Back to Resources
XDR Resources
Showing 116 Results
Defending Your Small Business From Big Threats
Defense Day 2024: Customer Testimonial- Detection & Response on the Endpoint and Beyond
Digital Frontlines: The Nexus of Cyberwar and Global Turmoil
WatchTower Report: Unveiling Top Cyber Threats of 2023 and Predictions for 2024
Fireside Chat: Blindspots in your 2024 Threat Strategy
Top 3 Ransomware Threats of 2023: Threat Hunter Insights
Mastering XDR Excellence: The Journey to Growth Index Leader
Taking on Turla: Decoding MITRE ATT&CK Enterprise Evaluations 2023
Frost Radar™: SentinelOne Is An XDR Market Leader
Why ITDR Completes XDR
CISO Roundtable: XDR Perspectives & The Art of Optimization
The Future is XDR: How to Conquer the SOC Transformation
Ten Questions an MSSP Should Ask Their Customers About XDR
Gain Control of Your Attack Surface with XDR and Identity
Extended Detection and Response and Email Security for Protection from Inbox to Anywhere
SentinelOne Empowers the State of Montana to Stay Secure
Singularity XDR Use Cases
SentinelOne Singularity XDR
Why We Need To Modernize Our Vulnerability Management Program
Extended Detection and Response & Cyber Asset Attack Surface Management to Achieve Greater Security Coverage
Debunking Common Myths About XDR
MITRE Engenuity ATT&CK – A Guide to Evaluating Managed Detection and Response Success
CWPP Demo – SentinelOne VS Diamorphine rootkit, XMRig (a cryptominer)
SentinelOne VS Venus Ransomware – Protection, Detection & Response
Identity Security: The Missing Piece In A Holistic XDR Strategy
Identity Security: The Missing Link in a Holistic XDR Strategy
Enhancing SecOps With MITRE
4 Best Practices for Cybersecurity Investment
SentinelOne Fireside Chat – Winning Over the Board
CISO XDR Roundtable: XDR Trends and Best Practices
Stingray Accelerates Its Security Response Times with SentinelOne on AWS
XDR: Spawning a Disruptive Modernization of Cybersecurity
SentinelOne Vs. HelloXD Ransomware – Detection and Prevention
5 Key Questions CISOs Should Consider When Adopting XDR
SentinelOne Vs. Mindware Ransomware – Detection and Prevention
SentinelOne VS CVE-2022-30190 (Follina)
Five Best Practices for CISOs Adopting XDR
SentinelOne Vs. Onyx Ransomware – Prevention and Detection
Defeat Ransomware: How to Mitigate Risk and Accelerate Your Enterprise
2021 Mobile Threats in Review – The Year of the Exploits
MITRE Engenuity™ ATT&CK Evaluation 2022 – Results and Overview
Decoding the 4th Round of MITRE Engenuity ATT&CK® Enterprise Evaluations
Untangling the Cybersecurity Alphabet Soup: From EDR, SIEM, and SOAR to XDR
5 Best Practices for Implementing XDR
Pwning Microsoft Azure Defender for IoT | Multiple Flaws Allow Remote Code Execution for All
Solving for X(DR): Modernizing Security Operations with SentinelOne and Zscaler
Securing Chromebooks With MTD
Incorporating Mobile Threat Defense Into Your Cybersecurity Strategy
SentinelOne App For Security Incident Response
SentinelOne Vs. BlackCat Ransomware – Kill and Quarantine
Singularity Mobile
Securing Chromebooks for K-12
Zero-Trust for Ransomware Resilience
Modern Cybersecurity for Modern Enterprises
Accelerate Your Journey to Zero Trust with SentinelOne and Microsoft
Singularity App for Azure Active Directory
Moving to an Endpoint-Centric Zero Trust Security Model with SentinelOne
Singularity™ Conditional Policy
Time to Fight Back: Healthcare Vs. Ransomware
Effective Threat Hunting in the Age of Big Data
SentinelOne Remote Script Orchestration
SentinelOne Storyline Active Response (STAR)™
Reinforced Proactive Endpoint Security with AI-based SentinelOne Endpoint Protection Platform
How One Public School District Graduated From Legacy to Advanced Protection with SentinelOne
R.R. Donnelley – Reinventing Security at Scale
Cengage – Modernizing Cloud Security
Reducing Dwell Time With Superhuman AI – A CISO’s Ammunition Against Ransomware
Smarter, Stronger, Faster… Autonomous. This is SentinelOne.
Dissecting MITRE ATT&CK Evaluation: Next Gen Detection & Protection for the Enterprise
MITRE Engenuity ATT&CK Evaluation Record-Breaking Performance
Morgan Sindall Uses AI Protection to Guard Against a Range of Threats
2021 Gartner MQ for EPP + Critical Capabilities Webinar
MITRE ATT&CK Framework (Engenuity): Carbanak & FIN7 Evaluation Results
2020 MITRE Engenuity™ ATT&CK® Evaluation – Carbanak and FIN7
MITRE Engenuity™ ATT&CK® Evaluation – Carbanak and FIN7
MITRE Engenuity™ ATT&CK® Evaluation 2020
O’Neill Secures Their Entire IT Environment with SentinelOne
Adaptive Cybersecurity for Lean Manufacturing
Addressing Security Risk in Higher Education
SentinelOne ActiveEDR
Move on from McAfee
Advancing Device Fingerprinting with Singularity Ranger®
Protection, Detection, and Response for State and Local Government
Data Retention Solution Brief
Protecting Your Enterprise From Ripple20
Ask Me Anything | MITRE ATT&CK Round 2 Results 2020
Windows Server Sentinel Agent
Security in Healthcare IT
Latest Trends in EPP, EDR, & IoT featuring Forrester
SentinelOne Endpoint Security Singularity Platform Product Bundles
Using MITRE’s 2020 ATT&CK Evaluation Data to Show How An Advanced Endpoint Detection/Response Product Mitigated APT29
MITRE 2020 ATT&CK Evaluation – SentinelOne’s Takeaways
The Ciso’s Guide To Preparing A Covid 19 Exit Strategy
eBook: Work At Home Enterprise Security Guidebook
Develop a Meaningful Cyber Risk Remediation Program with the MITRE ATT&CK Framework
Aston Martin’s Road to Zero Threats: SentinelOne’s Vigilance MDR
SentinelOne Product Tour | Seeing it in Action
What’s on your network? Leveraging SentinelOne Ranger for IoT discovery and control
Employees Working From Home? Learn How to Secure Your Enterprise
7 Lessons Every CISO Can Learn From the ANU Cyber Attack
AVX: The Only Next-Gen Vendor That is a Single Agent, Single Platform in the Cloud
SentinelOne Protects TGI Fridays from Headquarters to the Table
FIMBank Augments Their SOC with SentinelOne’s Vigilance MDR
Kelsey-Seybold Selects SentinelOne to Provide Protected Care
eBook: Reversing Malware on macOS
Passive Isn’t Good Enough: Moving into Active EDR
Nexus SDK Datasheet
SANS White Paper: Passive Isn’t Good Enough: Moving into Active EDR
Aligning to the NIST Cybersecurity Framework
Phantom Integration Datasheet
6 Key Factors When Choosing VDI Security
Major Financial Technology Company Gains Protection, Value, and Confidence with SentinelOne
Noris Network AG Arms Against Progressive Cyber Attacks
Scuola Superiore Sant’Anna Maintains Openness Without Compromise
Risk & Vulnerability Management
Encrypted Traffic: The Blind Spot
Webinar
5 Best Practices for Implementing XDR