S1 POC : Customer Testing Guide

Description

Overview
  • The SentinelOne Singularity™ platform protects your enterprise from threats of all categories, at all stages. Its patented AI (Artificial Intelligence) extends security from known signatures and patterns to the most sophisticated attacks, such as zero-day and ransomware. Singularity Complete includes: Full featured enterprise-grade EDR. NGAV and behavioral detection to stop known and unknown threats. Suite features like network control, USB device control, and Bluetooth device control.
Success Criteria Validation
  • To ensure that products meet your needs, it’s imperative that both parties understand the intended goal. This is accomplished by first establishing success criteria. We group success criteria into three core pillars: effectiveness, simplicity and performance. These are the most common claims tested by others.

Effectiveness

  • Consistently prevents the execution of previously unknown, known and custom-crafted malware and payloads without the need for signatures
  • High offline prevention rates
  • Identify the existence of potentially unwanted programs and dual-use toolkits
  • Blocks post-exploit memory attacks
  • Prevents execution of unauthorized scripts
  • Stops malicious Office macros
  • Ability to block unauthorized external storage
  • Reduces level of effort to detect and respond
  • Gain quick visibility for root cause analysis
Simplicity
  • Multi-OS support
  • Replaces (or if necessary augment) existing anti-malware solutions
  • Microsoft approved AV
  • No on-premises equipment required thus saving CAPEX and OPEX
  • Simple to deploy using GPO, login script or 3rd party software management packages
  • Ease of ongoing agent maintenance. Minimal updates
  • Uncomplicated and flexible policy options
  • Transparent to the end user. No required changes to their processes or training
  • Eases coverage for globally roaming users whether they are online or offline. No need to backhaul roaming users through the corporate security stack
  • Does not require excessive (or any) policy exceptions for line of business applications to work
  • Automate response actions to behavioral threats without human intervention
Performance
  • Reduction in security alert “noise” once endpoints are in auto-quarantine mode
  • Single console scales to millions of endpoints. No need for additional management components as you grow
  • Non-disruptive to the environment. No reboot required including servers
  • Does not interfere with the end user experience. Fully autonomous agent with a reasonable systems resources
    footprint:
    • No daily .DAT signature updates
    • Eliminates daily hard disk scans
    • Reduces aggregate CPU usage
    • Reduces Memory usage
    • Increases file transfer speeds
    • Reduces application launch time (Outlook, Word, IE, Chrome, etc.)
    • Extended battery usage through lower power consumption
  • Extended system usable lifespan, e.g. older computers can run our lighter weight software longer
  • Lowers network bandwidth usage by eliminating legacy solution DAT file distribution challenges
  • Returns performance to VDI infrastructure while providing a more complete guest OS-based anti-malware solution compared to hypervisor-level malware-only scanning
  • Anomalous behavior visibility
  • Enterprise-wide attack indicator queries returned in seconds

Related Articles

  • MSS Managed Firewall Best Practice Configuration
    Read More
  • NDR: Integration Guide
    Read More
  • NDR: Windows Server Agent
    Read More
not finding your answers?