DATA SECURITY

SentinelOne Expands Partner Ecosystem with New Zero Trust, CNAPP, Patch Management, and Threat Simulation Integrations

SentinelOne | January 15, 2022

SentinelOne an autonomous cybersecurity platform company, today announced integrations with Remediant, Blue Hexagon, Keysight, and Automox, expanding the set of capabilities available via SentinelOne’s Singularity Marketplace. With comprehensive integrations across enterprise use cases, the Singularity Marketplace enables customers to unify leading technologies to autonomously protect against threats at machine speed.

Enable Zero Trust with Remediant
SentinelOne’s joint solution with Remediant enables organizations to enforce Zero Trust solutions across cloud, hybrid, and on-premises infrastructure with a single agent. With the rise of credential stuffing attacks and ransomware, endpoints and identities are two of the most exploited attack vectors today. SentinelOne captures behavioral telemetry across user endpoints, cloud workloads and IoT, feeding process and file activities to Remediant. This enables administrators, auditors, and incident responders to identify malicious sessions and activity in a single workflow.

“This partnership with SentinelOne marks one of the first, and best, examples of what becomes possible when leading identity and endpoint security solution providers align their capabilities,” said Paul Lanzi, Co-founder, Remediant. “As partners, we are both aware that today's remote workforce has to be secured by a new generation of tools that secure endpoints and privileged access. We're launching this partnership because EDR and identity vendors working together is one of the most powerful things we can do for our customers to ensure they can defend against attacks."

Strengthens Cloud Ransomware Security with Blue Hexagon
SentinelOne’s integration with Blue Hexagon enables the rapid detection and prevention of malware and ransomware in the cloud. As the first line of defense, SentinelOne secures endpoints, cloud workloads and IoT devices with AI powered protection, detection and response. The integration shares Blue Hexagon’s awareness of malware and ransomware reducing the time to respond through automated remediation. In addition, cloud misconfigurations are shared with SentinelOne.

“We are excited to partner with SentinelOne, a leader in XDR, to provide a threat detection and response solution that unifies endpoint, cloud, and network security.With Singularity XDR and Blue Hexagon, joint customers can use leading solutions to seamlessly share ransomware intelligence and automate response across cloud environments.”

Nayeem Islam, CEO and Cofounder, Blue Hexagon

Proactive Threat Simulation with Keysight
SentinelOne’s integration with Keysight allows joint customers to safely simulate threats in order to validate threat detection and remediation. Keysight’s Threat Simulator attacks both network and endpoints from a ‘Dark Web’ environment. Attacks are validated against Singularity XDR’s protection and detection models using SentinelOne’s rich API functionality, identifying gaps in the cyber kill chain and suggesting updates to organizational security infrastructure.

“The integration of Keysight Threat Simulator with SentinelOne is exciting because it allows our joint customers to automate validation of their security processes and defenses before actual threats occur,” said Greg Copeland, Director of Technical Alliances, Keysight. “Cyber defense groups can test and train their operations teams using realistic scenarios, to sharpen their skills and procedures proactively.”

Automate Vulnerability Management with Automox
SentinelOne and Automox’s joint solution delivers end-to-end vulnerability discovery and remediation. As corporate networks become more technically diverse, organizations often struggle to keep up with patch management and cyber hygiene, forcing security teams to adopt multiple tools that require heavy training, dedicated on-site resources, and multiple dashboards. SentinelOne and Automox provide the visibility and workflows needed to significantly reduce the time to remediation and the burden on in-house resources.

“As corporate IT environments become more distributed and overwhelmed with multiple operating systems and a vast inventory of third-party software, organizations are left wide open to cyber attacks,” said Jay Prassl, founder and CEO at Automox. “SentinelOne mirrors our mission to proactively reduce security exposure. Through our partnership, enterprise and government organizations benefit from a powerful, cloud-enabled solution to detect and remediate vulnerabilities, seamlessly and at scale.”


About SentinelOne
SentinelOne’s cybersecurity solution encompasses AI-powered prevention, detection, response and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous XDR platform.

Spotlight

A spear-phishing attack could bring your company to its knees – today. For all you know, you may already be under attack. That could result in a data breach that lands your company in the glare of the news cameras – and in hot water with your customers, partners and investors.

This whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, shows you exactly what happens in the days before, during and after an attack. You’ll get:

- An inside look at how attackers steal credentials, customer data and intellectual property
- A timeline of how the attack will play out
- Details of mistakes made and vulnerabilities exposed
- Ideas for how to prepare your employees and systems

Spotlight

A spear-phishing attack could bring your company to its knees – today. For all you know, you may already be under attack. That could result in a data breach that lands your company in the glare of the news cameras – and in hot water with your customers, partners and investors.

This whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, shows you exactly what happens in the days before, during and after an attack. You’ll get:

- An inside look at how attackers steal credentials, customer data and intellectual property
- A timeline of how the attack will play out
- Details of mistakes made and vulnerabilities exposed
- Ideas for how to prepare your employees and systems

Related News

DATA SECURITY

Endpoint Security of Lookout Mobile is Now StateRAMP Authorized

Lookout | March 04, 2022

Lookout, Inc., a provider of comprehensive endpoint-to-cloud security, announced today that its Lookout Mobile Endpoint Security solution had been granted StateRAMP Authorization. The Lookout solution has passed 325 security checks, indicating that it can handle sensitive, unclassified data and protect critical government networks. It gives state and local governments complete access over their entire fleet of iOS, Android, and ChromeOS endpoints, allowing them to secure agency data in real-time by detecting and responding to phishing, app, device, and network threats. Lookout is the premier provider of mobile endpoint security to the government and the first mobile security vendor to be approved by StateRAMP. In April 2020, Lookout Mobile Endpoint Security received FedRAMP approval. StateRAMP is a nonprofit organization founded by state and local government leaders, industry professionals, and private firms to offer a standard for government entities to manage cybersecurity risks from third-party suppliers. These security standards are based on NIST Special Publication 800-53, a widely accepted catalog of security and privacy controls for information systems and organizations from the National Institute of Standards and Technology (NIST). Attackers seek to breach agency networks in droves, fueled by the global epidemic and the trend to mass telework. According to a new SolarWinds and Market Connections survey of 400 decision-makers from federal, state, and municipal agencies and the education sector, endpoint security software is an important tool in managing risk. The Office of Management and Budget (OMB) M-22-01 mandates that federal agencies integrate mobile devices in their endpoint detection and response, continuous monitoring, and proactive threat hunting strategies, setting a high bar for state and local governments to meet. "In the current environment of remote work and digital transformation of government services, state and local organizations are operating with an increasing number of mobile devices that are expanding their cyber attack surface, These organizations need tools that can detect and respond to threats on iOS, Android and ChromeOS devices to secure data accessed from anywhere." Tony D'Angelo, vice president, U.S. public sector, Lookout The Lookout Security Graph, which analyses telemetry data from more than 200 million devices and 150 million apps and continually ingests and analyses millions of URLs every day, is at the heart of Lookout Mobile Endpoint Security. Lookout Mobile Endpoint Security uses machine intelligence to help state and local governments detect and respond to phishing, application, device, and network attacks while maintaining user privacy. In addition, lookout can automatically detect and respond to threats that have never been seen before, thanks to machine intelligence. Following receiving FedRAMP Joint Advisory Board (JAB) Provisional Authorization to Operate for Lookout Mobile Endpoint Security in May 2020 and Secure Access Service Edge (SASE) in February 2022, the company was added to the StateRAMP AVL. StateRAMP's compliance verification is modeled after FedRAMP, and it necessitates the submission of an independent third-party audit to the StateRAMP Program Management Office (PMO) for approval.

Read More

odix joins the MISA program extending FileWall security logs to Microsoft Azure Sentinel

prnewswire | September 30, 2020

The Microsoft Intelligent Security Association was formed in 2018 to provide a community for premier cybersecurity companies to collaborate and better integrate their technologies with Microsoft Security products. By joining MISA, odix looks to advance its CDR solutions fluid integration into the range of widely used Microsoft software products.MISA uniquely fosters the critical relationships between innovative designers and developers creating cyber security products that integrate with Azure Sentinel, the Graph Security API and other Microsoft products. By removing the obstacles to direct integration, MISA members, such as odix, can fast track technological and product developments to produce a more robust security ecosystem for Microsoft 365 users.

Read More

DATA SECURITY

Infotecs' ViPNet Cyber-Security Solutions at GISEC

Infotecs ViPNet | May 21, 2021

Infotecs, a number one international cybersecurity, and threat intelligence platform provider will present its ViPNet IT security solutions at GISEC from May 31 to June 2, 2021, in Dubai, United Arab Emirates. The number of cyber-attacks has increased since 2020. Cybercriminals are taking advantage of the uncertainty of a worldwide pandemic and remote work. That's why protecting the transmission of sensitive data via mobile devices also as all IP-enabled devices are important today. the danger for companies is just too great that data of any form (voice or text messages, IP video data, exchanged business-critical documents, etc.) are going to be intercepted or may be manipulated by cybercriminals. At GISEC in Dubai at the top of May, Infotecs will present ViPNet mobile security solution. It provides market-leading secure enterprise communication tools with the strongest available encryption combined with maximum convenience, functionality, and usefulness. ViPNet provides fast, easy to use, reliable yet secure communication via email, chat, video, and voice calls (VOIP). Our pure software-based solutions deliver superior security intentionally supported symmetric key and point-to-point encryption approaches. The "Always On" solution provides fast & reliable secure connectivity even over low bandwidth or mobile networks. "The pandemic accelerated the increase of the digital economy and made governments around the world rethink how various industries operate. headquarters workspace became the New Normal," explained Josef Waclaw, CEO of Infotecs GmbH. "With our innovative solutions like ViPNet Threat Detection & Response or ViPNet Mobile Security solutions, we will help many business players build a strong, cyber-resistant ecosystem." The Gulf Information Security Expo and Conference (GISEC), the Gulf region's largest cybersecurity forum, has been held annually at the Dubai World Trade Centre since 2013. GISEC provides web security professionals from around the world the chance to seek out innovative solutions, share insights with industry experts, and equip themselves with the proper tools to guard their businesses against ever-increasing cyber-attacks.

Read More