SentinelOne Endpoint Protection Platform

April 18, 2018
New capabilities enable customers to identify the most vulnerable applications, devices, and groups that attackers will likely target

SAN FRANCISCO – April 18, 2018SentinelOne, the autonomous endpoint protection company, has announced the addition of new Risk and Vulnerability Management capabilities in the SentinelOne Endpoint Protection Platform - empowering customers to prioritize the most vulnerable applications, devices, and groups on their networks.

Vulnerable software applications are increasingly targeted by attackers to compromise endpoints and gain a persistent presence on targeted networks. The SentinelOne Endpoint Protection Platform maintains an up-to-date inventory of all applications installed on the endpoints on which its agent is installed. By correlating this information with the National Vulnerability Database (NVD), SentinelOne is able to produce risk reports to identify vulnerable applications, devices, and groups. This enables customers to proactively secure the pathways attackers are most likely to take.

“New vulnerabilities are discovered every day, but organizations often find out about them too late in the cycle to prevent attacker exploitation. Vulnerability scanners like Qualys or Rapid7 can take a long time to generate vulnerability reports, by which time attackers may have already exploited the weaknesses,” said Raj Rajamani, VP of Product Management, SentinelOne. “SentinelOne is the only next-gen endpoint protection platform to natively provide highly-accurate and comprehensive reports without performing a scan. This enables customers to stay ahead of attackers by identifying the vulnerable points they’ll try to exploit.”

Endpoint devices, especially laptops, are assigned dynamic IPs using DHCP. When using un-credentialed scans, associating the results with the right device is a time-consuming task. Credentialed scans require shared credentials or pose a credential management nightmare. As a result, these assets are seldom covered by vulnerability scans. 

“Another weakness of traditional vulnerability management is that they only identify the problem, but do not solve them,” said Rajamani. “SentinelOne protects against known and unknown vulnerabilities using its Exploit Shield technology.”

The Risk and Vulnerability reports are available for applications on all supported platforms - Windows, MacOS, and Linux. The Risk report uses various factors including vulnerabilities, agent version, user location/risk, and countermeasures to create a prioritized list of applications for patching. 

For more information, please visit SentinelOne will be showcasing Risk and Vulnerability Reports during RSA at booth #935 Moscone South.

About SentinelOne

SentinelOne delivers autonomous endpoint protection through a single agent that successfully prevents, detects and responds to attacks across all major vectors. Designed for extreme ease of use, the S1 platform saves customers time by applying AI to automatically eliminate threats in real time for both on premise and cloud environments and is the only solution to provide full visibility across networks directly from the endpoint. To learn more visit or follow us at @SentinelOne, on LinkedIn or Facebook.


Request More Information

By clicking above, I acknowledge and agree to Endeavor Business Media’s Terms of Service and to Endeavor Business Media's use of my contact information to communicate with me about offerings by Endeavor, its brands, affiliates and/or third-party partners, consistent with Endeavor's Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the resource, so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them. You may unsubscribe at any time.