SentinelOne's Singularity product family is a subscription-based, cloud-centered cyberthreat defense stack that features AI algorithms and expert services to deliver enterprise-class endpoint detection and response (Singularity Control and Complete) and managed detection and response (Singularity Complete with Vigilance MDR). SentinelOne's small-footprint software agents can be installed in minutes to defend endpoints against modern cyberthreats including ransomware, known and new malware, trojan viruses, hacking tools, memory exploits, script misuse, harmful macros, and living-off-the-land abuse. Singularity agents are available for Microsoft Windows, Apple macOS, Linux distributions, and Kubernetes endpoints. Compatible deployment models include physical, virtual, VDI desktops, customer and hybrid data centers, and cloud providers. Because SentinelOne agents are autonomous, they can deliver cutting-edge behavior-based security in real time even when endpoints are not interfaced to the cloud.
Progent is a SentinelOne Partner and reseller and oversees thousands of endpoints protected by SentinelOne technology. SentinelOne Singularity is always the initial incident response tool activated by Progent to provide control and visibility of a client's network in the first stages of a ransomware emergency. SentinelOne is in addition the root EDR software behind Progent's Active Security Monitoring managed services. SentinelOne has been ranked as a leading visionary in Gartner's 2022 Magic Quadrant for Endpoint Protection Platforms and scored the most analytic detections in real-time with zero delays during the 2022 MITRE ATT&CK Phase 4 Evaluation. Gartner concludes, "This reaffirms its (SentinelOne's) ability to detect all attacks and provide full details of the techniques and tactics used." SentinelOne also outscored all competitors for each use scenario in Gartner's evaluation of Critical Capabilities for Endpoint Protection Platforms.
Singularity Packages for SentinelOne Endpoint Detection and Response
SentinelOne's Singularity family offers several tiers of endpoint security product packages provided as a global cloud-based platform that features high availability, hierarchical policy management, AI powered threat intelligence, fast restoration, and an information-driven console for cyberthreat analytics. Bundles consist of Control for enhanced management, Complete for smart root cause analysis, and Complete with Vigilance MDR for 24/7 advanced monitoring and response. The tiers are additive. Control and Complete each include all the features of the tier beneath it. Subscription rates starts at $10 for each endpoint per month for smaller customers with appropriate discounts for larger deployments. Progent has no minimum endpoint count.
The SentinelOne Control Package
The SentinelOne Control Package is the base software and is 100% maintained by the client. For some examples: Endpoint agents need to be updated in the SentinelOne portal, allow rules need to be set, exclusions need to be made, blacklists should be created, threats must be responded to, and many other day-to-day activities that someone in your organization needs to manage and maintain. SentinelOne is just like any other security product in that it has frequent updates to keep its defenses current. Progent can assist with or directly handle these items, but there is additional time and materials billing for all services performed.
With the Control Package you manage your own portal and while Progent and SentinelOne personnel are monitoring and or receiving alerts of serious threats in your environment, we have no authorization to do any work in your environment and will only do best efforts to alert you in case of a serious threat.
Major Features of the SentinelOne Control Package include:
- Endpoint Prevention (EPP) to block a broad range of malware, Trojans, hacking tools, and ransomware before they start
- ActiveEDR Basic for Endpoint Detection and Response works in real-time with or without cloud connectivity. ActiveEDR detects highly sophisticated malware, script misuse and other fileless assaults as they try to do damage.
- ActiveEDR Recovery gets users up and running quickly and includes 100% repair as well as rollback for all non-legacy releases of MS Windows.
- Endpoint Control for Policy-based management of all USB and Bluetooth devices (Win, Mac)
- Firewall Control for Policy-based control of network connectivity to and from assets, including location awareness (Win, Mac, Linux)
- Vulnerability Management, along with Application Inventory, for insight into third party applications with recognized vulnerabilities mapped to the MITRE CVE cybersecurity dictionary
- Secure Remote Shell capability for direct endpoint access by event responders and forensics personnel
- Autonomous SentinelOne agent Storyline Engine
- Combined Static AI and SentinelOne Cloud Intelligence file-based attack defense
- Behavioral AI fileless incursion detection
- Autonomous Threat, Remediation, and Rollback
- Quarantine endpoint from system, Incident Analysis, Agent Anti-tamper, App inventory
- Rogue endpoint discovery
The SentinelOne Complete Package
The SentinelOne Singularity Complete Package has all the core capabilities and operates with all the options of the Control bundle and also includes single-agent advanced endpoint detection and response (EDR), hunting throughout endpoints, cloud, and IoT. The package eliminates substantial time for cybersecurity administrators, SOC analysts, threat hunters, and incident responders by automatically correlating incidents and mapping it into the MITRE ATT&CK framework to investigate root causes. The SentinelOne Singularity Complete Package includes an advanced EDR feature set:
- Co-Managed environment with Progent receiving alarms and notifications of all threats and activities in your environment. Customers are responsible for reacting to threats in their system and optional help time and material is offered from Progent
- ActiveEDR Advanced provides visibility of all non-threatening data.
- ActiveEDR Advanced adds enterprise threat hunting. SentinelOne stands out with the ease-of-use characterized by the active nature of the solution in autonomously reacting to threats.
- Storyline feature for Automated Forensics and fast root cause analysis. All OS storylines are automatically contextualized with SentinelOne’s proprietary TrueContext technology, simplifying analysts' tedious task of event correlation so they can get to the root cause with reduced MTTR.
- Storyline Active Response (STAR) mitigates zero-day attacks with custom detection and hunting rules.
- Deep visibility Storyline Pivot and Hunt by MITRE ATT&CK technique
- EDR Hunting Data storage ranging from 14 days standard to one year optional
- Timelines, file fetch, file integrity monitoring, sandbox integrations
- Additional response alternatives are available and personalized to your needs. Includes one hour of training in key features and day-to-day management of the SentinelOne portal. During this time, Progent will train in the creation of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts.
Options for the SentinelOne Singularity Complete Package bundle include adding software-defined network discovery and aggregated active/passive device mapping through SentinelOne's Vigilance with MDR package plus elimination of agent installation gaps with configurable job automation. Progent also offers optional monthly customer portal checks and threat response advice.
Complete with Vigilance Respond Managed Detection and Response (MDR) Services
Vigilance Respond and Vigilance Respond Pro are optional MDR services for subscribers to the Singularity Complete package. These bundles include digital forensics and full 24x7 incident response delivered by Tier-1, Tier-2, and Tier-3 IT security professionals. Vigilance Respond subscriptions include validation of cyberthreats, event prioritization, false positive handling and dashboard updating, proactive threat deactivation, thorough reporting, service level agreements, and escalation to the customer's cybersecurity organization.
Vigilance MDR analysts rank threat notifications based on a threat-handling hierarchy ranging from Benign to Malicious Urgent. This classification determines how the analyst responds to the detected threat. There are five classes of threats and associated responses. Most alerts require no action by the client.
Benign Alert - False Positive
Vigilance takes care of the issue and annotates the SentinelOne console. For single False Positive alerts, no additional actions or alerts are required. For repeated False Positive alerts, Vigilance will escalate the issue to the customer to submit or agree to an appropriate exclusion or agent update as required.
Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program
Vigilance responds to make sure the threat is blocklisted, resolved, and documented. Usually, no alert will be sent to the client unless the threat requires additional work.
Malicious Alert - True Positive / No Action Needed
Vigilance performs proper actions including remediation to ensure the threat is quarantined. Once the analyst confirms the threat is deleted, the analyst will send a confirmation notice to the customer.
Malicious Alert - True Positive Non-Urgent / Action Needed
Vigilance performs appropriate actions including remediation to make sure the threat is quarantined. After the analyst confirms the threat is deleted, the analyst will transmit a verification notice to the client. Subsequent procedures such as re-imaging may be called for in certain cases.
Malicious Alert - True Positive Urgent / Action Needed
Vigilance may respond aggressively in serious breach incidents including taking agent remediation actions and disconnecting affected network endpoints to stall the attack and block further lateral progress. The analyst will transmit a proactive notification apprising the customer of the issue and ask for immediate response.
In addition to including all the functions of SentinelOne Control and SentinelOne Complete, SentinelOne Complete with Vigilance MDR adds round-the-clock Monitoring with Near Real Time Threat Response, Remote Script Orchestration, and Ranger:
- Fully Co-Managed Solution with Progent seeing warnings and notifications of all threats and activities in your system and combined SOC response, delivering 3 levels of 24x7x365 Detection and Response. All threats are mitigated and responded to in close to real-time. Additional remediation options following threat mitigation are offered and customized to meet your individual requirements.
- Remote Script Orchestration empowers enterprises to send scripts to a single machine, a few hundred machines, or even millions of machines, to respond to current and future cyberattacks at machine speed. Security Teams can send tailored scripts or pick from a broad selection of jobs – ranging from incident response to forensics artifact collection and even network administration. In combination with SentinelOne Storyline Active Response, analysts benefit from automated workflows that take incident response to the next level.
- Ranger provides unmatched visibility into your environment. Ranger is network-efficient by intelligently designating a few SentinelOne agents for each subnet to undertake network mapping missions. Selected "Rangers" passively track network broadcast data including ARP, DHCP, and other network observances. Admins can tailor current scan policies and specify multiple IP Protocols for machine learning including ICMP, SNMP, UDP, TCP, SMB, and others. Rangers correlate all collected information within the backend to fingerprint familiar and unknown devices. Ranger device inventories reveal what is attached to your system, where they are connected, and which protocols the devices listen on. Ranger enables you to discover and eliminate SentinelOne Agent deployment gaps using Ranger Deploy, a peer-to-peer deployment (Windows, Mac, Linux). Ranger permits you to determine how unfamiliar devices communicate with managed hosts and isolate suspicious devices from managed devices with a single click.
Includes 1 hour of training in advanced features and day-to-day management of the SentinelOne portal. During this time, Progent will train clients in the creation of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts. Progent can provide tailored additional training for your company's needs on a time and materials basis.
Download Progent's SentinelOne Singularity Packages Datasheets
Download datasheets about Progent's SentinelOne Singularity packages:
The Progent Advantage
Progent's team of over 150 consultants includes experts in every facet of information technology associated with small and mid-size businesses. With this scope of knowledge, Progent can be your one-stop source for integrating a cohesive security environment that delivers immediate business value. In addition to the endpoint security available from SentinelOne products, Progent offers a variety of managed services and affordably-priced support packages created to assist SMBs to plan, implement, validate, and administer networks that feature enterprise-class cybersecurity and low total cost of ownership.
Progent offers in-depth experience with all the endpoints, servers and VMs that can be protected by SentinelOne technologies and services. Progent offers services that include Windows 11 migration consulting, Windows 10 management, Linux integration, Mac consulting, iPhone and iPad support, Android consulting, Windows Server 2022 migration expertise, Windows Server 2019 integration consulting, Hyper-V virtualization support, and VMware vSphere support experts.
For fast rollback, Progent's Windows Server consultants can help you to set up Windows Volume Shadow Copy Service (VSS). Progent also offers remote and on premises support from certified Cisco CCIE consultants to assist you to design, defend or troubleshoot your network infrastructure. If your network relies on cloud resources, Progent can provide the support of Microsoft Azure experts, Amazon AWS experts, and Google Cloud solutions experts.
Contact Progent about SentinelOne Sales and Configuration Services
To find out more about how Progent can assist you to purchase or configure SentinelOne products, call 1-800-993-9400 or visit Contact Progent.
An index of content::
24 Hour Orlando At Home Workforce Support Expertise Orlando-Kissimmee Orlando Teleworkers Set up Consultants Orlando
24-Hour Specialists for Las Vegas Computer Support Companies Las Vegas, NV Las Vegas, Clark County Las Vegas Consulting Services for Network Service Organizations
24x7 Fedora Linux, Solaris, UNIX Support and Help Anaheim California, USA Mandrake Linux, Sun Solaris, UNIX Network Engineer Orange County California
Microsoft Windows Server 2008 R2 Consultant Services
After Hours Technology Consulting Services Windows Server 2008 Hyper-VI
Windows Server 2008 R2 offers outstanding levels of speed, security, fault tolerance, expandability, and flexibility that accelerate output of local, remote, and mobile users. Progent's Microsoft-certified experts can provide affordable online engineering, technical support, and training services to help your company to design, execute, and manage Microsoft Windows Server 2008 R2 in order to add substantial business value to your information system.
At Home Workers Consulting Services near Winston-Salem - Collaboration Solutions Consulting Services Winston-Salem Winston-Salem, NC Winston-Salem At Home Workforce Collaboration Solutions Consulting Services
At Home Workers Consulting and Support Services in Mission Viejo - Cybersecurity Solutions Assistance Mission Viejo Mission Viejo Offsite Workforce Endpoint Security Solutions Assistance Mission Viejo-Laguna Niguel, CA
At Home Workforce Consulting and Support Services - El Paso - Backup/Restore Technology Expertise El Paso, U.S.A. Remote Workers El Paso Guidance - Backup/Recovery Technology Expertise El Paso, TX
NodeZero Cybersecurity Pen Testing Cybersecurity Group
NodeZero Security Penetration Testing Firewall Setup
Progent's certified security experts can perform NodeZero-based threat assessments to make sure your security defense tools and policies are correctly set up and effective.
Audit Firewall Tulsa County Oklahoma 24-7 CISSP Evaluation
SentinelOne Singularity EDR EngineerBlackBerry BPS Small Business IT Consulting Company Lincoln BlackBerry Desktop Manager Networking Group
Cisco Firewall Upgrade Network Consultants
ASA Onsite Technical Support
Progent's Cisco CCIE-certified networking experts can assist you to maintain older PIX 500 or ASA 5500 firewalls or transition to Cisco ASA 5500-X firewalls. Progent can also assist you to set up, administer, upgrade and troubleshoot Cisco ASA 5500-X firewalls with Firepower Services.
Caddo Parish Louisiana SQL Server 2012 Small Business Computer Consulting Firm Urgent SQL 2012 Networking Consultancy Services Shreveport Barksdale Air Force Base
Consultant Services SentinelOne Ransomware RollbackCampinas Spora Ransomware Data-Recovery Campinas, Sao Paulo Campinas Egregor Ransomware Operational Recovery Campinas, São Paulo
Design Companies Mission Viejo-Irvine Mission Viejo Network Consulting Firms
Wireless Security Inventory Professional
Top Rated Internal Network Security Scan Services
Progent has put together two ultra-affordable service bundles intended to allow small companies to receive a professional network security evaluation from a certified security consultant. With Progent's External Network Security Inventory Scan, an engineer administers an extensive test of your network from beyond your firewalled perimeter to determine potential risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security expert executes a system scan from a secure computer within your company firewall to assess vulnerabilities to internal threats. The two security inventory packages are set up and run from a protected external location.
SentinelOne Singularity Complete Reseller IT ConsultantExchange Small Office Network Consultant Virginia Exchange Consultant Services
SentinelOne Next Generation Endpoint Protection ConsultingFort Wayne, Indiana Network Providers Fort Wayne Computer Service
Fault-tolerant Internet Connectivity Remote Troubleshooting
Automatic Fail-over Remote Technical Support
Progent's Cisco-authorized network engineers can show you how to design an economical, high availability Internet configuration solution that can achieve non-stop Internet connectivity through a wide array of high availability Internet access products and services including high availability BGP, automatic fail-over, and redundant ISPs. Progent can provide CCIE professionals to help you apply the most current technology for 24x7 Internet connectivity to create an affordable, fully redundant Internet interface with automatic failover and other features to create fault tolerant Internet connections.
Ipanema, Estado do Rio de Janeiro Offsite Workforce Ipanema Consulting - Cybersecurity Systems Consulting and Support Services Work from Home Employees Consultants nearby Ipanema - Security Solutions Consulting Experts Ipanema, Leblon
SharePoint 2016 Power Query Troubleshooting
SharePoint Server 2016 Migration Online Support Services
Progent's Microsoft-certified SharePoint consultants can provide affordable remote and on-premises expertise, software development, and technical support support for businesses of any size who want to upgrade to SharePoint Server 2016 or SharePoint Online from earlier versions of SharePoint.
Jacksonville Avaddon Ransomware Operational-Recovery Jacksonville Arlington, United States Jacksonville Maze Ransomware Data-Recovery Jacksonville, FL
Small Business Computer Service
Small Business Network Design Consultant
For more than 20 years, Progent has delivered budget-friendly IT planning, configuration, troubleshooting, cybersecurity, and development for networks of all sizes.
Mexico City, Venustiano Carranza BlackBerry Email Server Consulting Mexico City, Gustavo A. Madero Onsite Technical Support BlackBerry Software
Microsoft Dynamics Programmer Dynamics GP Continuum Consulting Services
Largest Small Business Wireless Professionals
Online Troubleshooting Cisco Aironet
Progent's wireless consultants can help small companies design, select, pilot, configure and support protected building-to-building wireless bridges that integrate transparently into your existing network while providing a level of security that equals or excels wireline connections. Progent offers experience in wireless LAN products from Cisco Aironet and Meraki, Proxim, and other office wireless providers and can show you how to identify and install the wireless connectivity technology that fit best with your company needs.
SentinelOne Ransomware Recovery ConsultantMicrosoft System Center OpsMgr 2012 R2 IT Consultants SCOM 2012 Infrastructure Monitoring Online Support
Migration Support Cisco San Juan, Puerto Rico Network Help Cisco San Juan-Caribbean, United States
Onsite Technical Support Shared Helpdesk
On-site Support Helpdesk Sharing
Progent's Microsoft certified experts provide several ways to help medium-size and large businesses create a cost-effective and productive internal Network Support Helpdesk. Progent's help desk consulting services include Return on Investment analysis, process analysis and improvement, executive reporting, training of in-house personnel, and documentation of processes. Progent's Software Evaluation and Integration Support Services help organizations sift through the numerous top level Help Desk application programs on the market and determine which packages might be too costly, lack key features, or align badly with your organization's corporate culture. Progent also offers temporary staffing for companies who want to augment their internal Help Desk staff for special tasks or to substitute for vacationing or indisposed workers.
Modesto Egregor Crypto-Ransomware Forensics Investigation Modesto California Modesto Lockbit Crypto-Ransomware Forensics Modesto, United States
Montreal Canada Network Providers Montreal Network Consulting Experts
Naples Work from Home Employees Help Desk Call Center Augmentation Consulting Services Naples-North Naples Offsite Workforce Consulting in Naples - Help Desk Solutions Assistance
Orlando WannaCry Crypto-Ransomware Settlement Guidance Orange County Florida Orlando Crypto-Ransomware Settlement Experts Orlando, Orange County
ProSight Virtual Machine Hosting Consulting Consulting Services ProSight Virtual Machine Hosting
Integration Services Extended Support Desk
Supplemental Call Center Professionals
Progent offers several essential kinds of Help Desk support including Microsoft and Cisco Help Desk Outsourcing Services, Virtual Help Desk Support, and Call Center Consulting and Staffing Services. Progent is a Microsoft-certified Partner and Progent's Help Desk team of certified Microsoft experts gives your customers convenient access to a dependable technical resource with extensive experience providing phone support and online troubleshooting for IT systems powered by Microsoft technology. Progent's focus is on giving the support Call Center a positive image as a solid contributor to company productivity. Progent's goal is to fix rather than merely report problems.
Recruit Cisco Consultant Positions Microsoft Consulting Career Opportunities
Sacramento Sacramento Maze Crypto-Ransomware Rollback Sacramento WannaCry Ransomware Cleanup Sacramento
San Jose California Work from Home Employees San Jose Consulting Experts - Collaboration Systems Guidance After Hours Work from Home Employees San Jose Assistance - Collaboration Systems Consulting Experts Cupertino, CA, United States
24 Hour ProSight Remote Network Management Consultants
Remote Network Monitoring Services
Progent's ProSight portfolio of managed IT services are intended to offer businesses who have small in-house network administration and support teams with affordable help from world-class management tools and technical experts. Advantages of Progent's ProSight line of managed IT services include predictable IT management expenses, smart automation of common administrative processes, continual adoption of new information technology, graceful transition from legacy systems to up-to-date solutions, close alignment of computer technology with strategic goals, guidance from veteran IT consultants, and freeing up management to focus on business rather than fast-evolving information technology.
Shared Help Desk Integration Support Shared Helpdesk IT Services
SentinelOne Singularity EDR ConsultingSmall Business IT Outsourcing Information Technology Manager Small Business Help Desk Outsourcing Remote Support Services
Small Business WAP131 Computer Engineer Small Business WAP131 Online Consulting
Telecommuters Consulting and Support Services in Leeds - Endpoint Security Solutions Consultants Leeds Telecommuters Leeds Consulting Experts - Network Security Solutions Consulting Services Leeds-Sheffield
Co-managed Help Desk Support
Consulting Support Desk Sharing
Progent's Microsoft and Cisco authorized Consultants offer several service programs to help mid-size and large companies create a cost-effective and successful internal Computer Support Help Desk. Progent's consulting services include ROI analysis, process study and enhancement, management reporting, education of internal personnel, and documentation of procedures. Progent's Software Evaluation and Deployment Support Services help organizations sift through the numerous high-quality Help Desk software packages on the market and determine which packages may be too expensive, miss key features, or align poorly with your organization's business goals. Progent also offers temporary staffing for businesses who need to reinforce their in-house Help Desk team for special projects or to substitute for vacationing or incapacitated workers.
Top Exchange Computer Support For Small Offices Baltimore, Baltimore-Washington DC , Columbia, MD Exchange Computer Consulting Firms Baltimore, MD
Top Lubbock Remote Workers Conferencing Technology Consulting Services Lubbock Preston Smith Airport LBB Emergency At Home Workforce Assistance in Lubbock - Conferencing Solutions Consulting Experts South Plains Lubbock
Top Quality Manaus At Home Workers IP Voice Technology Consulting Experts Amazonas After Hours Remote Workers Consulting Services in Manaus - VoIP Systems Consultants
Top Ranked BlackBerry Software Information Technology Consulting Firms Minnetonka BlackBerry Professional Software Small Business Network Consultant Minnetonka, US
Top Rated Palo Alto Networks Panorama Cybersecurity Group Palo Alto Networks PA-3400 Series Firewalls Secure
Urgent San Diego UCSD Spora Crypto-Ransomware Mitigation La Jolla, CA San Diego UCSD DopplePaymer Ransomware System-Restoration La Jolla, California
Wichita, Sedgwick County Remote Workers Wichita Guidance - Management Solutions Consulting Experts Wichita Work from Home Employees Endpoint Management Systems Consulting Wichita Kansas
Windows Server 2016 Networking Consultants Daly City, CA San Francisco California Windows 2008 Server Small Business Computer Consulting Services
Windows Server 2019 Migration Consultant Naples, FL, U.S.A. Windows Server 2012 Troubleshooting Naples-North Naples, FL
SentinelOne Singularity Complete Reseller Computer EngineerWork at Home Employees Austin Guidance - Voice/Video Conferencing Solutions Expertise Austin, TX Austin At Home Workforce Conferencing Technology Assistance
Work at Home Employees Consulting and Support Services - Stockton - Connectivity Solutions Assistance Stockton California Stockton Work at Home Employees Integration Solutions Consulting and Support Services Manteca, CA
Work from Home Employees Buffalo Assistance - Cloud Solutions Consulting and Support Services Erie County New York Buffalo, Erie County Work from Home Employees Buffalo Expertise - Cloud Solutions Assistance
© 2002-2025 Progent Corporation. All rights reserved.