Intelligent CIO Middle East Issue 55 | Page 83

///////////////////////////////////////////////////////// customers. n mean anything e on the cloud, the s to a company cumentation and rms and virtual d services. r what organisations ally. ION S ATED to the Internet, evices to the ing stored and and this all means yberthreats. ercriminals is to a and the endpoint f the entry points to tion including cloud, vers, emails and esents monetary nd digitalisation yber-risks and s an instrumental role ta and information. ome use cases gy? form defeats every very day. It is isation across all or private domains. w you scale rotect ? nd services are B2B ork with enterprise sector entities. Our solution is scalable for enterprises of any size and can cater to as many users as required. How important is Machine Learning for endpoint security? Machine Learning or Artificial Intelligence (AI) is very important for endpoint security. If you think about it, a machine works at machine speed, processing of data is fast and the decision-making aspect of it is also fast. When it comes to next-generation cybersecurity, traditional on-premise signature database protection models are ineffective and lack administrator visibility. Most traditional and next-gen approaches rely on scanning files to detect attacks, which makes them extremely vulnerable to new attack techniques. The shortcomings of other products are especially relevant to today’s live and fileless attacks. The on-agent AI detection engines allow SentinelOne to autonomously detect and respond to malicious behaviour immediately, offering machine speed responses such as on-agent remediation and rollback. To adequately defend the business and adopt cloud, containers, IoT and more, organisations need dynamic Artificial Intelligence-driven (AI) next-generation endpoint protection platforms that defend every endpoint against all types of attacks, at every stage in the threat lifecycle without the need for human intervention. Why is minimal dwell time so important and how does your technology address this? In our opinion, there is no such thing as minimal or maximal dwell time, all the talk is about keeping a breach dwell time under 200 days instead of the average 285 days are pointless. If an attack takes place and is not detected before it is launched, we lost. We address this challenge by not accepting any dwell time scenarios. Detection and response are done in real-time. SentinelOne’s patented technology links all behaviours and indexes all activities into a storyline on the agent, in real-time. Our analysts can hunt faster, focusing on what matters, instead of wasting time looking for the needle in the stack. Malicious attempts www.intelligentcio.com