A visit to our Sentinel-One web page suggests that you wish to deploy counter-measures to protect against the scourge of Ransomware.


SentinelOne was founded in 2013 by a group of cyber-security experts who developed a fundamentally new, ground breaking approach to endpoint protection that is guaranteed to fight-off Ransomware. The difference and fundamentally new approach employs behavioural, machine learning and intelligent automation to deliver integrated cyber threat prevention, detection and responses; contained within a centrally managed architecture.

Via the rethinking of their approach to malware detection, cyber-exploits, and other forms of attack (including today's scourge ... Ransomware), SentinelOne has produced a technology that will successfully protect you against Cyber-Attacks in REALTIME.

Modelled around it's Dynamic Behaviour Tracking (DBT) engine SentinelOne functions to keep User and Business systems safe, even from those most sophisticated forms of Cyber-Attack; plus it operates continuously on and at the endpoint, without the use of emulation or sandboxing techniques.


Sentinelone Endpoint

By deploying SentinelOne a sophisticated and advanced level of cyber-protection is introduced within the network infrastructure that neutralizes today's Cyber-Attacks and eliminates their spread. The SentinelOne headline capabilities that achieve that assertion are:-


Deep system-level monitoring:     Deployed on each endpoint, SentinelOne EPP's lightweight autonomous agent monitors all activity in both kernel and user space (including files, processes, memory, registry, network, etc.). The agent is virtually silent and never degrades User productivity.

Intelligent, signature-less static prevention:   As a first line of defence, SentinelOne EPP's Deep File inspection (DFI) engine expertly uncovers plus blocks known and unknown file-based malware, leveraging advanced machine learning algorithms rather than just relying "signatures".

Behavioural detection of advanced attacks:   EPP broadens protection against advanced threats through cutting-edge behaviour-based detection. SentinelOne's Dynamic Behaviour Tracking (DBT) Engine detects any type of malicious activity - from polymorphic malware and sophisticated exploits to stealthy insider attacks - against the full context of normal system activity.


Zero-touch mitigation and containment:   SentinelOne EPP's fully integrated, policy-driven mitigation covers all endpoints - local and remote - allowing for decisive incident response that makes "dwell time" a thing of the past. Upon detection, SentinelOne EPP immediately stops lateral threat spread cold by swiftly killing malicious processes, quarantining infected files, or disconnecting the infected endpoint device from the network yet it still maintains the agent's connection to the management console.

Full remediation:    Easily reverse malware-driven modifications to registry and system settings.

Single-click rollback:   Instantly restore any compromised files back to their previous trusted states. (Windows VSS needs to be enabled).

Auto-immunization:   Each time SentinelOne EPP finds a new, never-before-seen malicious binary, it instantly flags it and notifies all agents on the network, rendering other endpoint devices immune to that attack.

"Customer Observation"

"In today's threat environment, you're fooling yourself if you think antivirus is going to block every attack headed your way. Seeing that malware and other attacks can easily get by AV, you need endpoint protection that uses behaviour-based detection instead of signatures."    Joe Miller  Security Engineering Team Lead, Global Cosmetics Manufacturer.

to email for further assistance or to arrange an appointment.

Alternatively call our office number +44 (0)1344 780000.


Systems Requirement Image

SentinelOne has developed a technology that will successfully protect against modern and sophisticated cyber-attacks in real time. At it's core is the Dynamic Behaviour Tracking (DBT) engine that functions to keep user and business systems safe, even from the most advanced form of cyber-attack; plus it operates continuously on the endpoint, without using emulation or sandboxing techniques.

The endpoint agent is a lightweight, small footprint module that is installed on devices both at the kernel level and in user space. {Agent can be deployed using standard MSI/PKG packages).


The agent "taps" every process and thread on the endpoint system, and extracts all relevant operations data, including system calls, network, IO, registry (on Windows) and more, so it can monitor the behaviour of every process that executes on that system.

Traditional antivirus, and other preventive solutions that leverage inline processes, use static signatures or other reputation methods to evaluate executing binaries to determine whether it's malicious or not. By contrast, the SentinelOne approach doesn't require being inline - the agent automatically "taps" and obtains operation data, and allows the process to continue while monitoring everything the process does during and after execution.


The monitoring module asynchronously sends the operation data to the pre-processing module, which analyses the operation data and builds a full context around every process. This stage translates the raw monitored operations data log into a much more structured, abstract operation language.


The analysing module is constantly working in the background and runs sophisticated pattern matching algorithms to detect malicious behaviours in full context process operations, looking system-wide at the operations, as well as historical information. The "patterns" - malware behaviours and techniques - are researched in SentinelOne's labs by reverse engineering thousands of malware samples daily, clustering them, and deducing behaviours to research and Score.

The analysing module Scores every malicious and suspicious pattern detected during process execution, and once the aggregated Score exceeds a threshold, the process is designated malicious.

Suspicious patterns of execution are typically different techniques or interactions with the operating system that malware is employing throughout its execution lifecycle. This lifecycle can include (although cases will vary) the following stages: exploitation, obfuscation, persistence, collection, and ex-filtration.


When a process is established as malicious, the mitigation module takes action. There are different settings that may be configured either as a policy or as a manual operation and they include: "kill the process"; "quarantine the malicious binaries" or "delete them plus all associated remnants." Additionally, the module includes the ability to restore deleted or modified files to the state they were prior to the malware execution; effectively rolling back almost everything the malware process changed on the system.


Each time SentinelOne's behavioural pattern detection process discovers a previously unrecognised and malicious binary it is instantly signed and then notified to other SentinelOne agents around the infrastructure. This effective response introduces an immunity function into the whole infrastructure that works against unknown attacks by preventing them spreading and running on other machines around the network.


To counteract existing, known threats SentinelOne delivers a layer of pre-emptive protection by leveraging leading cloud reputation services. With the Cloud intelligence setting, SentinelOne sends hashes from executed binaries that exhibit suspicious behaviour and uses multiple, leading scan engines to check the reputation. Binaries identified as malicious are proactively blocked while benign ones are added to the whitelist to minimize false positives.


SentinelOne's approach enables the agent to be very lightweight. The minimal overhead incurred with monitored operations is 4 micro seconds that -- per an average machine usage of over 24 hours -- amounts to a total delay of only a second. (This process runs in low priority on the system, and takes between 0%-4% CPU usage. The memory footprint is about 20MB and the agent takes about 200MB on disk on an average machine usage simulated to run for over a year).

Read more about endpoint forensics in real-time, central management etc ..........

   Click Icon to download SentinelOne's technical brief PDF.


Additional Product Note:   All the relevant data collected from an Endpoint is offloaded to a centralized Management Console. That allows Administrators to view and analyze binaries plus threats, and conduct forensic investigations across all networked Endpoints: also, the Management Console provides retrospective search capabilities and Endpoint remote control features.

Real-time Endpoint Forensics is achieved by the constant monitoring of all processes at the Endpoint. That enables SentinelOne to provide real-time forensics and a 360 degree view of attacks through it's single Management Console; accessible from any device, anywhere. Security or Incident Response Analysts can rapidly access forensic data and use it to investigate the root cause and accelerate their incident response activities.

All the data monitored and collected from the Agent is sent back to the Management Console over an encrypted SSL link and is stored on the management server in encrypted file systems.

Hence SentinelOne uses data to compile real-time forensic information to identify where attacks originated and trace malicious actions. In addition, data can be easily offloaded to popular SIEM systems, including LogRhythm, to facilitate further investigation. It can also be sent to other network security devices for proactively blocking threats at an appropriate gateway.



Ransomware Screen-shot

SentinelOne believes that your next-generation endpoint protection solution should give you complete confidence that your sensitive data is protected against Ransomware and other sophisticated attacks - without the need for additional cyber insurance coverage.

In fact, they have guaranteed it!!

GUARANTEE LOGO In this industry leading move, SentinelOne offer customers a guarantee that no Ransomware attack will go undetected and cause irreparable damage.

SentinelOne does not give advice to Ransomware victims, whether or not they pay the ransom, but understands that there are times when it is necessary to recover data quickly. In the event that your organization must pay the ransom, SentinelOne Endpoint Protection Platform (EPP) customers are covered by the SentinelOne Cyber Guarantee that they will be reimbursed up to $1,000 USD per affected endpoint if they failed to keep you safe from the Ransomware attack; up to a maximum of $1,000,000 USD per company.



   CLICK Icon image to download Sentinel's ransomware is here white paper.

   CLICK Icon image to download Sentinel's ransomware protection guarantee brochure.

   CLICK Icon image to download Sentinel's FAQ concerning their guarantee.



Below will be found some additional documents discussing the capabilities delivered by the SentinelOne next-generation endpoint protection technology.

   CLICK Icon image to download Sentinel's solving the AV problem white paper.

   CLICK Icon image to download Sentinel's evaluating endpoint security solutions across the cyber kill chain white paper.

   CLICK Icon image to download Sentinel's technical brief.