SentinelOne deploys predictive software to battle malware

Startup: SentinelOne

What they do: Provide endpoint security software that detects, models, and predicts threat behavior to block attacks on any computing device, including servers and embedded systems like point of sale (PoS) terminals.

Headquarters: Mountain View, CA

CEO: Tomer Weingarten. Previously he led product development and strategy for the Toluna Group as a VP of Products. Prior to that he held several application security and consulting roles at various enterprises, and was CTO at Carambola Media.

Founded: 2012 SentinelOne

Funding: $14.5M from Tiger Global, Accel Partners, Data Collective, Granite Hill Capital Partners, and the Westly Group.

What I like about them: Security is a never ending arms race between security providers and cyber-crooks. As recent exploits and data breaches (Heartbleed, Home Depot, Supervalu) have shown, this isn’t a battle the good guys are winning.

Advanced malware can evade anti-virus and sandbox technologies by not executing when it detects their presence. Once it evades these security mechanisms it is in the clear and can execute its payload – without being detected.

SentinelOne intends to fight advanced malware through predictive software that focuses on processes and patterns, not signatures.

Unlike signature-based security techniques and sandbox technologies that emulate endpoint devices, SentinelOne dynamically tracks each newly-created process on a machine through its life-cycle execution inspection technology to prevent malware from evading detection. By profiling activity patterns in real-time, SentinelOne can detect the most stealth threats, anticipate their next move, then stop and remove the malware.

Already, they’ve lined up some heavy-hitting customers, including Yahoo! and Netflix.

Competitive Landscape: Competitors include Mandiant, Cybera, Bit9, and Crowd Strike.