Hi [[ session.user.profile.firstName ]]

Defining Next Generation Endpoint Protection

VP and Gartner Fellow, Neil MacDonald, and SentinelOne CMO and SVP Marketing, Scott Gainey look at the top security challenges organizations face, the steps to take to secure your enterprise, and SentinelOne's next-generation approach to defending endpoints.
Recorded Sep 8 2016 35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Neil MacDonald, Gartner VP and Fellow, and Scott Gainey, CMO SentinelOne
Presentation preview: Defining Next Generation Endpoint Protection

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ask Me Anything | MITRE ATT&CK Round 2 Results 2020 Oct 7 2020 3:00 pm UTC 59 mins
    Grant Moerschel, Jared Phipps, Yonni Shelmerdine
    We have the 3-day MITRE attack emulation results. You have questions. We can go high-level, and dive into the details.

    Please join our technical panel of experts as we summarize the results from the MITRE ATT&CK Round 2 attack emulation, and answer your questions on SentinelOne’s performance against APT29 so that your SOC can:

    - Reduce risk
    - Suppress alert noise, and amplify EDR signal
    - Increase SOC productivity and ROI
  • Aston Martin's Road to Zero Threats: SentinelOne's Vigilance MDR Sep 30 2020 3:00 pm UTC 39 mins
    Chris Coulter, SentinelOne Sr. Director Threat Services, Steve O'Connor, Director of IT, Aston-Martin, Eran Ashkenazi
    Watch to hear from Steve O’Connor of Aston Martin, a SentinelOne customer, on how Vigilance MDR helps:
    - Empower existing employees to do more while reducing operational overhead
    - Access threat experts for customized analysis and actioning of every alert
    - Complement internal security operations with 24/7/365 coverage Key Key Takeaways:
    - How does an MDR services operates?
    - How to evaluate and choose your MDR provider?
    - Tips for MDR enabled SOCs
  • MITRE 2020 ATT&CK Evaluation | What the Results Really Mean to the CISO & SOC Recorded: Sep 24 2020 57 mins
    Grant Moerschel VP Product Marketing, Chris Bates, CISO, Jared Phipps VP WW Sales Engineering
    Join our MITRE webinar to see SentinelOne’s victorious performance against APT29.
    MITRE has become the common language of EDR and is the de facto way to evaluate a product’s ability to provide actionable information to the SOC. MITRE ATT&CK’s use of APT29, the notorious threat actor that evaded the DNC, shows us that many of today’s EDR tools fail to cope with advanced techniques. CISOs should carefully evaluate which technologies capture the most information and provide context at each stage in MITRE’s simulation.
    Key Takeaways:
    -Understanding What is MITRE ATT&CK and Why Does It Matter?
    -Understanding How Does MITRE ATT&CK Evaluate Security Products?
    -Review SentinelOne performance at MITRE 2020 ATT&CK Evaluation
  • What’s on your network?Leveraging SentinelOne Ranger for IoT discovery & control Recorded: Sep 17 2020 38 mins
    Grant Moerschel, Mike Petronaci
    SentinelOne Ranger is a capability of the SentinelOne Singularity XDR Platform. Ranger provides IoT device discovery and rogue device isolation all accomplished without adding agents, without network changes, and without additional network gear.
  • Psychological Mechanisms Used in Ransomware Splash Screens Recorded: Sep 26 2017 45 mins
    Jeremiah Grossman, Chief of Security Strategy at SentinelOne
    SentinelOne recently released a report with De Montfort University to examines the differing levels of sophistication on the part of the attackers and trends and tactics use to commission a payment from organizations.

    Join this session as we discuss the common trends highlighted in the report including:
    - Time criticality and deadline sensitivity
    - Consequences for not paying or missing the demand
    - The Customer Service Approach on how to pay the ransom
    - The use of a variety of imagery
    - Preferred mechanism for payment

    About the presenter:
    Jeremiah’s InfoSec career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry’s biggest names. At SentinelOne, Jeremiah is responsible for designing effective defense strategies against ever-evolving attacks including ransomware. Prior to joining, Jeremiah was the Founder & CEO of WhiteHat Security, specializing in website risk management.
  • SentinelOne: Deep Visibility Recorded: Sep 20 2017 51 mins
    Tomer Weingarten, CEO
    The average volume of encrypted web traffic has now crossed the 50% mark. Gartner expects more than 80% of enterprise web traffic to be encrypted by 2019. Protecting against attacks hidden in this traffic is going to be increasingly critical for organizations to safeguard their information and their customers. And you've got to be able to achieve that without complicating your networks or impacting your user-experience.

    Join Tomer Weingarten, CEO of SentinelOne, to learn the best strategies to protect against the world of encrypted threats:

    How to architect a solution that accelerates time to detection
    How IOC search and threat hunting done right can help maximize the benefits of these security pursuits
    Insights into the best response strategies to minimize business impact of threats
  • SentinelOne & Forrester: How to Build Your Endpoint Security Blueprint Recorded: Aug 23 2017 61 mins
    Rajiv Raghunarayan
    We've all heard of traditional endpoint models failing. And there is an overwhelming number of next generation technologies. As a customer how do you identify the right technology, the right approach to invest in?

    Hear Guest Speaker Chris Sherman, Forrester Senior Security Analyst, and Rajiv Raghunarayan, SentinelOne VP of Product Marketing, talk about the top trends and approaches to safe guard your endpoints, users, and organization against the continued evolution of threat and business landscapes.
  • A Closer Look at SentinelOne Recorded: Jul 21 2017 63 mins
    Rajiv Raghunarayan, SentinelOne Vice President, Product Marketing, Raj Rajamani, SentinelOne Vice President, Product
    Our R&D teams have had a busy year thus far and we would like to invite you to learn more about recent releases and updates made to the SentinelOne platform.

    Rajiv, our VP of Product Marketing, will lead you through the changing threat landscape and provide an overall platform update. Including:
    VDI - full memory protection, threat visibility on decommissioned devices, and more
    Updates to On-Premise Appliance for Fed, Gov, and GDPR use cases
    A brief demo of SentinelOne with AWS workspaces
    Highlights about recent ransomware attacks and our new executive team
  • NSS TCO - Is your Security Worth it? Recorded: Jun 15 2017 42 mins
    Mike Spanbauer, NSS VP Research Strategy, Robert Zamani, SentinelOne Executive Director, WW Solutions Engineers
    NSS Labs, a leading independent solution testing provider, recently pitted next-generation endpoint protection solutions against real-world threat scenarios to determine which faired the best in performance and in TCO. SentinelOne led the pack in both categories, achieving the HIGHEST ROI score of all the vendors:
  • SANS: Ready, Aim, Protect With Total Endpoint Protection Recorded: Apr 18 2017 60 mins
    SANS expert, G.W. Ray Davidson, PhD and SentinelOne VP of Services and Field Operations, Eran Ashkenazi
    A recent SANS survey reported that over half of IT respondents admitted to an endpoint security breach. That statistic didn't cover those who may have been compromised and just didn't know it.
  • Beyond Files: The Full Spectrum of Attacks Recorded: Mar 14 2017 60 mins
    Eran Ashkenazi, VP of Services & Field Operations, SentinelOne
    We’ve all seen the bake-offs - vendor against vendor, the ‘latest’ malware samples run raw and then packed, and who apparently wins the race against hackers. But there is one major flaw in these tests - they’re only covering a fraction of attacks that occur in the wild. What about exploits? What about script-based attacks, including powershell and VMI? What about attacks that leave no file indicators - how does your security stop them?

    Join SentinelOne’s Eran Ashkenazi, VP of Field Services and Support, as he discusses the full spectrum of attacks that are currently out in the wild and what you can do to protect against them.

    What you’ll learn:
    - The types of attacks, or attack vectors, you should include in your evaluation testing
    - Real-world attacks that utilize methods that leave no file-based indicators
    - How SentinelOne’s next generation endpoint protection protects against a file-less attack in a live demo
  • RSA Recap - SentinelOne Executives on Ransomware Recorded: Mar 9 2017 79 mins
    Jeremiah Grossman, Chief of Security Strategy and Eran Ashkenazi, VP of Services and Field Operations
    At RSA, Jeremiah Grossman, SentinelOne Chief of Security Strategy, covered a session on the ever so popular topic of ransomware. Explosive growth demands focused understanding, so join this webinar to learn; what the kidnapping & ransom economy teaches us about ransomware, how SentinelOne stops ransomware (with a live demo) and innovative research to combat ransomware, including case studies on response and recovery
  • A Cyber Risk Survival Guide: Adding Cyber Insurance to Security Recorded: Dec 14 2016 55 mins
    Sean Roth, Head of Product Marketing and Charlie Bernier, Broker/Defense attorney at ECBM Insurance Brokers and Consultants
    It seems like every week we see a high profile cyber attacks aimed at stealing sensitive data and extorting money. And then tack on the aftermath to the organization who was hit - the cost of resulting lawsuits, penalties, and lost revenue due to reputation damage.

    But there is hope! Organizations around the world are implementing strategies to mitigate the looming cyber risk, and they involve both technology AND policy.

    In this webinar, you'll get expert advice from guest speaker Charlie Bernier, cyber insurance pioneer and Broker/Attorney at ECBM Insurance Brokers and Consultants and Sean Roth, SentinelOne Director of Product Marketing, including:
    The real costs involved when a breach occurs
    Key considerations in designing a cyber insurance policy that protects your organization
    Choosing cybersecurity solutions that ultimately meet your security goals
  • Defining Next Generation Endpoint Protection Recorded: Sep 8 2016 35 mins
    Neil MacDonald, Gartner VP and Fellow, and Scott Gainey, CMO SentinelOne
    VP and Gartner Fellow, Neil MacDonald, and SentinelOne CMO and SVP Marketing, Scott Gainey look at the top security challenges organizations face, the steps to take to secure your enterprise, and SentinelOne's next-generation approach to defending endpoints.
  • Ransomware is Here: Fundamentals Everyone Needs to Know Recorded: Aug 31 2016 34 mins
    Jeremiah Grossman, Chief of Security Strategy
    If you’re an IT professional, you probably know at least the basics of ransomware. Instead of using malware or an exploit to exfiltrate PII from an enterprise, bad actors instead find valuable data and encrypt it. Unless you happen to have an NSA-caliber data center at your disposal to break the encryption, you must pay your attacker in cold, hard bitcoins—or else wave goodbye to your PII.

    Those assumptions aren’t wrong, but they also don’t tell the whole picture. Hear from Jeremiah Grossman, SentinelOne’s Chief of Security Strategy and a 20-year cybersecurity veteran, in this on-demand webinar that will explore the foundations of ransomware, and why you truly need to worry.
  • The Rise of Ransomware & How to Prevent It Recorded: Mar 28 2016 39 mins
    Aarij Khan, Product Marketing, SentinelOne
    Hackers are turning over big profits by holding data hostage in return for a ransom payment. Learn how ransomware infects machines and what you can do to protect against it.
  • SentinelOne Overview: The Future of Endpoint Protection Recorded: Feb 12 2016 20 mins
    Tomer Weingarten, CEO
    SentinelOne CEO and Co-Founder, Tomer Weingarten, discusses the challenges organizations face when trying to protect their endpoints, and why today's common defense systems are not working. Learn how SentinelOne's approach protects against all types of attacks, including exploits, without hogging valuable system resources.
  • Your organization has been breached, now what? Recorded: Mar 31 2015 32 mins
    Dal Gemmell, Director of Product Management and Steve LaBarbera, Director of Security Solutions, SentinelOne
    Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Learn How Hackers Evade Enterprise Security in 10 Minutes (or Less… ) Recorded: Feb 18 2015 46 mins
    Dal Gemmell, Director of Product Management and Steve LaBarbera, Director of Security Solutions, SentinelOne
    Learn about common evasion techniques used by advanced threats, attacks that leverage those techniques, and SentinelOne security predictions for 2015.
SentinelOne was founded in 2013 by an elite team of cyber security and defense experts who developed a fundamentally new, groundbreaking approach to endpoint protection.

SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity. SentinelOne unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial intelligence. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response and to adapt their defenses against the most advanced cyberattacks. SentinelOne has offices in Mountain View, Tel Aviv, and Tokyo. The company is recognized by Gartner as a Visionary for Endpoint Protection and has enterprise customers in North America, Europe, and Japan.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Defining Next Generation Endpoint Protection
  • Live at: Sep 8 2016 3:00 pm
  • Presented by: Neil MacDonald, Gartner VP and Fellow, and Scott Gainey, CMO SentinelOne
  • From:
Your email has been sent.
or close