Protect your data, business and people

Everything clearly in one console, or a console according to the customer

We support Windows, macOS, Linux, Android and IOS and cloud platforms AWS, Azure and Google.

A complete overview of connected computers with the possibility of remote management, installation of applications, running scripts, management of files and processes. The solution includes clear reporting.

 

Overview of installed applications and their vulnerabilities

Causality chain analysis in the event of a security incident

The solution is among the top on the market in the field of endpoint protection platforms, as evidenced by its placement among the leaders in the renowned Magic Quadrant from Gartner.

Final
price

From 5 € / month

Price is excluding VAT

Security features

Application Inventory

Agent is protected against tampering

Incident Analysis (MITRE ATT&CK®, Timeline, Explorer, Team Annotations)

Device Quarantine from Network

Autonomous Rollback Response / 1-Click, No Scripting (Win)

Autonomous Remediation Response / 1-Click, No Scripting (Win, Mac)

Autonomous Threat Response / Kill, Quarantine (Win, Mac, Linux)

AI Fileless Behavioral Attack Detection

Static AI and SentinelOne Cloud File-Based Attack Protection

Sentinel Agent Storyline Standalone

Application Vulnerability (Win, Mac)

Rouge Device Discovery

Bluetooth / BLE Control (Win, Mac)

Location-Aware OS Firewall Control (Win, Mac, Linux)

Secure Re

Built-in static AI

Built-in static AI and behavioral AI analysis prevents and detects a wide range of attacks in real time before they cause damage. SentinelOne protects against known and unknown malware, Trojans, hacking tools, ransomware, memory abuse, script abuse, malicious macros, and more.

  • Sentinels are autonomous, meaning they apply prevention and detection technology with or without a cloud connection and trigger protective responses in real time.
  • Recovery is fast, getting users back to work in minutes without reinstalling a computer or writing scripts. Any unauthorized changes that occur during an attack can be reversed with 1-Click remediation and 1-Click Rollback for Windows PCs.
  • Incident analysis with MITRE ATT&CK® integration, and more.
  • Firewall Control to control network connectivity to and from devices, including location awareness
  • Device Control to control USB devices and Bluetooth/BLE peripherals
  • Rogue visibility to reveal devices on the network that need Sentinel agent protection
  • Vulnerability Management, in addition to providing an overview of third-party applications that contain known vulnerabilities mapped to the MITRE CVE database