2023-05-24T15:10:00Z

Does SentinelOne have a Virtual Patching functionality?

Good morning,

I am looking for informationĀ on SentinelOne products. Can anyone tell me if workstation and server protection products implement a Virtual Patching functionality in the context of protection against vulnerabilities or implement Virtual Patching in a different way? Please provide any information on this. This information is necessary for me to make a decision on the selection of the appropriate, best protection solution for the end customer.

I am interested in information about AV, Machine Learning, Behavior Science, Zero Day protection, and Virtual Patching.

What are the requirements for launching an on-prem, cloud, or hybrid solution?

What are the main evaluation criteria for you when choosing the right vendor?
What are the main evaluation criteria for you when choosing SentinelOne and not another vendor? What advantage in functionalities does SentinelOne have over the competition?

Thank you

Pawel

PK
Solutions Architect at IT Solution Factor Sp. z o.o.
  • 1
  • 37
1
PeerSpot user
1 Answer
Anne Cubarrubia - PeerSpot reviewer
Editor at PeerSpot
Real User
2023-08-18T15:08:32Z
Aug 18, 2023

Yes -- SentinelOne has a Virtual Patching functionality called Virtual Patching and Exploit Shield. This preventive security solution uses behavioral AI to identify and block zero-day attacks and vulnerabilities before they can be exploited.



Virtual Patching and Exploit Shield works by:




  • Identifying vulnerable applications and devices on the network

  • Applying a virtual patch to vulnerable applications and devices

  • Monitoring the applications and devices for any malicious activity



Virtual Patching and Exploit Shield helps protect organizations against zero-day attacks and vulnerabilities. It complements traditional patching solutions and helps organizations reduce their attack surface. It also improves security posture.



Here are some of the benefits of using SentinelOne Virtual Patching and Exploit Shield:




  • Protects against zero-day attacks and vulnerabilities

  • Reduces the attack surface

  • Improves security posture

  • Easy to deploy and manage

  • Can be used with a variety of applications and devices

Product comparison that may be of interest to you
Related Questions
Julia Miller - PeerSpot reviewer
Community Director at PeerSpot
Aug 21, 2023
If you were talking to someone whose organization is considering SentinelOne Singularity Identity, what would you say? How would you rate it and why? Any other tips or advice?
See 2 answers
Brent Ferris - PeerSpot reviewer
Senior Network Administrator at a logistics company with 51-200 employees
Aug 17, 2023
I would rate SentinelOne Singularity Identity a 9 /10. SentinelOne Singularity Identity can easily work alongside other security products, in my experience, including Microsoft Defender. for anyne considering this as a solution, I would suggest conducting your own further research on alternative products to firmly establish whether or not SentinelOne Singularity Identity is indeed the appropriate product. In my view, the licensing model is geared more towards medium operations like ours, which have around two hundred endpoints, on up to large scale enterprise-sized companies. The licensing structured minimum of 200 endpoints may be a bit much for a small company with just a few endpoints. But, I in summary, I am happy with the choice to buy this product, and as our company grows SentinelOne will allow for that growth.
DavidPerry - PeerSpot reviewer
Director of Corporate Information Security at SGS & Co
Aug 21, 2023
I would rate SentinelOne Singularity Identity a nine out of ten. We have an E5 license and Defender works well with Microsoft SIMs but SentinelOne is superior in detecting threats, especially zero-day threats. Organizations should ensure they have staff that can support the solution before implementing it.
Julia Miller - PeerSpot reviewer
Community Director at PeerSpot
Aug 21, 2023
Hi Everyone, What do you like most about SentinelOne Singularity Identity? Thanks for sharing your thoughts with the community!
See 2 answers
Brent Ferris - PeerSpot reviewer
Senior Network Administrator at a logistics company with 51-200 employees
Aug 17, 2023
The AI-based detection, scanning, prevention and mitigation features are the most valuable features.
DavidPerry - PeerSpot reviewer
Director of Corporate Information Security at SGS & Co
Aug 21, 2023
The threat detection capability is the most valuable feature.