An email has been sent to your address with instructions for changing your password.
There is no user registered with this email.
Sign Up
To create a free account, please fill out the form below.
Thank you for signing up!
A confirmation email has been sent to your email address. Please check your email and follow the instructions in the message to complete the registration process. If you do not receive the email, please check your spam folder or contact us for assistance.
Welcome to our platform!
Oops!
Something went wrong while trying to create your new account. Please try again and if the problem persist, Email Us to receive support.
SentinelOne Unveils New Zero Trust Integration for Microsoft Azure Active Directory
Rhea-AI Impact
(Low)
Rhea-AI Sentiment
(Neutral)
Tags
Rhea-AI Summary
SentinelOne (NYSE: S) has announced the launch of the Singularity App for Azure Active Directory at Microsoft Ignite. This new solution integrates endpoint security with identity capabilities, advancing the Zero Trust architecture. The app allows organizations to automatically alert Azure AD of at-risk endpoints, enforcing conditional access policies to protect resources. As cyber threats grow, this integration helps organizations modernize their security frameworks efficiently, ensuring real-time verification of user identities and limiting access when necessary.
Positive
Launch of Singularity App for Azure Active Directory enhances security integration.
Supports organizations in adopting a Zero Trust security model.
Real-time risk assessment helps in automatic response to potential threats.
Negative
None.
MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--
At Microsoft Ignite, SentinelOne (NYSE: S), an autonomous cybersecurity platform company, announced the SentinelOne App for Azure Active Directory, a new solution combining endpoint security and identity capabilities to advance Zero Trust architecture. The Singularity App for Azure Active Directory (Azure AD) enables organizations using SentinelOne to automatically alert Azure AD when an endpoint is at risk, triggering conditional access policies to protect corporate resources and enabling organizations to enforce the principles of Zero Trust. A Zero Trust architecture powered by SentinelOne creates a dynamic framework to secure the digital enterprise.
“Global cyberattacks attacks like Kaseya or SUNBURST are a constant reminder of the importance of modernizing legacy security architectures,” said Sue Bohn, Vice President of Program Management, Microsoft. “The integration between SentinelOne and Azure Active Directory will allow organizations to combine leading endpoint and identity solutions to embrace a Zero Trust security model.”
“Open ecosystems are critical to a Zero Trust strategy as organizations look to use best-of-breed solutions” said Raj Rajamani, Chief Product Officer, SentinelOne. “Bringing together leading endpoint and identity solutions will go a long way towards helping mutual customers develop and mature their Zero Trust programs. In partnering with Microsoft, we offer mutual customers differentiated security solutions to help defend the enterprise.”
As ransomware, supply-chain-based attacks, and credential attacks become increasingly popular amongst cybercriminals, endpoints and identities are two of the most commonly exploited attack vectors for gaining access to an organization’s data. Organizations attempt to mitigate this risk by moving from a legacy network-based defense model to a Zero Trust security model, specifically by connecting their endpoint security and identity solutions to gain visibility of at-risk users. However, this generally requires that the organization do the complex setup and maintenance on their own, and there are only limited automation opportunities for automatic remediation. With the Singularity App for Azure Active Directory, organizations can utilize a modern security platform that maximizes their existing investments, allowing them to continuously reestablish trust with assets and provide explicit just-in-time access via a fully managed, automated solution.
When a user opens a malicious file on an endpoint, SentinelOne detects the incident and uses the Azure AD Risky User API to automatically mark the user’s identity with a confirmed compromised risk state and high risk level. When a user identity is changed to this state, an organization’s Azure AD Conditional Access policy can initiate a number of responses including limiting access, blocking access or triggering a Multi-Factor Authentication (MFA) prompt. When the incident is resolved in SentinelOne, the user is moved out of the risky user state and returns to their normal identity state.
With SentinelOne on the endpoint and directly integrated with Azure AD, joint customers have a mechanism for continually, automatically verifying trust with every single user identity or endpoint. Furthermore, information on any impacted user identity is shared with Azure AD in real-time, triggering the organization’s Conditional Access policy and subsequently preventing access to corporate resources and services.
The Singularity App for Azure Active Directory is available on the Singularity Marketplace. For more information register for the webinar with Microsoft at s1.ai/wbr-zt or visit www.sentinelone.com/platform/zero-trust.
About SentinelOne
SentinelOne’s cybersecurity solution encompasses AI-powered prevention, detection, response and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous XDR platform.