SentinelOne, an autonomous cyber security platform company, has announced integrations with Revelstoke, Fletch, Code42, and KnowBe4, adding new use cases to the Singularity Marketplace. The new integrations expand Singularity XDR’s Security Orchestration, Automation, and Response (SOAR), insider threat protection, automated prioritisation, and end-user training capabilities.
“We are committed to strengthening the SentinelOne Singularity Platform ecosystem by partnering with leading vendors across the security stack,” said Akhil Kapoor, vice president of technology partnerships, SentinelOne. “We’re pleased to expand our offerings through our partnerships with Revelstoke, Fletch, Code42, and KnowBe4, helping customers gain additional detection, investigation and response synergies with their security tooling.”
The integration of SentinelOne Singularity Platform and Revelstoke’s SOAR capabilities enables organisations to optimise their security workflows through the automation of alert triage and incident remediation. SentinelOne Singularity XDR delivers rapid protection and precise threat detection across all attack surfaces, as well as proactive threat hunting and automated remediation. With the integration of Revelstoke’s low-code automation, organisations can easily streamline SentinelOne alert triage and response, improving their security workflows and reducing alert fatigue.
“Our next-level SOAR solution and its ability to correlate alerts paired with SentinelOne’s platform, which can secure endpoint, cloud, and identity, gives analysts the power to respond faster and more efficiently to real cyber threats facing their organisations,” said Bob Kruse, co-founder and chief executive, Revelstoke. “We look forward to working with SentinelOne on further integrations going forward and delivering even more value for our joint customers.”
The SentinelOne Singularity XDR and Fletch integration incorporates best-of-breed XDR and natural language search technology, correlating Fletch’s findings with each customer’s Singularity XDR data to provide a personalised, prioritised list of the threats that are most relevant to their business. Fletch’s Natural Language Search Engine continuously scours the internet to determine which threats are significant and automatically links its findings to Singularity XDR data, providing extra context to quickly respond to relevant threats. Fletch and SentinelOne alert customers if a trending threat represents risk to them and provide extensive context for rapid triage and remediation, eliminating the need to manually sift through threat feeds and conduct security analytics.
“Cyber security comes down to knowing what you need to know before it’s too late,” said Grant Wernick, chief executive and co-founder, Fletch. “Teams of all sizes struggle to keep up with the volume of threats. Most never get ahead. With the power of Fletch and SentinelOne, folks can finally focus on the threats that matter before they matter with their personal daily threat report.”
The SentinelOne Singularity XDR and Code42 Incydr integration significantly reduces the risks associated with insider threats by combatting data exposure and exfiltration. When investigating insider risk alerts from Incydr, analysts can quickly respond to data exposure by using the SentinelOne’s network isolation capability to isolate the user’s endpoint to prevent further exfiltration or risky activity. SentinelOne’s best-of-breed XDR technology and Code42’s insider threat detection protect organisations from unusual and high-severity activity with the controls to correct and contain data risk.
Introducing KnowBe4 SecurityCoach into the SentinelOne platform gives organisations a mechanism for improving security literacy across their business. SecurityCoach ingests and analyses threat incidents and alerts from SentinelOne and maps these incidents to specific end users, delivering real-time coaching as the incidents occur. With SecurityCoach automating coaching, users gradually eliminate risky behaviour, reducing the number of human error-related incidents and instilling a security-first culture without dominating the security team’s time.