
They also work with most versions of Windows Server, nearly every flavor of Linux, and the complete line of Mac systems going back to OS X El Capitan.
#SENTINELONE PRICING WINDOWS 7#
Setting up and controlling SentinelOne agents can be done from the management console, though every agent is fully independent, and even works when the device it’s protecting is disconnected from the network.Īgents deployed by SentinelOne work with multiple platforms, including Windows machines going back to Windows 7 or even Windows XP with a legacy agent.
#SENTINELONE PRICING HOW TO#
That information, and any actions taken by security personnel, is sent out to all other agents, along with instructions about how to handle similar threats that other agents might discover in the future. Those same agents report back to a central management console, so that human defenders are made aware of similar threats and active campaigns levied against them. Beyond acting independently, each agent collects detailed forensic data about any attacks or attempted attacks. Every agent is fully independent, able to act even when the endpoint it’s protecting is disconnected from the core network, or has no connectivity at all. SentinelOne, by contrast, is able to deploy powerful agents with advanced detection and response capabilities onto endpoints where they can intercept threats on the frontlines. Many endpoint protection programs today don’t actually sit on endpoints anymore, and perhaps only reach out to them if threats attempt lateral movement and trigger a response. Over the years, the science of endpoint protection has advanced considerably to include behavior analysis and eventually machine learning and artificial intelligence to uncover threats, even as the brains of those operations tended to shift deeper into the network. When bundled with AT&T Managed Threat Detection and Response (MTDR), gain additional correlation advantages that accelerate threat detection and response.Endpoint protection began life as signature-based antivirus programs sitting on endpoints themselves. Provides policy configuration, Incident Response Plan (IRP), on-going system tuning, and training on the platform.Įnhanced detection and response through platform integration and Alien Labs Threat Intelligence and Open Threat Exchange (OTX). Gain best-of-breed protection and container EDR visibility to the enterprise’s fastest growing attack surface – the cloud.Įndpoint security monitoring, management, and support including active threat hunting, forensic mapping, and continuous investigation, triage, and response to threats.

#SENTINELONE PRICING FULL#
Help protect your cloud-native and dynamic container workloads in AWS and Azure, including full support for Kubernetes and Docker. Discover and segment assets to allow for protection, compliance, and control measures to be taken - with zero additional software, network hardware, and consoles. Rogue and IoT device discovery across the network extracts even more value from endpoint cybersecurity. By automatically mapping and tracking all endpoint activity, the platform takes pinpointed actions to respond, remediate, and even rollback activity to previous safe states. SentinelOne’s capabilities extend beyond protection to autonomous responses.

Endpoints are fortified with tamper protection and patented AI algorithms that live on devices, catching malicious activity in real time as well as autonomously taking remediation actions to help keep the endpoints in a constant clean state.
