Sertalink

/sales@sertalink.com  BE: +32(0)3/337.17.01.    LUX: +352(0)27/94.06.59.

Sertalink

Singularity Control

Singularity Control: The suite features you need. Made for organizations seeking the best-of-breed cybersecurity with additional suite features.

More capability. Same agent.

ORGANIZATIONS EXPECT OPTIONS FOR CONTROLLING THEIR DEVICES; SINGULARITY CONTROL ADDS HOLISTIC SUITE MANAGEMENT FEATURES.

CONTROL NETWORK FLOWS

Native OS firewall control for Windows, Mac, and Linux enables granular, location aware network flow control.

CONTROL USB & BLUETOOTH®

Control any USB, Bluetooth, or Bluetooth Low Energy device on Windows and Mac to reduce the physical attack surface.

ENSURE 100% DEPLOYMENT

Identify unprotected devices automatically to ensure compliance with security KPIs.

Network Control

  • Control inbound and outbound network traffic for Windows, Mac, and Linux.
  • Centralized and customizable policy-based control with hierarchy inheritance.
  • Tagging mechanisms for streamlined policy assignment and administrative clarity.
  • Touchless location awareness that dynamically assigns network control based on the system’s physical location.

Device Control

  • Granular device control for USB and Bluetooth on Windows and Mac.
  • Centralized and customizable policy-based control with hierarchy inheritance.
  • Control any USB device type, not just mass storage, and specify full read-write or read-only operation.
  • Control Bluetooth by protocol version and by specific Bluetooth device type.
  • Control Bluetooth Low Energy devices.

Rogue Device Discovery

  • The Rogues feature identifies the endpoints that are not yet protected by SentinelOne.
  • Employs passive and active network sweeps to provide enterprise-wide visibility.
  • Removes the uncertainty of whether or not your network is regulatory compliant by discovering deployment gaps.
  • No additional software required.
  • No network changes or hardware required.
X