The Singularity App for Azure Active Directory enables enterprises to integrate leading endpoint and authentication solutions to implement a Zero Trust security model
SentinelOne, a provider of an automated cybersecurity platform, announces the SentinelOne App for Azure Active Directory, a new solution that combines endpoint security and authentication capabilities to enhance Zero Trust architecture. The Singularity App for Azure Active Directory (Azure AD) allows enterprises that adopt SentinelOne solutions to automatically alert Azure AD when an endpoint is at risk, activating restricted access policies to protect corporate resources, allowing organizations to apply the principles of Zero Trust. The Zero Trust architecture, supported by SentinelOne, defines a flexible structure capable of protecting the digital enterprise.
“Cyberattacks that have occurred on a global scale, including Kaseya or SUNBURST, remind us of the importance of modernizing legacy security architectures,” he said Sue Bohn, Vice President of Program Management di Microsoft. “The integration between SentinelOne and Azure Active Directory will allow organizations to combine leading endpoint and authentication solutions to achieve a Zero Trust security model.”
“Integrated ecosystems are critical to a Zero Trust strategy as organizations seek to utilize best-of-breed solutions,” he said Raj Rajamani, Chief Product Officer at SentinelOne. "Bringing together leading endpoint and authentication solutions will help our customers develop and improve their Zero Trust programs. In partnership with Microsoft, we offer customers customized security solutions to help protect businesses."
As ransomware, supply chain and credential attacks become increasingly popular among cybercriminals, endpoints and identities represent two of the most commonly exploited attack vectors to gain access to corporate data. Organizations are trying to mitigate this risk by moving from a traditional network-based defense model to a Zero Trust security model, specifically by linking endpoint security and authentication solutions together to gain visibility into at-risk users. However, this imposes complex setup and maintenance tasks on enterprises, leaving limited automation options available for self-healing. With Singularity App for Azure Active Directory, organizations can leverage a modern security platform that maximizes existing investments, allowing them to keep assets secure while providing immediate access through a fully managed and automated solution.
When a user opens a malicious file on an endpoint, SentinelOne detects the incident and uses the Azure AD Risky User API to automatically report the user's identity with a detected compromised risk status and high risk level. When a user's identity transitions to this level, Azure AD conditional access policies can initiate a variety of actions, including limiting or blocking access or triggering a multi-factor authentication (MFA) request. When the incident is resolved by SentinelOne, the user is moved from the at-risk user status, back to their normal identity status.
With SentinelOne on the endpoint and directly integrated with Azure AD, customers have a system to continuously and automatically verify the trustworthiness of each individual user identity or endpoint. Additionally, information about any compromised user identities is shared with Azure AD in real time, activating the organization's conditional access policies and consequently preventing access to corporate resources and services.
The Singularity App for Azure Active Directory is available on the Singularity Marketplace. For more information visit https://www.sentinelone.com/platform/zero-trust/






