SentinelOne launches Singularity RemoteOps Forensics

New solution combines forensics evidence with real-time telemetry to deliver unified insights into security incidents analysts need to perform investigation and response activities with efficiency and speed.

Cyber breaches are on the rise, and when it comes to responding to them, time is of the essence. In order to drive swift conclusions, security teams need to identify relevant insights and extract actionable intelligence. It’s a daunting task, but SentinelOne is expanding its forensics capabilities to simplify things. The company today announced the release of Singularity RemoteOps Forensics, a new digital forensics product offering that brings incident response readiness to companies of all sizes, enabling them to execute efficient and streamlined investigation and response activities with unprecedented speed and scale.

 

“As timelines for reporting and responding to breaches shrink, it is imperative that security teams have advanced forensics capabilities that make investigations faster and more efficient, and with Singularity RemoteOps Forensics, we are delivering them," said Jane Wong, Senior Vice President of Products and Strategy, SentinelOne.

 

Seamlessly integrated with the SentinelOne Singularity™ Platform and offered as an add-on to Sentinel One’s Endpoint and Cloud Workload Security solutions, RemoteOps Forensics is a fast, efficient, and flexible digital forensics and incident response solution that security teams can use to:

 

Optimise resources and accelerate Mean Time to Resolution

Perform ad-hoc or conditional trigger-based evidence collection, enabling targeted investigations on one or multiple assets including endpoints and server workloads.

Automate the collection of evidence, such as processes, ports, service listings, MFT, Amcache, JumpLists, and memory dumps, and orchestrate them in less than a minute.

Consolidate evidence into one data pool through the Singularity Security DataLake, correlating SentinelOne and partner data with forensics data in the same search to create a comprehensive picture of an attack, quickly identify the root cause and take measures to mitigate risk.

Analyse collected evidence alongside Endpoint Detection and Response (EDR) data in one console to proactively defend against future threats.

Correlate and analyse integrated data to uncover hidden indicators of compromise, identify advanced attack patterns, and understand the tactics, techniques, and procedures employed by threat actors.

 

And, fully integrated with the SentinelOne agent, RemoteOps Forensics eliminates the need to deploy and provision multiple tools during investigations, saving organisations both time and resources. The solution also makes investigations more forensically sound, as less changes are made on disk, and SentinelOne employs its anti-tampering capabilities as well as metadata collection capabilities to ensure data integrity is maintained.

 

“SentinelOne's new forensic capabilities are reinventing incident response by empowering security teams to perform deep investigations in less time without the need for niche expertise or additional tools,” Wong said.

Arqit introduces Encryption Intelligence, targeting efficient migration to post-quantum...
AlgoSec's latest release, A33.20, aims to enhance network security operations by providing improved...
Cameo Services restructures senior leadership to support international growth following...
New research reveals UK businesses' evolving approach to resilience, highlighting reliance on AI...
Netskope's report highlights the communication gaps faced by I&O leaders in enhancing AI...
AI's economic promise requires pairing tech investments with skills development, says Pearson's new...
Kyndryl introduces an AI-enabled approach to support SAP ECC to S/4HANA migrations, helping...
Sophos introduces Workspace Protection, providing security for hybrid work environments and...