Q1. What do you want security administrators to know about the recently launched Deep Visibility module for SentinelOne's Endpoint Protection Platform? What does it allow them to do that they were not able to previously?
As we become more cybersecurity conscious, businesses have adopted more encryption technologies to ensure their communications stay secure. In fact, over 60% of the web traffic today is encrypted and only pushed harder by companies such as Google that drive search results based on use of encryption. As one would expect, attackers use the exact same technologies to stay hidden from all protection layers as well [making] the job of securing the organization much harder!
One of the key tenets of security is visibility –you can't stop what you can't see. Imagine driving a car with half the windshield covered. You wouldn't do that with your car, so why do that with your security?
Deep Visibility enables our customers to gain visibility into the encrypted traffic flows and ensure their security is driven with full visibility into all behavioral characteristics at the endpoint, irrespective of the type of traffic or application. You might wonder why that's special when some other companies have deployed network appliances for the same. It's because we do it in a way that does not increase the overheads on the endpoint or complicate the network deployments, which can have productivity and availability impact on businesses. The SentinelOne approach to Deep Visibility helps our customers detect and respond to threats within encrypted traffic flows with minimal performance impact.
Deep Visibility also enables security analysts to drive forensic investigations with IOC search capabilities as well as power proactive threat hunting to reduce the overall risk for the organization. The entire SentinelOne EPP solution is powered by a single agent, single console architecture with integrated detect-to-remediation workflow to reduce both endpoint and security analyst overheads and improve the time-to-protection.
Q2. How does SentinelOne see security professionals adopt AI to improve their security against an evolving threat landscape? How do you see AI enabling security professionals?
At SentinelOne we strongly believe in the power of Artificial Intelligence (AI), when done right, to help safeguard organizations against the growing risk of cyber breaches. For one AI is unencumbered by the limitations of traditional signature-based security solutions where a threat needs to be known in advance to derive a signature.
AI must be also be leveraged in the right way to truly protect organizations against "evolving" threats. For instance, detecting fileless threats or script-based attacks necessitates not just looking at preventative file-based models but expanding the security perspective to on-execution AI that observes system behaviors to detect threats as attackers perform malicious acts. This is a critical component since we know attackers will try to be as evasive as possible. Securing an airplane isn't just about security checks before your board, it extends into the flight with the right personnel and even air marshals observing and responding to any threats. Security in the cyber-world is no different! The key for on-execution AI is how we do it in an efficient fashion so as not to overload the end-user and how we do it at the endpoint to provide security even when the users are not connected to the network. This is where SentinelOne's approach differentiates from other options.
Additionally, our execution-based models also provide rich forensic insights to help security analysts understand the threats better and be more complete in the response. For example if the malware tried to move laterally it's important to augment device recovery with an understanding of what other machines may have been targeted.
The last piece about AI-powered detection is to marry it with response. No security is good if all it does is notify you when something's wrong especially when lots of things can go wrong. Here's where an integrated workflow from detection to response becomes critical. Whether that response is discovered from the system discovering issues or from an analyst hunting for indicators of threats.
Q3. SentinelOne is a big proponent of autonomous and automated security? What do you want attendees of Black Hat Europe to know about your model and how do you see it benefiting them?
Absolutely. We are all aware that getting skilled security professionals is a major challenge for organizations today - in fact almost 50% of organizations are severely understaffed on security professionals. And as the business environments and threats become more complex they only increase the complexity of a security analyst's job. We also know from threats such as WannaCry and NotPetya that time-to-response is extremely critical - WannaCry hit hundreds of thousands of machines within a day and brought several large organizations to their knees. The organizational risk and impact is clearly dependent on the speed of cyber response after a threat and, with limited security professionals, a manual approach is never going to scale!
The automation of SentinelOne EPP exists at several levels—device containment to minimize spread, kill and quarantine to minimize impact, as well as remediation and rollback to accelerate recovery after a breach. By automating the security response workflow, we can both minimize the risk to organizations and improve the efficiency of security teams! And that in turn can also liberate the security analysts to spend time on more proactive security measures for their businesses!