SentinelOne deepens AWS ties with new AI safeguards
SentinelOne has announced expanded integrations and designations with Amazon Web Services (AWS) to enhance the security of cloud-based artificial intelligence (AI) operations.
SentinelOne's offerings now provide direct integration with various AWS security tools, enabling users to orchestrate security responses with less manual intervention and fewer errors. The updates allow AWS customers to protect data, applications, and AI models across multiple layers of their cloud infrastructure.
Among the newly introduced features is Singularity Hyperautomation for AWS Security Incident Response. This solution delivers no-code automated workflows and response playbooks, enabling users to manage incidents, isolate affected resources, generate notifications, and trigger containment processes directly from the SentinelOne platform. This integration is intended to reduce mean time to remediate (MTTR) and enable security analysts to focus on higher-level strategic tasks.
AI-driven investigation tools
The company has also added support for its Purple AI tool with AWS CloudTrail. Purple AI enables security teams to conduct threat investigations and perform hunting using natural language queries on AWS CloudTrail logs, eliminating the need for custom query syntax. This is designed to speed up investigations, reduce the learning curve for security teams, and simplify compliance and audit tasks.
SentinelOne positions its partnership with AWS as a way for organisations to access the full potential of AI securely and at scale. "Security and innovation go hand in hand," said Ely Kahn, CPO, SentinelOne. "Our continued collaboration with AWS ensures that organizations can harness the full potential of AI and the cloud without compromising trust or control. Together, we're delivering the AI security foundation for the next generation of enterprise computing."
Marketplace availability
Additionally, SentinelOne's Prompt Security tools are now available to AWS customers via the AWS Marketplace. These tools focus on ensuring safe generative AI use by providing real-time visibility, policy enforcement, and protection against risks such as prompt injection, shadow AI, and potential data leakage. The intention is to help organisations mitigate issues associated with the misuse or unintended exposure of AI-driven data and workflows on the cloud.
SentinelOne has also announced its achievement of AWS's Generative AI Competency, which recognises companies that have demonstrated technical expertise and customer success in AI security within the AWS environment. This competency provides SentinelOne customers with increased confidence, eligibility for AWS-related spending, and access to specialist support for AI security operations within AWS infrastructure.
Customer impact
Relay Network, one of SentinelOne's customers, highlighted the business impact of these integrations.
"SentinelOne's comprehensive AI-native security platform, deeply integrated with AWS, has been a game-changer for Relay Network. We've seen a 100% improvement in visibility and a 50% reduction in issue-detection time, allowing our engineers to focus on innovation and accelerate feature development. This collaboration empowers us to confidently build, operate, and secure the future of AI on AWS, ensuring we can scale securely and deliver unparalleled value to our customers," said Brendan Putek, Director of DevOps, Relay Network.