SentinelOne - Experts & Thought Leaders
Latest SentinelOne news & announcements
Auguria, Inc., a pioneer in AI-powered security operations solutions announced the latest version of its Security Knowledge Layer™ Platform. The newly enhanced platform can integrate with some of today's biggest data sources, including SentinelOne, CrowdStrike, Palo Alto Networks, and Microsoft Windows Event Logs. Auguria also unveiled its Explainability Graph Feature, a trailblazing tool that provides visual, context-rich threat data for security teams. Expanded integrations Security teams process an average of 78 trillion signals per day across various platforms, making it difficult to sift through data and identify potential threats. Auguria integrates seamlessly with the below key data sources, enabling organisations to harness richer insights and operational efficiencies: SentinelOne: With SentinelOne Singularity™ platform's industry-pioneering endpoint detection and response (EDR) and threat telemetry, Auguria users gain advanced enrichment, data compaction, and alert correlation, resulting in alert fatigue reduction and enhanced SecOps efficiency. CrowdStrike: Auguria supports the CrowdStrike Falcon® platform's EDR data, providing AI-driven prioritisation and actionable intelligence for faster, more accurate incident response. Palo Alto Networks: The integration brings world-class firewall and network telemetry into Auguria's Security Knowledge Layer™, enriching Palo Alto Networks data with contextual intelligence, noise reduction, and prioritisation for faster incident investigations. Microsoft Windows Event Logs: Often overwhelming in volume, Windows Event Logs are transformed into actionable insights, with Auguria filtering out noise, enriching data, and surfacing critical events for review. These integrations enable SecOps teams to consolidate, prioritise, and analyse data from multiple sources within Auguria's platform, reducing complexity and enabling faster, smarter security decisions. Introducing the Explainability Graph Auguria's Explainability Graph is a pioneering feature designed to visualise threat data, providing security teams with an intuitive and contextual map of anomalous activity. It provides a detailed yet easy-to-digest representation of suspicious or anomalous activity, helping teams to: Uncover Root Causes: Understand the "why" behind unusual behaviour or threats. Connect the Dots: Identify the underlying relationships between seemingly isolated events. Act with Confidence: Gain actionable insights to mitigate emerging threats faster. With the release of Explainability Graph, Auguria is demonstrating its data science prowess at being able to coalesce and relate millions of streaming log events. The result: security teams can stay ahead of increasingly sophisticated threats with minimal friction. Why do these updates matter? "Our latest integrations and Explainability Graph reinforce Auguria's mission to simplify security operations while amplifying outcomes," said Chris Coulter, CTO and co-founder at Auguria. "By supporting industry pioneers like CrowdStrike, Palo Alto Networks, Microsoft, and SentinelOne and innovating with tools like our Explainability Graph, we're giving organisations the clarity and precision they need to succeed in today's complex threat landscape without being overwhelmed by noise." Key benefits for SecOps teams Cost Efficiency: Reduce SIEM and data storage expenses by intelligently managing less-critical telemetry. Noise-free Insights: Automatically filter up to 99% of non-actionable data. Faster Investigations: Enriched, prioritised data accelerates response times. Proactive Threat Hunting: AI-driven detection of anomalies and high-risk behaviours. Customisable Outputs: Export enriched data to SIEM, XDR, or other security tools seamlessly.
Rapid7, Inc., a pioneer in extended risk and threat detection, announced the addition of third-party detections for defence-in-depth with Managed Threat Complete (MTC), the company’s Managed Detection and Response (MDR) solution. Rapid7’s global service now includes coverage for CrowdStrike Falcon, SentinelOne Singularity Endpoint, and Microsoft Defender for Endpoint. Native endpoint security has always been part of Rapid7's defence-in-depth approach. Now, by enriching and layering SOC expertise with third-party endpoint detections, MTC delivers a more comprehensive defense of the customer's extended ecosystem. Rapid7’s MDR service Rapid7’s MDR service goes beyond endpoint telemetry alone and leverages its next-gen SIEM foundation Rapid7’s MDR service goes beyond endpoint telemetry alone and leverages its pioneering next-gen SIEM foundation to integrate and correlate diverse telemetry across the attack surface - endpoint, network, user, cloud. This wider coverage, combined with Rapid7’s expertise, provides critical context and faster investigations for more effective response for the modern attack surface. The additional endpoint support announced builds on Rapid7’s strategy to provide modern attack surface monitoring across endpoint, cloud service providers, identity and access management, and network security solutions. Next-gen SIEM “Our pioneering next-gen SIEM allows Rapid7 to process broad telemetry and was purpose-built to operationalise our SOC expertise to deliver unparallelled clarity for our MDR service,” said Craig Adams, chief product officer at Rapid7. “Adding third-party detection support to Managed Threat Complete deepens our visibility across a customer’s environment, which in turn helps us respond even more quickly and efficiently to threats.” Rapid7’s SOC analysts With the addition of extended ecosystem monitoring, customers can connect the supported tools in their environment to MDR for triage, investigation, and response. Rapid7’s SOC analysts can now better serve customers with: Enhanced Visibility: With coverage for third-party event sources, the need to manually normalise information across a customer’s technical environment is eliminated, saving time and giving teams confidence that their full attack surface is covered. Reduced Noise: Detect threats across all phases of the MITRE ATT&CK framework and modern threat landscape - without more noise. Realise high efficacy detections with operationalised threat intelligence and expertise. Optimised Response: With broader telemetry and correlation across endpoint, network, identity and cloud, Rapid7’s incident response analysts can respond faster and more accurately to threats to eradicate them from customers’ environments.
SentinelOne and Lenovo announced a multi-year collaboration to bring AI-powered endpoint security to millions of Lenovo devices across the globe. Lenovo will include SentinelOne’s industry-pioneering Singularity™ Platform and generative AI capabilities (Purple AI) in new PC shipments, as well as offer upgrades to existing customers, to expand its ThinkShield security portfolio and autonomously protect devices from modern attacks. SentinelOne's Singularity Platform "The complexity and speed of today's cyberthreats demand an intelligent, adaptable defence," said Nima Baiati, Executive Director and General Manager, Cybersecurity Solutions, Intelligent Devices Group, Lenovo. "SentinelOne's Singularity Platform and Purple AI are at the forefront of this evolution, offering unparalleled, AI-powered protection. As Lenovo introduces groundbreaking new AI PCs to the market, we are integrating these cutting-edge AI-powered endpoint security capabilities into Lenovo's ThinkShield security platform. This will enhance endpoint protection and fortify enterprise resilience against the ever-evolving threat landscape." SentinelOne’s AI-powered security Lenovo’s direct sales team and channel partners can provide cutting-edge, built-in security to businesses of all sizes Lenovo is a pioneering enterprise PC vendor that sells tens of millions of devices annually. The new agreement between the long-time strategic partners is designed to significantly increase the number of Lenovo devices that ship with SentinelOne’s AI-powered security and will benefit from Lenovo’s broad global sales and partner network. As a result, Lenovo’s direct sales team and channel partners can provide cutting edge, built-in security to businesses of all sizes. “Cyber resilience is incredibly important for business continuity as organisations increasingly face the unpredictable. Our security services collaboration with SentinelOne is another key aspect of Lenovo’s cybersecurity and cyber resilience services intended to help protect customers from anomalous threats,” said Patricia Wilkey, SVP and GM of Lenovo Solutions and Services Group International Sales. New MDR service As part of the expanded collaboration, Lenovo will also build a new Managed Detection and Response (MDR) service using AI and EDR capabilities from SentinelOne’s Singularity Platform as its foundation. “The endpoint remains a primary vector of cyberattacks and the most critical part of a business' ongoing operations. By working with market pioneers like Lenovo, we can rapidly scale AI-powered security to millions of PCs and servers across the globe,” said Akhil Kapoor, Vice President Embedded Business, SentinelOne. “It’s an opportunity for Lenovo and SentinelOne to give Lenovo customers a clear security and resiliency advantage by delivering intelligent devices that defend themselves in real time.”
Maximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
DownloadThe key to unlocking K12 school safety grants
Download