SentinelOne Releases Mobile Admin App: Enabling Mobile Visibility and Response for Endpoint Threats

5 Mar by Vitaliy Dadalyan

SentinelOne Releases Mobile Admin App: Enabling Mobile Visibility and Response for Endpoint Threats

New Mobile Application Extends Endpoint Management Capabilities to
iOS and Android Devices

MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–SentinelOne,
the autonomous endpoint protection company, today released the S1
Mobile Admin
app, its first-ever mobile application enabling
management of the SentinelOne platform directly from the convenience of
iOS and Android devices. SentinelOne’s S1 Mobile Admin app allows
authorized administrators to view active endpoint threats detected via
SentinelOne’s agent, disconnect compromised endpoints and gather
advanced threat information directly from their mobile device to be
reported back to enterprise SOC teams.

“Response time to understanding a network threat often makes the
difference between problem solved and disaster,” said Chris Goodman,
Director of Technical Integrations & Alliances, SentinelOne. “With the
release of the S1 Mobile Admin app, we are providing an EPP and EDR
platform capable of autonomously containing malicious threats and
reporting critical threat information with the ease and mobility of a
handheld device, enabling security teams and system administrators to
further eliminate the time and cost constraints of workstation-bound
threat management.”

With S1 Mobile Admin, call numbers of compromised endpoints correspond
with the app’s dashboard so administrators can pinpoint exactly which
network devices are experiencing malicious activity. Administrators can
then pivot to the app’s Recorded Future integration to view the risk
score of the identified threat, along with detailed threat information
including machine details, IP address, user login, domain and whether
the machine has disk encryption or not. Upon gathering this critical
information, administrators can easily transfer back to the app itself,
click on the compromised device and disconnect the machine from the
environment, containing the threat.

Along with the entirety of threat information gathered, administrators
can easily pass content hash, file path and information on whether the
device was disconnected or not back to SOC teams via a Slack channel
directly from their mobile device for further action.

In order to alleviate security concerns throughout S1 Mobile Admin use,
the app has been equipped with a timeout feature with cache and
credentials being cleared upon timeout. In addition, a password matching
the authorized administrator’s password to access the SentinelOne
console is required, and if authorized users close their mobile device
the app automatically closes and again requires a password to re-open.

SentinelOne will be demonstrating S1 Mobile Admin capabilities at the
RSA Conference, March 4-8, in San Francisco, CA at SentinelOne’s
booth #1527 South
.

About SentinelOne
SentinelOne delivers autonomous endpoint
protection through a single agent that successfully prevents, detects
and responds to attacks across all major vectors. Designed for extreme
ease of use, the S1 platform saves customers time by applying AI to
automatically eliminate threats in real time for both on premise and
cloud environments and is the only solution to provide full visibility
across networks directly from the endpoint. To learn more visit
sentinelone.com or follow us at @SentinelOne,
on LinkedIn
or Facebook.

Contacts

Jake Schuster
fama PR for SentinelOne
(617) 986-5021
[email protected]