Insights
Spotlight: SentinelOne - Device Control
In this blog post we highlight some of the issues with USB related breaches and how to protect against them.
Handling the category none – Threat Risk Scoring
Kill, Quarantine, Remediate and Rollback - SentinelOne
Uncovering the difference between SentinelOne's Kill, Quarantine, Remediate and Rollback actions.
Spotlight: How Does SentinelOne Rollback Work?
Find out here about SentinelOne's superior rollback feature and how it can be the ultimate ransomware remediation tool.
Spotlight: SentinelOne - Configuring Snapshots
Easily configure SentinelOne's snapshot settings and learn the impact this has on your environment
Spotlight: SentinelOne - True Context
Discover how SentinelOne's True Context can be a powerful tool in the investigation and response of a Cyber Security incident.
Spotlight: SentinelOne - Uninstalling the agent
Uninstalling SentinelOne's agent can be done the secure/easy way from the management console, or the more circuitous route, using the endpoint.
Spotlight: SentinelOne - Application Inventory
Application inventory is a SentinelOne feature that provides users with the ability to have full app visibility over their environment.
©2025 Cyber Vigilance
Powered by Disruptive
Naggs Stable, Old Portsmouth Road, Guildford, Surrey, England, GU3 1LP