Last week SentinelOne announced integrations with key industry players inclulding an enhanced collaboration with Vectra AI to expand the company’s XDR offering. SentinelOne states that the integrations “will allow organizations of all sizes to gain the insights they need to rapidly identify and respond to attacks across all vectors.” The collaboration with Vectra AI includes Attack Signal IntelligenceTM, which delivers threat context to the SentinelOne Singularity™ XDR platform, empowering security teams with security AI that automates the detection, triage and prioritization of security events and alerts. SOC teams utilizing the technology will be armed with high-fidelity attack signal and deep attack context to investigate and respond to security incidents before they become breaches.
Vectra Attack Signal Intelligence enables security analysts to:
- Think like an attacker with AI-driven detections that go beyond signatures and anomalies to automatically analyze attacker behavior and zero in on attacker TTPs post compromise.
- Know what is malicious with AI-driven triage that utilizes ML to automatically analyze detection patterns unique to the customer’s environment.
- Focus on the urgent with AI-driven prioritization that automatically correlates detections across all hybrid cloud attack surfaces.
*citation: quotes and collaboration details below are from the original SentinelOne press release, here.
“The integration of firewalls and NDR capabilities perfectly complements our XDR solutions,” said Ric Smith, Chief Product and Technology Officer, SentinelOne. “In expanding our world-class partner ecosystem, we can deliver purpose-built, joint solutions that provide the complete and accurate view companies need to push their security posture to new heights and protect against tomorrow’s threats today."
Enriched Signal Analysis with Vectra AI
By incorporating additional context from Vectra AI into the SentinelOne Singularity™ XDR platform, security operations teams can make better-informed decisions during incident triage and investigation. SentinelOne channels correlated alert data from Vectra AI into its XDR feed, offering enriched context for security analysts. This enhanced alert data enables analysts to assess the scope of an incident, evaluate its severity, and prioritize remediation efforts, ultimately reducing mean time to response (MTTR).
"We are thrilled to announce our new partnership with SentinelOne,” said Kevin Kennedy, SVP Product, Vectra AI. “By joining forces, we can provide the best attack signal for enterprise SOC teams by combining endpoint and network telemetry. This new partnership enables customers to achieve greater speed in investigation and triage, as well as more reliable visibility into unknown threats."
All integrations are available today via SentinelOne’s Singularity Marketplace. For additional information about Vectra AI and SentinelOne, please visit the following resources:
- Solution Brief: Vectra and SentinelOne
- Vectra Attack Signal IntelligenceTM
- Vectra Threat Detection and Response platform