Magazine Button
Attivo Networks and SentinelOne integration delivers protection against credential-based attacks

Attivo Networks and SentinelOne integration delivers protection against credential-based attacks

Enterprise SecurityIntelligent TechnologyTop Stories
Cyber Security Data Protection Business Privacy concept.

Attivo Networks and SentinelOne, have announced that they are now working together to disrupt attacks from modern adversaries.

By combining the two companies’ solutions, joint customers gain the ability to prevent endpoint compromises and disrupt an attacker’s attempts to gather credentials and perform reconnaissance activities that are needed for lateral movement. In addition, Attivo Networks has joined the SentinelOne Singularity Partner Programme, which creates a collaboration model for the two companies to work together to sell and support customers.

With its Singularity XDR platform, SentinelOne is a leader in Endpoint Protection (EPP), Endpoint Detection and Response (EDR), IoT security and cloud security.

The platform delivers differentiated endpoint protection, endpoint detection and response, IoT security, cloud security and IT operations capabilities – consolidating multiple existing technologies into one solution.

The Endpoint Detection Net (EDN) Suite has made Attivo Networks a leader in protecting Active Directory (AD) and credentials on endpoints, both of which are prime targets for modern cyber-attacks. The EDN solution provides SentinelOne customers with an effective way to detect and prevent attacks against Active Directory, credential theft and privilege escalation while reducing the attack surface by removing exposed credentials.

The joint solution creates a rich defence against even the most sophisticated attackers and will efficiently derail attacks targeted at today’s ever-expanding attack surface. When used together, the SentinelOne XDR platform prevents attackers from compromising an endpoint while the Attivo EDN suite prevents attackers from breaking out of that endpoint if they manage to get in.

Click below to share this article

Browse our latest issue

Intelligent CISO

View Magazine Archive