Ubuntu Linux, Sun Solaris, UNIX Augusta, GA
  • Small Office Network Consulting Services Rancho Cordova, CA Rancho Cordova, California System Recovery
  • Supplemental IT Staffing Support Consulting Support Federal District Supplemetary IT Staffing for IT Support Organizations Ciudad de México, Milpa Alta
  • System Consulting Exchange Server 2019 Metropolitan Region Exchange Support Specialist
  • São Paulo Ryuk Ransomware Forensics Analysis Sao Paulo São Paulo Ryuk Crypto-Ransomware Incident Reporting São Paulo-Brooklin
  • Top Rated Short Term IT Staffing for IT Service Teams Uberlandia IT Staffing for IT Support Teams Estado de Minas Gerais
  • Top Security Contractors Security Cybersecurity Firms CISSP

  • 64-bit Processing Professionals
    Support and Integration 64-bit Upgrade

    Progent's Microsoft-premier consultants can assist your organization to update your desktops from 32 bits to 64 bits. Progent can help your company to calculate the risks and benefits of moving to 64-bit PC desktop computing, plan an affordable migration process that minimizes business interruptions, and provide inexpensive, professional remote support to aid your organization to install 64-bit desktop software and applications on your existing computers.

  • Tukwila, WA Tukwila Ransomware Removal Tukwila Crypto-Ransomware Cleanup Support Services Tukwila-Tacoma, Washington
  • Waltham Telecommuters Cloud Systems Assistance Waltham-Framingham, MA Waltham-Hyde Park, Massachusetts Work from Home Employees Assistance near me in Waltham - Cloud Systems Consulting Experts
  • Webster Crypto-Ransomware Settlement Negotiation Experts Webster, United States Webster Sodinokibi Ransomware Settlement Negotiation Expertise Webster, TX, US
  • West Palm Beach Sodinokibi Ransomware Forensics Investigation Palm Beach County West Palm Beach Hermes Crypto-Ransomware Forensics Analysis
  • Windows Server 2016 Computer Consulting Firm Florianopolis Windows Outsourced IT Support

  • UNIX Consultancy
    Solaris Technology Professional

    Progent's Sun Solaris platform consulting experts offer small businesses and software developers support for administering and maintaining Solaris systems that operate with Microsoft-powered networks. Progent offers your business contact with Sun Solaris experts, support professionals certified by Microsoft and Cisco, and security specialists with CISA and CISSP credentials. This broad range of experience provides you with a convenient single consulting firm to help you build and manage a protected and reliable cross-platform connectivity and communications solution that allows Solaris and Microsoft coexistence by integrating Microsoft Windows with popular versions of UNIX including Mac OS X, Solaris, AIX UNIX from IBM, HP-UX, BSD, SCO, and Silicon Graphics IRIX (SGI/IRIX or leading Linux variations including RedHat, SUSE Linux, CentOS, Ubuntu, PCLinuxOS, fedora, Gentoo Linux, Mandriva Linux, Debian GNU/Linux, and Slackware.

  • Windows Server 2016 Consultancy Services Company Edison-Middlesex County Windows Server 2012 Outsourcing Technology Edison-Princeton, New Jersey
  • SentinelOne Singularity EDR Services
  • Windows Server 2016 Outsourced IT Support San Lorenzo, CA Hayward California Windows 2008 Server Consulting Services
  • Work at Home Employees Expertise near me in Winston-Salem - Cybersecurity Systems Assistance Winston-Salem, NC Winston-Salem North Carolina Winston-Salem Work at Home Employees Cybersecurity Systems Consulting Services
  • Work at Home Employees Minnetonka Expertise - IP Voice Technology Consulting and Support Services Minnetonka-Edina, Minnesota Minnetonka-Edina Offsite Workforce Minnetonka Consulting - VoIP Technology Guidance
  • Work from Home Employees Louisville Expertise - Infrastructure Consulting and Support Services Louisville Kentucky Louisville, United States Remote Workforce Consulting nearby Louisville - Setup Expertise

  • © 2002-2023 Progent Corporation. All rights reserved.