The History of AV (anti-virus)/ EDR technology

Started out with First Generation, old legacy AV solutions. These were people powered (so inefficient and not scalable as IT teams would patch vulnerabilities manually, etc…) These were designed for a different working environment – one that is not as complex and advanced as it is now. 

We then moved on to Second Generation AV and EDR, with cloud-based monitoring. This was a  newer version of defense that gave you more information about attacks, much more quickly. However, the reliance on ‘reactive response’ meant that it could still take several hours, to a day, to write the signatures needed to stop the identified attack happening on all the other machines across the world -still too long and complex a  process – still not quick enough. 

What makes SentinelOne Different? 

Define what SentinelOne is: SentinelOne | Autonomous AI Endpoint Security Platform | s1.ai

SentinelOne is a third generation EDR/ XDR solution that doesn’t rely on the cloud. The key difference being that SentinelOne is completely automated and can identify and remediate threats within seconds.SentinelOne can sit looking after your machines all day, everyday. Looks at the behaviour on the endpoint, identifies malicious  behaviour and remediates on the endpoint within seconds. 

It is a technology that scales to people – the automation aspect shrinks mean time to respond & recovery. The automated AI capabilities means that SentienlOne becomes an effective front line defense. 

Key Features: 

100% Ransomware Prevention Record 

SentinelOne has a 100% record when it comes to stopping ransomware in its tracks. S1 has never let ransomware through – there’s no way ransomware can get past it. With SentinelOne in place, cyber disasters like WannaCry would never have happened. 

Storyline Feature

The Storyline feature contextualizes everything that’s happening in real time. Will trigger responses if needed. Everything in SentinelOne is designed to take away the time it takes the SOC team to respond to stuff because it’s doing it all for you. 

Could see an attempted ransomware attack happening in real time – the files being targeted, where it’s trying to go. Can keep an eye on attempted lateral movement. 

Observing every process on the machine all day = instantaneous protection 

Could be managed easily by a very small tech team. Gives much more visibility 

It gives you a lot more information than other products give you. Highly detailed information about everything that’s going on. 

Remediation and Instant Roll Back: 

The instant rollback and recovery feature (1-click recovery) can save security teams a lot of time. If, for instance, you SentinelOne alongside your current EDR solution, in detect-only mode, you could see if anything got through in real time and act on it immediately. 

Ranger and Network Visibility 

Looks at every IoT device on the network and canl tell you if it’s secure. Tells you everything that’s on the network (even unexpected household items) – other, unprotected machines – whole potential attack surface. 

S1 will run pretty much on anything,  doesn’t matter how old the machine is – ranger would pick up any unprotected machines which would reduce the risk of ransomware significantly, even with old machines (like the ones used in the NHS, for example) 

XDR – extended detection and response – means that SentinelOne can extend its responses to other vendor platforms 

It has  open APIs – can use SentinelOne well alongside other solutions easily – integrates well with other technologies. 

Long Data Retention – you can look back at data from  year ago, etc, to see what happened, how things have progressed, make comparisons, etc… 

Jan 20 2026

Join Us in Supporting the Great Gloucestershire Mouse Hunt

Core to Cloud is proud to support the Great Gloucestershire Mouse Hunt, a county-wide campaign collecting essential computer peripherals to help improve access to...
Jan 14 2026

From Defence to Resilience: A Strategic Framework for Ransomware Preparedness

Ransomware has evolved into a highly organised and commercially driven threat, capable of bypassing traditional cyber security controls. As attacks become more...
Nov 11 2025

Core to Cloud Partners with The ITSA Digital Trust to Empower Digital Inclusion and Support Sustainable Technology

At Core to Cloud, we’ve always believed that technology should make a positive difference by protecting people, enabling innovation, and building a more inclusive...
Oct 27 2025

Human-led, AI-Enhanced MDR: Rethinking the Balance of People and Technology

By Phil Howe, CTO at Core to Cloud It’s getting colder and wetter outside, and to some the security landscape may feel more complex than ever. Threat actors are faster,...
Oct 22 2025

From Warning to Action: The NCSC Calls on UK Organisations to Build Resilience

In its 2025 Annual Review, the UK’s National Cyber Security Centre (NCSC) issued one of its clearest warnings to date: organisations must prepare for a day when their...
Jun 25 2025

Think You’re Ready for a Cyberattack? Prove It.

In the face of increasing cyber threats, most organisations have invested heavily in technology - firewalls, antivirus, endpoint protection, and cloud security. But...
Jun 13 2025

Secure & Strong Partners with Women in Tech & Cyber Hub (WITCH)

At Core to Cloud, we believe the future of cybersecurity is inclusive, empowering, and community-driven. That’s why we’re proud to announce a meaningful new partnership...
Jun 13 2025

Core to Cloud Expands Strategic Partnership with Vectra AI to Strengthen 24/7 SOC Capabilities

Cirencester, UK, 13 June 2025: Core to Cloud, a leading UK-based provider of cybersecurity services, is deepening its strategic partnership with Vectra AI, the...
May 19 2025

Supply Chain Cyberattacks: Lessons from a Retail Incident

In early May 2025, the UK retail sector experienced a wake-up call. A ransomware attack targeting a retailer’s IT infrastructure disrupted supply chains, impacted...
Mar 14 2025

Rev Up Your Security: Why Cybersecurity is a High-Speed Race, Not a Sunday Drive

Picture this: You’re on the starting grid. The engines roar. The stakes are high. In the relentless Grand Prix of cybersecurity, there’s no cruising—only speed,...

Trusted by CISOs and IT teams at over 150 organisations