The most valuable features of SentinelOne Singularity Endpoint include robust MDR support, autonomous EDR capabilities, real-time detection, rollback, and automatic remediation, which reduce manual workload. The lightweight agent that runs on any endpoint is crucial, and it provides clear visibility in the event of an incident, including a detailed storyline with guidelines for analysts. SentinelOne Singularity Endpoint works with all platforms—Windows, Linux, Mac, and even ARM devices—making it compatible across our devices.
The cross-platform support and ease of deployment make it a great fit for the energy sector, providing scaling from SMB to enterprise-level protection.
Regarding SentinelOne Singularity Endpoint's ability to ingest and correlate across our security solutions, we approach security as a defense-in-depth layer; if one tool misses a detection, others will pick it up. So far, we have not missed any detections, and we have a positive outlook on strengthening our overall security posture with the help of SentinelOne Singularity Endpoint, which reduces manual workload while providing enterprise-level protection, especially since we are a small to medium business with limited resources.
In terms of consolidating our security solutions, I would rate SentinelOne Singularity Endpoint a 9 out of 10 because it meets all our use cases effectively. It provides granular insights into endpoints and comes with feature roadmaps, including AI security analysis that helps us understand the usage of shadow AI in our environment, vulnerabilities, and overall system alerts. This functionality allows us to monitor how many threats were remediated and triggered, significantly enhancing our security posture.
We assessed the Ranger functionality a couple of months ago; we turned it on for a trial and subsequently turned it off. When we activated it, it scanned our network for shadow endpoints without SentinelOne Singularity Endpoint, identifying devices such as printers or scanners. It provided insight into unknown devices on our network and scanned for vulnerabilities, giving us valuable reports through the Singularity dashboard.
For reducing alerts, we need to collaborate with the MDR team to manage false positive alerts. The support from MDR is frequent; once an alert is triggered, they respond within 48 to 72 hours based on criticality. We are pleased with their support, which helps us address false positives. Although we receive more than one hundred alerts, we mark them as false positives to reduce noise. SentinelOne Singularity Endpoint interface is user-friendly, allowing us to manage daily tasks efficiently while maintaining high security without a large team.
Currently, we are managing about 10 to 20 different tasks or projects simultaneously, requiring minimum input from analysts. SentinelOne Singularity Endpoint MDR team provides guidance on handling alerts, helping us maintain a small security team while effectively minimizing the noise created by alerts.
The mean time to detect has significantly improved since implementing SentinelOne Singularity Endpoint from the previous technology we used, which lacked MDR functionality. With higher priority alerts, the response time is swift, enhancing our overall security and asset protection.
The mean time to respond has significantly decreased thanks to the features available, such as isolating compromised servers directly through the UI, which helps prevent the spread of threats on our network effectively.
We have not activated Purple AI yet, but when alerts occur, the guidance provided is helpful, summarizing what triggered the alert and offering steps for analysis. It aids our small team by providing high-level overviews of alerts.