{"id":18462,"date":"2021-04-23T21:21:58","date_gmt":"2021-04-23T21:21:58","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18462"},"modified":"2023-01-10T19:15:20","modified_gmt":"2023-01-10T19:15:20","slug":"sentinelone-product-review","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/","title":{"rendered":"SentinelOne Product Review"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Endpoint detection and response (EDR) is a vital tool for creating an effective security infrastructure for your organization. Endpoints are the most common entry point for malware and other malicious attackers, and protecting them is more important than ever with the <\/span><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\"><span style=\"font-weight: 400;\">boom in remote work<\/span><\/a><span style=\"font-weight: 400;\"> due to the COVID-19 pandemic.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">About SentinelOne<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">SentinelOne is an advanced EDR tool that uses AI-powered threat detection and response. It combines EDR and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/antivirus-vs-epp-vs-edr\/\"><span style=\"font-weight: 400;\">endpoint protection platform (EPP)<\/span><\/a><span style=\"font-weight: 400;\"> capabilities and operates across all aspects of a network, including endpoints, containers, cloud workloads and internet of things (IoT) devices. SentinelOne was named one of our <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\"><span style=\"font-weight: 400;\">Top Endpoint Detection &amp; Response (EDR) Solutions for 2021<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Its patented behavioral and static AI models provide powerful automation for identifying and blocking threats. SentinelOne offers protection against executables, memory-only malware, exploits in documents, spear phishing emails, macros, drive-by downloads and other browser exploits, scripts such as Powershell, and credential encroachments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SentinelOne was named the top-rated endpoint protection platform by Gartner Peer Insights. They recently launched a research division made up of security experts to help protect against evolving advanced threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SentinelOne has raised $700 million in funding since being founded in 2013. The vendor also recently <\/span><a href=\"https:\/\/venturebeat.com\/2021\/02\/09\/sentinelone-bolsters-its-big-data-analytics-with-155-million-scalyr-acquisition\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">acquired Scalyr<\/span><\/a><span style=\"font-weight: 400;\">, a log management, server monitoring and event data analytics provider for $155 million. This move was meant to extend the platform&#8217;s monitoring and analysis capabilities beyond endpoints and across an entire enterprise and cloud attack surface.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SentinelOne proved itself to be a powerful enough solution for Amazon to make available on the <\/span><a href=\"https:\/\/www.sentinelone.com\/press\/sentinelone-now-available-in-aws-marketplace\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">AWS marketplace<\/span><\/a><span style=\"font-weight: 400;\"> so customers can rapidly deploy the solution.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Notable features<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">SentinelOne offers a number of key features that make it a comprehensive EDR solution.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Administration<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Sentinel one simplifies endpoint management. It offers a centralized console for managing assets and discovering and controlling devices.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Detection and response<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Machine learning and AI allow SentinelOne to anticipate and identify threats in real-time. It continuously hunts for threats throughout a network, using patented behavioral AI to recognize potentially malicious behavior. It can detect fileless, zero-day and nation-grade attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SentinelOne also provides automated responses. When threats are detected, it can isolate, quarantine and even remediate issues without human intervention.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Analytics<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Part of what makes SentinelOne such a powerful solution is its analytics-based approach to threat detection and response. The combination of data collection, behavioral analysis, AI and machine learning, as well as robust incident reporting, provides an abundance of threat intelligence to proactively identify new threats and offer effective remediation. This is further bolstered by the acquisition of Scalyr.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">SentinelOne plans<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">SentinelOne does not release pricing information on its website. Contact the vendor for custom enterprise pricing tailored to meet the varying needs of your organization.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">SentinelOne case studies<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">SentinelOne is best suited for enterprise organizations. It can support use cases across a variety of industries. Here are some example case studies:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/assets.sentinelone.com\/usecase\/fever-tree-cs\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Fever-Tree<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/assets.sentinelone.com\/mitre\/460361177\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">MITRE<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/assets.sentinelone.com\/casestudy\/sentinel-one-why-hit-1\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Hitachi Consulting<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/assets.sentinelone.com\/casestudy\/sentinel-one-avx-cs-\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">AVX<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/assets.sentinelone.com\/casestudy\/sentinel-one-tgif-cs-1\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">TGI Fridays<\/span><\/a><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Top SentinelOne Alternatives<\/span><\/h2>\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-vertical\">\n            <!--\n            ICP Plugin - body vertical\n            ----------\n            Category: SEC-EDR\n            Count: 5\n            Country: HK\n        -->\n    <\/div><!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d7000ad092d-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7000ad092d\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7000ad092d\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7000ad092d\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7000ad092d\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7000ad092d\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7000ad092d\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Endpoint detection and response (EDR) is a vital tool for creating an effective security infrastructure for your organization. Endpoints are the most common entry point for malware and other malicious attackers, and protecting them is more important than ever with the boom in remote work due to the COVID-19 pandemic. About SentinelOne SentinelOne is an [&hellip;]<\/p>\n","protected":false},"author":161,"featured_media":18456,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[28055,23445,22052],"b2b_audience":[],"b2b_industry":[],"b2b_product":[378],"class_list":["post-18462","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-edr","tag-endpoint-detection-and-response","tag-sentinelone","b2b_product-endpoint-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SentinelOne Review: Key Features | eSecurityPlanet<\/title>\n<meta name=\"description\" content=\"entinelOne is an AI-powered endpoint detection and response (EDR) solution. Learn about SentinelOne and its features.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SentinelOne Review: Key Features | eSecurityPlanet\" \/>\n<meta property=\"og:description\" content=\"entinelOne is an AI-powered endpoint detection and response (EDR) solution. Learn about SentinelOne and its features.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-23T21:21:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-10T19:15:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Endpoint_Security_2-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1511\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kyle Guercio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kyle Guercio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/\"},\"author\":{\"name\":\"Kyle Guercio\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fcdece1299767aff305bb146ab672b20\"},\"headline\":\"SentinelOne Product Review\",\"datePublished\":\"2021-04-23T21:21:58+00:00\",\"dateModified\":\"2023-01-10T19:15:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/\"},\"wordCount\":503,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Endpoint_Security_2-scaled.jpeg\",\"keywords\":[\"EDR\",\"endpoint detection and response\",\"sentinelone\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/\",\"name\":\"SentinelOne Review: Key Features | eSecurityPlanet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Endpoint_Security_2-scaled.jpeg\",\"datePublished\":\"2021-04-23T21:21:58+00:00\",\"dateModified\":\"2023-01-10T19:15:20+00:00\",\"description\":\"entinelOne is an AI-powered endpoint detection and response (EDR) solution. Learn about SentinelOne and its features.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Endpoint_Security_2-scaled.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Endpoint_Security_2-scaled.jpeg\",\"width\":2560,\"height\":1511,\"caption\":\"Cloud storage communication with computer, laptop, tablet and smartphone in home or work network. Online devices upload, download information, data in database on cloud services. Isometric concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SentinelOne Product Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fcdece1299767aff305bb146ab672b20\",\"name\":\"Kyle Guercio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a28973bbf29322be5ea89bd09def6a83?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a28973bbf29322be5ea89bd09def6a83?s=96&d=blank&r=g\",\"caption\":\"Kyle Guercio\"},\"description\":\"Kyle Guercio has worked in content creation for six years contributing blog posts, featured news articles, press releases, white papers, and more for a wide variety of subjects in the technology space. He covers topics relating to servers and cybersecurity and has contributed to ServerWatch and Webopedia.com.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/kyle-guercio\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SentinelOne Review: Key Features | eSecurityPlanet","description":"entinelOne is an AI-powered endpoint detection and response (EDR) solution. Learn about SentinelOne and its features.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/","og_locale":"en_US","og_type":"article","og_title":"SentinelOne Review: Key Features | eSecurityPlanet","og_description":"entinelOne is an AI-powered endpoint detection and response (EDR) solution. Learn about SentinelOne and its features.","og_url":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/","og_site_name":"eSecurity Planet","article_published_time":"2021-04-23T21:21:58+00:00","article_modified_time":"2023-01-10T19:15:20+00:00","og_image":[{"width":2560,"height":1511,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Endpoint_Security_2-scaled.jpeg","type":"image\/jpeg"}],"author":"Kyle Guercio","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Kyle Guercio","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/"},"author":{"name":"Kyle Guercio","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fcdece1299767aff305bb146ab672b20"},"headline":"SentinelOne Product Review","datePublished":"2021-04-23T21:21:58+00:00","dateModified":"2023-01-10T19:15:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/"},"wordCount":503,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Endpoint_Security_2-scaled.jpeg","keywords":["EDR","endpoint detection and response","sentinelone"],"articleSection":["Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/","url":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/","name":"SentinelOne Review: Key Features | eSecurityPlanet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Endpoint_Security_2-scaled.jpeg","datePublished":"2021-04-23T21:21:58+00:00","dateModified":"2023-01-10T19:15:20+00:00","description":"entinelOne is an AI-powered endpoint detection and response (EDR) solution. Learn about SentinelOne and its features.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Endpoint_Security_2-scaled.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/04\/Endpoint_Security_2-scaled.jpeg","width":2560,"height":1511,"caption":"Cloud storage communication with computer, laptop, tablet and smartphone in home or work network. Online devices upload, download information, data in database on cloud services. Isometric concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/sentinelone-product-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"SentinelOne Product Review"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fcdece1299767aff305bb146ab672b20","name":"Kyle Guercio","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a28973bbf29322be5ea89bd09def6a83?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a28973bbf29322be5ea89bd09def6a83?s=96&d=blank&r=g","caption":"Kyle Guercio"},"description":"Kyle Guercio has worked in content creation for six years contributing blog posts, featured news articles, press releases, white papers, and more for a wide variety of subjects in the technology space. He covers topics relating to servers and cybersecurity and has contributed to ServerWatch and Webopedia.com.","url":"https:\/\/www.esecurityplanet.com\/author\/kyle-guercio\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18462"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/161"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18462"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18462\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18456"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18462"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18462"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18462"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}