Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

SentinelOne First to Take Endpoint Security to IoT Discovery and Enforcement

SentinelOne Ranger Uses Endpoints to Autonomously Map, Control, and Protect Every IoT and Connected Device on a Network

SentinelOne, the autonomous endpoint protection company, unveiled SentinelOne Ranger – turning every protected endpoint into a network detection device capable of identifying and controlling every IoT and connected device on a network. Converging EPP and EDR into a proprietary single agent architecture, SentinelOne is the first and only cybersecurity vendor to expand into the IoT space with the same single codebase and deployment model. SentinelOne will be demonstrating this groundbreaking innovation at RSA Conference at booth #1527 South.

SentinelOne First to Take Endpoint Security to IoT Discovery and Enforcement

“IoT discovery and enforcement is the next frontier of any cybersecurity program,” said Les Correia, Director, Global Information Security, Architecture, Engineering and Operations at Estée Lauder. “SentinelOne’s Ranger solution is the first in the space and a major differentiator in helping enterprises secure their evolving networks.”

By 2030, there are expected to be more than 125 billion connected IoT devices[1], many with little or no built-in security capabilities. Furthermore, the devices being added to enterprise networks grow more intelligent by the day – from TVs to toasters to wearable trackers. The result is more code running on more devices, dramatically expanding the number of potential vulnerabilities for attackers to target. Currently, enterprise security teams lack the ability to deploy software onto these fragmented devices, resulting in a complete lack of environmental awareness and ability to take accurate network inventory. Gaining this awareness and inventory through manual processes is simply impossible.

Related Posts
1 of 1,512

Read More: How to Ensure AI Doesn’t Make Your Customers Hate You

SentinelOne Ranger solves this critical problem by giving machines the ability to detect and protect other machines, enabling them to become environmentally aware and fend off attacks from one another, without human intervention. Using AI to monitor and control access to every IoT device, SentinelOne allows machines to solve a problem that has been previously impossible to address at scale. The technology can not only fingerprint and profile devices the SentinelOne agent discovers from enabling complete environment visibility, but can also identify if any aspect of that environment is dangerous. SentinelOne’s Ranger technology is the industry’s first solution that allows machines to autonomously protect and notify security teams of vulnerabilities, rogue devices, and anomalous behavior.

Read More: Brands that Realize the Potential of Augmented Reality

“Endpoint and IoT have already collided. Enterprises face thousands of new devices being connected to their networks, often without even knowing. With IoT, there’s no ability to deploy software or provision them manually – creating a huge vulnerability for attackers to exploit,” said Tomer Weingarten, CEO and Co-founder, SentinelOne. “SentinelOne Ranger represents the future of where endpoint protection is moving. Endpoints with the SentinelOne agent will become environmentally aware and capable of not only giving a true mapping of each singular endpoint’s perimeter – who or what can connect to it, and where can it connect, but also complete visibility to the network surrounding it, identifying the IoT devices they’re sitting next to on the network – and preventing high risk devices from connecting to them – effectively segmenting out undesired connectivity and reducing unnecessary attack surface. We believe this is revolutionary for the market and for our customers.”

Read More: What’s the Next Game AI Will Solve?

2 Comments
  1. Scrap copper extraction says

    Copper scrap recycler Export of Copper scrap Scrap metal recyclers
    Copper cable scrap export requirements, Scrap metal market trends, Copper scrap forging

  2. Copper stamping scrap purchase says

    Copper scrap market trends Copper sulfate scrap purchase Metal waste sustainability
    Copper cable buyer, Metal waste transportation services, Copper scrap recovery methods

Leave A Reply

Your email address will not be published.