sb-au logo
Story image

SentinelOne launches next-gen server protection offering

16 Aug 2019

SentinelOne has released a new next-generation server and protection offering, which is purpose-built for containers.

SentinelOne’s server and workload protection is infrastructure agnostic and can be deployed either in containers themselves, or in the machines that host them, in servers or in the cloud.

The product is fit for managed or unmanaged Kubernetes systems. It delivers SentinelOne’s Behavioral AI and autonomous response capabilities across all major Linux platforms, physical and virtual, cloud native workloads, and containers, providing prevention, detection, response, and hunting for today and tomorrow’s cyber threats. 

This includes malicious files and live attacks across cloud-native and containerised environments, offering advanced response options and autonomous remediation. 

According to SentinelOne, organisations have critical business structures that reside in – and are powered by – the cloud. Many of these are containerised workloads.

While many of today’s endpoint protection platform (EPP) and endpoint detection and response (EDR) tools rely on the cloud for detection, today’s tools are not optimized to protect the rapidly proliferating cloud attack surface. 

SentinelOne says its new server and workload protection is purpose-built for containerised workloads as well as deployments on traditional servers in the cloud and in private data centers. 

“The solution provides full visibility and response capabilities across these infrastructures, enabling enterprises to minimise risk. This is achieved by providing visibility, context, automation, and response for dynamic cloud workloads. SentinelOne’s next-generation layered security approach provides flexibility for the various workloads and architectures found in today’s enterprises.”

SentinelOne cofounder and CEO Tomer Weingarten adds, “As organisations increasingly turn to cloud-native architectures, their perimeter – as well as their attack surface – expands to the cloud”.

“These workloads require the same level of monitoring, provisioning, and protection as any other device on the corporate network. SentinelOne’s server and workload protection solves this common frustration by providing visibility, protection, and context into what’s happening across each and every cloud workload, container, and virtual machine on the network, and more importantly, real-time protection from attacks.” 

AVX is one company that uses SentinelOne’s solutions.

“As our business moves to the cloud, we can’t afford for the friction of today’s cloud security tools to get in the way of productivity,” says AVX global head of cybersecurity and privacy, Zack Moody. 

“It is critical for us to maintain a complete and unified view of our security across each and every workload. SentinelOne’s ability to tell us what we’re running and where, and also protect us, is essential to our cloud adoption.” 

Story image
Cybercriminals take bold steps forward as confidence soars - CrowdStrike report
Criminals are especially interested in targeting the supply chain as it enables them to go after multiple targets from a single intrusion point.More
Story image
Essential tools for managing user identity and how they impact your bottom line
Customer identity and access management (CIAM) is how companies give their end-users access to their digital properties, as well as how they govern, collect, analyse, and securely store data for those users.More
Story image
Increase in emergence of new cloud watering hole attacks
"Cloud native apps and services are more vital than ever before, and any risk in the infrastructure has critical implications."More
Story image
Quantum extends Veeam partnership in a bid to protect against ransomware
“Quantum continues to expand its partnership with us and we are pleased to add ActiveScale object storage to a select group of S3 targets that can provide robust ransomware protection for our joint customers."More
Story image
Research reveals increase in critical, low complexity vulnerabilities
2020 saw a large spike in physical and adjacent vulnerabilities, likely due to the proliferation of IoT and smart devices in use and being tested by researchers.More
Story image
Three security essentials for financial services
Financial services organisations must provide the best possible customer experience in terms of mobile and online application availability, performance and security, writes Gigamon country manager for A/NZ George Tsoukas.More