CIO Influence
CIO Influence News Security

SentinelOne Expands Singularity Marketplace with new SOAR, Insider Threat, Training, and Prioritization Integrations

SentinelOne Expands Singularity Marketplace with new SOAR, Insider Threat, Training, and Prioritization Integrations

SentinelOne, an autonomous cybersecurity platform company, announced integrations with Revelstoke, Fletch, Code42, and KnowBe4, adding new use cases to the Singularity Marketplace. The new integrations expand Singularity XDR’s Security Orchestration, Automation, and Response (SOAR), insider threat protection, automated prioritization, and end-user training capabilities.

“We are committed to strengthening the SentinelOne Singularity Platform ecosystem by partnering with leading vendors across the security stack,” said Akhil Kapoor, Vice President of Technology Partnerships, SentinelOne. “We’re pleased to expand our offerings through our partnerships with Revelstoke, Fletch, Code42, and KnowBe4, helping customers gain additional detection, investigation and response synergies with their security tooling.”

Improved Detection, Investigation, and Response with Revelstoke

The integration of SentinelOne Singularity Platform and Revelstoke’s SOAR capabilities enables organizations to optimize their security workflows through the automation of alert triage and incident remediation. SentinelOne Singularity XDR delivers rapid protection and precise threat detection across all attack surfaces, as well as proactive threat hunting and automated remediation. With the integration of Revelstoke’s low-code automation, organizations can easily streamline SentinelOne alert triage and response, improving their security workflows and reducing alert fatigue.

CIO INFLUENCE: Apprentice Now Joins Amazon Web Services Training Partner Program to Deliver AWS Cloud Skills Training

“Our next-level SOAR solution and its ability to correlate alerts paired with SentinelOne’s platform, which can secure endpoint, cloud, and identity, gives analysts the power to respond faster and more efficiently to real cyber threats facing their organizations,” said Bob Kruse, Co-Founder and CEO, Revelstoke. “We look forward to working with SentinelOne on further integrations going forward and delivering even more value for our joint customers.”

Prioritize Remediation Efforts with Fletch

The SentinelOne Singularity XDR and Fletch integration incorporates best-of-breed XDR and natural language search technology, correlating Fletch’s findings with each customer’s Singularity XDR data to provide a personalized, prioritized list of the threats that are most relevant to their business. Fletch’s Natural Language Search Engine continuously scours the internet to determine which threats are significant and automatically links its findings to Singularity XDR data, providing extra context to quickly respond to relevant threats. Fletch and SentinelOne alert customers if a trending threat represents risk to them and provide extensive context for rapid triage and remediation, eliminating the need to manually sift through threat feeds and conduct security analytics.

“Cybersecurity comes down to knowing what you need to know before it’s too late,” said Grant Wernick, CEO and Cofounder, Fletch. “Teams of all sizes struggle to keep up with the volume of threats. Most never get ahead. With the power of Fletch and SentinelOne, folks can finally focus on the threats that matter before they matter with their personal Daily Threat Report”

CIO INFLUENCE: PlainID Launches The PlainID Technology Network to Enable Identity Aware Security for Advanced Access Control

Combat Insider Threats with Code42

The SentinelOne Singularity XDR and Code42 Incydr integration significantly reduces the risks associated with insider threats by combatting data exposure and exfiltration. When investigating insider risk alerts from Incydr, analysts can quickly respond to data exposure by using the SentinelOne’s network isolation capability to isolate the user’s endpoint to prevent further exfiltration or risky activity. SentinelOne’s best-of-breed XDR technology and Code42’s insider threat detection protect organizations from unusual and high-severity activity with the controls to correct and contain data risk.

“Data protection is a critical responsibility of every security department,” said Aimee Simpson. Director of Product Marketing, Code42. “With Code42 Incydr and SentinelOne, security teams can quickly detect data exfiltration events and quarantine devices to contain imminent threats.”

Instill Strong Security Culture with KnowBe4

Introducing KnowBe4 SecurityCoach into the SentinelOne platform gives organizations a mechanism for improving security literacy across their business. SecurityCoach ingests and analyzes threat incidents and alerts from SentinelOne and maps these incidents to specific end users, delivering real-time coaching as the incidents occur. With SecurityCoach automating coaching, users gradually eliminate risky behavior, reducing the number of human error-related incidents and instilling a security-first culture without dominating the security team’s time.

“KnowBe4 is proud to partner with SentinelOne to provide a seamless integration with our new SecurityCoach product, which aims to deliver real-time security coaching and advice to help end users enhance their cybersecurity knowledge and strengthen their role in contributing to a strong security culture,” said Stu Sjouwerman, CEO, KnowBe4. “KnowBe4 is actively working with SentinelOne to ingest real-time alerts from SentinelOne Singularity XDR and then coach users in real-time based on the SentinelOne alerts.”

CIO INFLUENCE: Ascend.io Launches Solution in Partnership with Snowflake, Enabling Cost Savings for Data Teams

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Nasuni Introduces Rapid Ransomware Recovery Solutions For Public Sector File Storage On AWS

CIO Influence News Desk

MEDIA ALERT Cloud Innovators and Influencers from AWS, Fortune 100, Gartner, and Microsoft Gather to Discuss the Future of Enterprise Cloud

Trend Micro Detected Nearly 13 Million Malware Events Targeting Linux-based Cloud Environments