Hebt u te maken met een beveiligingslek? Vraag een demo aan
Hebt u te maken met een beveiligingslek?
Hebt u te maken met een beveiligingslek?
  • 1-855-868-3733
  • Contact met ons opnemen
  • Blog
nl
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
  • Platform
    • PLATFORMOVERZICHT
      • Singularity Complete Het beveiligingsplatform van de toekomst voor bedrijven
      • Singularity Control Beveiliging met de functionaliteit van een pakket
      • Singularity Core NGAV vanuit de cloud
      • Singularity Ranger Inzicht in en beheer van uw netwerk
      • Singularity Cloud Beveiliging van workloads in containers en in de cloud
    • PLATFORMSECTOREN
      • Energy
      • Finance
      • Healthcare
      • Higher Education
      • Retail
  • Onze klanten
  • Services
    • Services
      • Vigilance
      • Readiness
      • Ondersteuning
      • Training
  • Partners
    • Partner Program
      • Partner Program
      • Technology Alliance Partners
      • Channel Partners
      • Incident Response Partners
  • Resources
    • Resources
      • eBooks
      • White Papers
      • Datasheets
      • Case Studies
      • Webinars
      • Videos
      • Reports
  • Bedrijf
    • Bedrijf
      • Blog
      • Labs
      • Press
      • News
      • FAQ
      • About Us
      • Careers
nl
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
Vraag een demo aan
Back
  • Platform
    • PLATFORMOVERZICHT
      • Singularity Complete Het beveiligingsplatform van de toekomst voor bedrijven
      • Singularity Control Beveiliging met de functionaliteit van een pakket
      • Singularity Core NGAV vanuit de cloud
      • Singularity Ranger Inzicht in en beheer van uw netwerk
      • Singularity Cloud Beveiliging van workloads in containers en in de cloud
    • PLATFORMSECTOREN
      • Energy
      • Finance
      • Healthcare
      • Higher Education
      • Retail
  • Onze klanten
  • Services
    • Services
      • Vigilance
      • Readiness
      • Ondersteuning
      • Training
  • Partners
    • Partner Program
      • Partner Program
      • Technology Alliance Partners
      • Channel Partners
      • Incident Response Partners
  • Resources
    • Resources
      • eBooks
      • White Papers
      • Datasheets
      • Case Studies
      • Webinars
      • Videos
      • Reports
  • Bedrijf
    • Bedrijf
      • Blog
      • Labs
      • Press
      • News
      • FAQ
      • About Us
      • Careers
Vraag een demo aan
  • 1-855-868-3733
  • Contact met ons opnemen
  • Blog
Hebt u te maken met een beveiligingslek?
  • 1-855-868-3733
  • Contact met ons opnemen
  • Blog
Singularity Control: The Suite Features You Need.
Made for organizations seeking the best-of-breed
cybersecurity with additional suite features.
Get a Demo

More capability. Same agent.

Organizations expect options for controlling their devices; Singularity Control adds holistic suite management features.

Control Network Flows

Native OS firewall control for Windows, Mac, and Linux enables granular, location aware network flow control.

Control USB & Bluetooth®

Control any USB, Bluetooth, or Bluetooth Low Energy device on Windows and Mac to reduce the physical attack surface.

Ensure 100% Deployment

Identify unprotected devices automatically to ensure compliance with security KPIs.

Network Control

  • Control inbound and outbound network traffic for Windows, Mac, and Linux.
  • Centralized and customizable policy-based control with hierarchy inheritance.
  • Tagging mechanisms for streamlined policy assignment and administrative clarity.
  • Touchless location awareness that dynamically assigns network control based on the system’s physical location.
Get a Demo

Device Control

  • Granular device control for USB and Bluetooth on Windows and Mac.
  • Centralized and customizable policy-based control with hierarchy inheritance.
  • Control any USB device type, not just mass storage, and specify full read-write or read-only operation.
  • Control Bluetooth by protocol version and by specific Bluetooth device type.
  • Control Bluetooth Low Energy devices.

Rogue Device Discovery

  • The Rogues feature identifies the endpoints that are not yet protected by SentinelOne.
  • Employs passive and active network sweeps to provide enterprise-wide visibility.
  • Removes the uncertainty of whether or not your network is regulatory compliant by discovering deployment gaps.
  • No additional software required.
  • No network changes or hardware required.

SentinelOne Singularity Control FAQ

What types of USB devices can I control with Singularity Control?

Any kind! Administrators can create highly granular control for any type of USB device as defined by the USB standard. Policy can be defined by vendor ID, product ID, serial number or by class of device which includes things like audio, printers, mass storage, smart cards, video devices, USB-C devices, personal healthcare devices, and more. Here’s an example… only permit IronKey™ encrypted external thumb drives as well as certain audio headsets. Deny everything else that is USB.

Does Singularity USB device control support read-only operation for data loss prevention (DLP)?

Yes. Policies can be crafted to permit read-only operation of mass storage USB devices.

What are some use cases to help explain why I would want Bluetooth Control?

Case #1: Restrict Bluetooth operation to only newer bluetooth versions in order to reduce the attack surface present in older versions. Case #2: Restricting Bluetooth connectivity from devices to a specified list or type of peripherals.

What is meant by network control with location awareness?

SentinelOne offers native OS firewall control for Windows, Mac, and Linux. Your security policies may require different local OS firewall policies applied based on the device’s location. For example… perhaps a more restrictive policy is used outside the organization’s network vs. a more open policy inside the network. Administrators craft network location tests that help the endpoint automatically determine what network it’s connected to then applies the correct firewall policy accordingly.

SentinelOne offers “Rogues” and “Ranger IoT.” What is the difference?

Rogues is a feature that is included with Singularity Control and Singularity Complete. Its purpose is to discover whether there are hosts on the network that do not yet have the Singularity Sentinel agent installed. Ranger IoT on the other hand, is an add-on product that helps you control the network attack surface. Ranger offers Rogue functions and adds extensive network discovery and fingerprinting of all IP-enabled devices. Ranger can also be used to protect SentinelOne devices from non-managed IoT devices to ensure unauthorized lateral movement by an unmanaged device is disallowed.

Vraag een SentinelOne-demo aan

Wilt u ons in actie zien? Vul het formulier hieronder in. U hoort dan snel van ons.

Explore SentinelOne

<h3>Thanks for Contacting Us</h3>A Sentinelone Representative Will Contact You Shortly to Discuss Your Needs.

Related Resources

DATA SHEET

Singularity EPP + EDR

Learn More
DATA SHEET

Vigilance MDR

Learn More
DATA SHEET

Endpoint Protection Bundles

Learn More
DATA SHEET

SentinelOne Ranger IoT

Learn More

The World’s Leading and Largest Enterprises Trust SentinelOne

Including 3 of the Fortune 10 and hundreds of the global 2000

Market Recognition

See what others say about SentinelOne

MITRE ATT&CK

Fewest misses, most correlations, best data enrichment coverage. SentinelOne proves its ability to connect the dots more effectively than the competition.

Disruptor50

SentinelOne is the only cybersecurity company among 50 private businesses at the epicenter of a changing world, all poised as the next generation of billion-dollar organizations.

Forbes AI 50

SentinelOne is ranked #14 among America’s most promising AI companies using techniques including machine learning as a core part of their business model.

Deloitte Fast 500

SentinelOne is ranked the 7th fastest growing company in North America, the fastest-growing company in the Bay Area, and the only cybersecurity company in the top 10.

Explore the Full Power of Singularity

Simplifying container and VM security, no matter their location, for maximum agility, security, and compliance.

Learn More

Endpoint security bedrock for organizations replacing legacy AV or NGAV with an effective EPP that is easy to deploy and manage.

Learn More

Made for organizations seeking the best-of-breed cybersecurity with additional security suite features.

Learn More

Made for organizations seeking enterprise-grade prevention, detection, response and hunting across endpoint, cloud, and IoT.

Learn More

Gemaakt om de bedreigingen van morgen te voorkomen.

Vandaag nog.

Uw gevoeligste gegevens bevinden zich op het endpoint en in de cloud. Bescherm wat het belangrijkst is tegen cyberaanvallen. Versterk elke rand van het netwerk met realtime autonome bescherming.
Vraag een demo aan
Bedrijf
  • Onze klanten
  • Why SentinelOne
  • Platform
  • About
  • Partners
  • Ondersteuning
  • Careers
  • Legal & Compliance
  • Beveiligingsverklaring van SentinelOne
  • Contact met ons opnemen
Resources
  • Blog
  • Labs
  • Press
  • News
  • FAQ
  • Resources
Wereldwijd hoofdkantoor

605 Fairchild Dr.
Mountain View, CA 94043

+1-855-868-3733

info-benelux@sentinelone.com

Meld u aan voor onze nieuwsbrief
Bedankt! Vanaf nu ontvangt u wekelijks onze nieuwsbrief met alle recente artikelen. Tot gauw!
Dutch
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
©2023
Privacybeleid Servicevoorwaarden