STOCK TITAN

SentinelOne Unveils New Zero Trust Integration for Microsoft Azure Active Directory

Rhea-AI Impact
(Low)
Rhea-AI Sentiment
(Neutral)
Tags
Rhea-AI Summary

SentinelOne (NYSE: S) has announced the launch of the Singularity App for Azure Active Directory at Microsoft Ignite. This new solution integrates endpoint security with identity capabilities, advancing the Zero Trust architecture. The app allows organizations to automatically alert Azure AD of at-risk endpoints, enforcing conditional access policies to protect resources. As cyber threats grow, this integration helps organizations modernize their security frameworks efficiently, ensuring real-time verification of user identities and limiting access when necessary.

Positive
  • Launch of Singularity App for Azure Active Directory enhances security integration.
  • Supports organizations in adopting a Zero Trust security model.
  • Real-time risk assessment helps in automatic response to potential threats.
Negative
  • None.

MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)-- At Microsoft Ignite, SentinelOne (NYSE: S), an autonomous cybersecurity platform company, announced the SentinelOne App for Azure Active Directory, a new solution combining endpoint security and identity capabilities to advance Zero Trust architecture. The Singularity App for Azure Active Directory (Azure AD) enables organizations using SentinelOne to automatically alert Azure AD when an endpoint is at risk, triggering conditional access policies to protect corporate resources and enabling organizations to enforce the principles of Zero Trust. A Zero Trust architecture powered by SentinelOne creates a dynamic framework to secure the digital enterprise.

“Global cyberattacks attacks like Kaseya or SUNBURST are a constant reminder of the importance of modernizing legacy security architectures,” said Sue Bohn, Vice President of Program Management, Microsoft. “The integration between SentinelOne and Azure Active Directory will allow organizations to combine leading endpoint and identity solutions to embrace a Zero Trust security model.”

“Open ecosystems are critical to a Zero Trust strategy as organizations look to use best-of-breed solutions” said Raj Rajamani, Chief Product Officer, SentinelOne. “Bringing together leading endpoint and identity solutions will go a long way towards helping mutual customers develop and mature their Zero Trust programs. In partnering with Microsoft, we offer mutual customers differentiated security solutions to help defend the enterprise.”

As ransomware, supply-chain-based attacks, and credential attacks become increasingly popular amongst cybercriminals, endpoints and identities are two of the most commonly exploited attack vectors for gaining access to an organization’s data. Organizations attempt to mitigate this risk by moving from a legacy network-based defense model to a Zero Trust security model, specifically by connecting their endpoint security and identity solutions to gain visibility of at-risk users. However, this generally requires that the organization do the complex setup and maintenance on their own, and there are only limited automation opportunities for automatic remediation. With the Singularity App for Azure Active Directory, organizations can utilize a modern security platform that maximizes their existing investments, allowing them to continuously reestablish trust with assets and provide explicit just-in-time access via a fully managed, automated solution.

When a user opens a malicious file on an endpoint, SentinelOne detects the incident and uses the Azure AD Risky User API to automatically mark the user’s identity with a confirmed compromised risk state and high risk level. When a user identity is changed to this state, an organization’s Azure AD Conditional Access policy can initiate a number of responses including limiting access, blocking access or triggering a Multi-Factor Authentication (MFA) prompt. When the incident is resolved in SentinelOne, the user is moved out of the risky user state and returns to their normal identity state.

With SentinelOne on the endpoint and directly integrated with Azure AD, joint customers have a mechanism for continually, automatically verifying trust with every single user identity or endpoint. Furthermore, information on any impacted user identity is shared with Azure AD in real-time, triggering the organization’s Conditional Access policy and subsequently preventing access to corporate resources and services.

The Singularity App for Azure Active Directory is available on the Singularity Marketplace. For more information register for the webinar with Microsoft at s1.ai/wbr-zt or visit www.sentinelone.com/platform/zero-trust.

About SentinelOne

SentinelOne’s cybersecurity solution encompasses AI-powered prevention, detection, response and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous XDR platform.

Will Clark

fama PR for SentinelOne

E: S1@famapr.com

Source: SentinelOne

FAQ

What is the Singularity App for Azure Active Directory from SentinelOne?

The Singularity App integrates endpoint security with identity capabilities to support Zero Trust security architecture.

How does the new SentinelOne app enhance cybersecurity?

It alerts Azure AD of at-risk endpoints, triggering conditional access to protect corporate resources.

What is the significance of <b>Zero Trust</b> architecture in SentinelOne's new app?

Zero Trust architecture ensures continuous verification of user identities and endpoints to prevent unauthorized access.

When was the SentinelOne app for Azure AD announced?

The app was announced at Microsoft Ignite.

What are the primary benefits of SentinelOne's integration with Azure Active Directory?

The integration enables automated risk management and enhances organizational security posture.

SentinelOne, Inc.

NYSE:S

S Rankings

S Latest News

S Stock Data

8.27B
291.01M
0.47%
78.43%
4.51%
Software - Infrastructure
Services-prepackaged Software
Link
United States of America
MOUNTAIN VIEW