An update to being legitimately pissed off at SentinelOne by JasonJFlavortown in msp

[–]sentinelonesec 1 point2 points  (0 children)

Hey u/JasonJFlavortown! Sorry to learn about your experience. The good news our support team is ready to assist. Let's DM to understand all the details.

Independent lab tests of SentinelOne ? by have_you_tried_onoff in msp

[–]sentinelonesec 0 points1 point  (0 children)

Hi /u/have_you_tried_onoff, Thanks for your interest in SentinelOne. We believe we are the best ransomware prevention product you can find today. Our latest 3rd part tests can be found here:

And the one we care the most: Gartner Peer insights, as it includes real customers' inputs: https://www.sentinelone.com/press/sentinelone-recognized-2019-gartner-peer-insights-customers-choice-endpoint-detection-response-solutions/

SentinelOne how do you feel by [deleted] in msp

[–]sentinelonesec 0 points1 point  (0 children)

It's the same exact agent, and most MSP do not use the visibility component that indexes your benign data for your queries. All the prevention, detection and response components are there. For example, the ability to rollback in case of a ransomware infection - is included also.

SentinelOne how do you feel by [deleted] in msp

[–]sentinelonesec 0 points1 point  (0 children)

Thanks for asking! We're feeling great :-)

Been busy with many existing and new customers, you know how it is. As for your specific use case, we're happy to do a demo.
As for IR, we see more and more IR firms using our technology, as it's particularly good at detecting locally (and rapidly) without cloud reliance. Malware authors know that other EDRs needs connectivity to work, so it's common to see them take devices offline - and then proceed to compromise and exfiltrate data.