# SentinelOne llms.txt > Curated evergreen pages for AI assistants. ## Cybersecurity 101 Evergreen Content - [What is Endpoint Security? Key Features, Types & Threats](https://www.sentinelone.com/cybersecurity-101/endpoint-security/what-is-endpoint-security/) - [What is EDR(Endpoint Detection and Response)?](https://www.sentinelone.com/cybersecurity-101/endpoint-security/what-is-endpoint-detection-and-response-edr/) - [What is XDR(Extended Detection and Response)](https://www.sentinelone.com/cybersecurity-101/xdr/what-is-extended-detection-response-xdr/) - [What is SIEM(Security Information and Event Management)?](https://www.sentinelone.com/cybersecurity-101/data-and-ai/what-is-security-information-and-event-management-siem/) - [What is an Endpoint Protection Platform (EPP)?](https://www.sentinelone.com/cybersecurity-101/endpoint-security/what-is-an-epp/) - [What Is Cloud Security? - A Comprehensive Guide 101](https://www.sentinelone.com/cybersecurity-101/cloud-security/what-is-cloud-security/) - [What is CNAPP(Cloud-Native Application Protection Platform)?](https://www.sentinelone.com/cybersecurity-101/cloud-security/what-is-a-cnapp/) - [What is CSPM(Cloud Security Posture Management)?](https://www.sentinelone.com/cybersecurity-101/cloud-security/what-is-cspm/) - [What is a CWPP(Cloud Workload Protection Platform)?](https://www.sentinelone.com/cybersecurity-101/cloud-security/what-is-cwpp/) - [What is Vulnerability Management?](https://www.sentinelone.com/cybersecurity-101/cybersecurity/what-is-vulnerability-management/) - [What is Endpoint Protection? A Comprehensive Guide 101](https://www.sentinelone.com/cybersecurity-101/endpoint-security/endpoint-protection/) - [What is MDR(Managed Detection and Response)?](https://www.sentinelone.com/cybersecurity-101/services/what-is-managed-detection-response-mdr/) - [Top 10 Endpoint Security Solutions for 2025](https://www.sentinelone.com/cybersecurity-101/endpoint-security/endpoint-security-solutions/) - [Top 10 Endpoint Detection and Response(EDR) Solutions for 2025](https://www.sentinelone.com/cybersecurity-101/endpoint-security/edr-solutions/) - [Top 10 XDR Solutions for 2025](https://www.sentinelone.com/cybersecurity-101/endpoint-security/xdr-solutions/) - [Top 10 SIEM Tools For 2025](https://www.sentinelone.com/cybersecurity-101/data-and-ai/siem-tools/) - [What is Container Security? Benefits & Mistakes](https://www.sentinelone.com/cybersecurity-101/cloud-security/what-is-container-security/) - [Cloud Security Solutions: 10 Best Tools in 2025](https://www.sentinelone.com/cybersecurity-101/cloud-security/cloud-security-solutions/) - [10+ Best CSPM Tools for 2025](https://www.sentinelone.com/cybersecurity-101/cloud-security/cspm-tools/) - [What is Lateral Movement? Definition & Examples](https://www.sentinelone.com/cybersecurity-101/threat-intelligence/lateral-movement/) - [What is the MITRE ATT&CK Framework?](https://www.sentinelone.com/cybersecurity-101/threat-intelligence/mitre-attack-framework/) - [What is Threat Detection and Response(TDR)?](https://www.sentinelone.com/cybersecurity-101/threat-intelligence/threat-detection-and-response/) - [What is Active Directory Security? AD Security Explained](https://www.sentinelone.com/cybersecurity-101/identity-security/active-directory-security/) - [What is Identity Security?](https://www.sentinelone.com/cybersecurity-101/identity-security/identity-security/) - [What is Multi-Factor Authentication(MFA)?](https://www.sentinelone.com/cybersecurity-101/identity-security/what-is-multi-factor-authentication-mfa/) - [What is Zero Trust Architecture(ZTA)?](https://www.sentinelone.com/cybersecurity-101/identity-security/zero-trust-architecture/) - [10 Zero Trust Vendors & Solutions in 2025](https://www.sentinelone.com/cybersecurity-101/identity-security/zero-trust-vendors/) - [Managed Endpoint Security: Features, Benefits & Best Practices](https://www.sentinelone.com/cybersecurity-101/endpoint-security/managed-endpoint-security/) - [Top 11 Data Lake Security Best Practices](https://www.sentinelone.com/cybersecurity-101/data-and-ai/data-lake-security-best-practices/) - [What is Artificial Intelligence(AI) in Cybersecurity?](https://www.sentinelone.com/cybersecurity-101/data-and-ai/artificial-intelligence-in-cybersecurity/) - [Incident Response Plan: Components, Process & Template](https://www.sentinelone.com/cybersecurity-101/services/incident-response-plan-2/) - [What is Penetration Testing(Pen Testing)?](https://www.sentinelone.com/cybersecurity-101/services/penetration-testing/) - [Cyber Incident Response Guide: Best Practices, Tools & Strategies](https://www.sentinelone.com/cybersecurity-101/services/what-is-an-incident-response/) - [What is DFIR(Digital Forensics and Incident Response)?](https://www.sentinelone.com/cybersecurity-101/services/what-is-digital-forensics-and-incident-response-dfir/) - [What Is Vulnerability Assessment? Types & Benefits](https://www.sentinelone.com/cybersecurity-101/cybersecurity/vulnerability-assessment/) - [Patch Management vs Vulnerability Management: 19 Differences](https://www.sentinelone.com/cybersecurity-101/cybersecurity/patch-management-vs-vulnerability-management/) - [Vulnerability Testing vs Penetration Testing](https://www.sentinelone.com/cybersecurity-101/cybersecurity/vulnerability-testing-vs-penetration-testing/) - [Top 10 Cloud Data Security Solutions in 2025](https://www.sentinelone.com/cybersecurity-101/cloud-security/cloud-data-security-solutions/) - [What is Cloud Native Security?](https://www.sentinelone.com/cybersecurity-101/cloud-security/cloud-native-security/) - [Top 25 Cloud Security Best Practices](https://www.sentinelone.com/cybersecurity-101/cloud-security/cloud-security-best-practices/) - [Top 15 Cloud Security Vulnerabilities](https://www.sentinelone.com/cybersecurity-101/cloud-security/cloud-security-vulnerabilities/) - [What is Container Security? Benefits & Mistakes](https://www.sentinelone.com/cybersecurity-101/cloud-security/what-is-container-security/) - [Cloud Security Testing: Techniques & Benefits](https://www.sentinelone.com/cybersecurity-101/cloud-security/cloud-security-testing/) - [What is Cloud Security Monitoring? Benefits & Challenges](https://www.sentinelone.com/cybersecurity-101/cloud-security/cloud-security-monitoring/)