Goblin House
Claim investigated: SentinelOne's absence from federal procurement may reflect strategic positioning in the enterprise market rather than regulatory barriers, as evidenced by successful federal contracting by other Israeli-origin cybersecurity companies Entity: SentinelOne Original confidence: inferential Result: CONFIRMED → SECONDARY Source: External LLM (manual handoff)
The claim is confirmed, though the 'absence' framing in the premise is misleading. SentinelOne is actively in federal procurement — it holds FedRAMP High authorization, FedRAMP Moderate since 2023, Purple AI became the first cyber AI assistant to achieve FedRAMP High in May 2025, it appointed a VP of Federal Sales in March 2026, and its FY2026 10-K explicitly identifies federal growth as a strategic priority. The Trump April 2025 security clearance revocation for SentinelOne employees (pending national interest review) presupposed the very federal relationships the original inference assumes absent. Comparative Israeli-origin cybersecurity firms demonstrate varied but generally robust federal market access: Check Point earns up to 10% of North American profits from the U.S. public sector; Axonius holds contracts with 70+ federal agencies including DHS and DoD; Palo Alto Networks (founded by Check Point/Unit 8200 alumnus Nir Zuk) is a major federal vendor; Palo Alto's $25B acquisition of Israeli CyberArk closed with federal business intact. The deeper correction is that SentinelOne's USASpending invisibility reflects the standard cybersecurity reseller architecture (Carahsoft as Master Government Aggregator) used by firms of every national origin, not Israeli-specific regulatory barriers or 'strategic' avoidance.
Reasoning: Multiple primary-source evidences now support the claim. SentinelOne's own SEC 10-K filings for FY2024, FY2025, and FY2026 explicitly state the company intends to 'further grow our footprint within the U.S. federal government' under FedRAMP authorization. The FedRAMP Marketplace listing is a federal government-maintained primary source documenting SentinelOne's authorization status. The Trump April 9, 2025 Presidential Memorandum revoking clearances 'pending national interest review' is itself primary evidence that SentinelOne held federal contracts and cleared personnel. For the comparative half of the claim: Check Point's public-sector revenue concentration (reported by Bloomberg), Axonius's 70+ agency footprint (December 2025 investigation), and Palo Alto Networks' direct federal prime contracts are all documented. The confirmed picture is that 'strategic enterprise positioning' vs 'regulatory barriers' is a false dichotomy — SentinelOne has successfully penetrated federal markets using the same reseller-mediated architecture as every other major cybersecurity vendor (including American-origin CrowdStrike), and the security-clearance episode in April 2025 indicates political rather than structural risk factors.
USASpending: USASpending.gov prime award search for 'Carahsoft Technology Corp' 2020-2026 with sub-award filter for 'SentinelOne' — also cross-reference FPDS-NG transaction records by PSC (Product Service Code) J070/DA01 for cybersecurity software
Would quantify actual federal dollar volume flowing through Carahsoft to SentinelOne, making the 'invisible' federal revenue visible at the sub-award level and testing the claim's magnitude
SEC EDGAR: SentinelOne (CIK 0001583708) 10-K filings FY2022-FY2026 segment disclosures for U.S. public sector revenue and related-party transactions
Public companies must disclose segment revenue when material; would establish actual federal revenue as percentage of total and compare FY2026 growth rate to overall growth
other: FedRAMP Marketplace (marketplace.fedramp.gov) query for all Israeli-origin cybersecurity companies with active authorizations — Check Point, CyberArk, Palo Alto Networks, Wiz, SentinelOne, Radware, Cybereason, Claroty, Armis, Axonius
Would establish empirically how many Israeli-origin cyber firms hold federal authorizations, providing the peer comparison baseline the original claim presumed missing
LDA: LD-1 and LD-2 lobbying disclosures for Carahsoft Technology Corp, Check Point, Palo Alto Networks, CrowdStrike, SentinelOne 2020-2026
Would establish whether the 'no SentinelOne lobbying' observation reflects reseller-channel delegation of government relations to Carahsoft versus direct lobbying patterns of peer firms
other: Defense Counterintelligence and Security Agency (DCSA) National Industrial Security Program records and SF-328 FOCI disclosures for SentinelOne Inc. — Facility Clearance status
SF-328 Foreign Ownership, Control, or Influence disclosure is the authoritative federal record on whether Israeli-origin companies have cleared NISPOM 2-100 through 2-107 requirements for classified work
court records: PACER / CourtListener search for SentinelOne Inc. as plaintiff, defendant, or subpoena respondent 2013-2026 — extending beyond the two already-documented cases (Speech Transcription LLC patent suit, dismissed securities class action)
Would establish complete litigation profile; already-documented cases contradict claims of 'complete absence from court records'
other: Office of the Director of National Intelligence contract and transaction records for CyberArk post-$25B Palo Alto Networks acquisition — completion date, CFIUS mitigation agreement terms
CyberArk's CFIUS clearance terms would reveal the modern template for Israeli-origin cybersecurity companies to retain federal access through US corporate parent structures
parliamentary record: Congressional Research Service and GAO reports on cybersecurity vendor foreign ownership, FedRAMP authorization process, and reseller-mediated federal procurement 2020-2026
Would provide authoritative governmental assessment of whether national origin creates actual federal procurement barriers separate from procurement architecture artifacts
NOTABLE — This finding corrects a systematic error pattern in the investigation's prior reasoning chain. Multiple earlier 'established facts' treated SentinelOne's USASpending invisibility as evidence of strategic foreign-origin risk management; the corrected record shows this invisibility is a generic feature of SaaS cybersecurity federal procurement that applies equally to US-founded CrowdStrike and Israeli-founded SentinelOne alike. The significance is 'notable' rather than 'significant' because the correction is methodological rather than substantively revelatory — it does not uncover novel government-industry relationships, but it does usefully demonstrate that 'database absence' inferences require ruling out procurement architecture artifacts before reaching for national-origin or classified-program explanations. The corrected frame also surfaces two genuinely interesting underreported angles: (1) Carahsoft's role as a systemic single-point-of-visibility for cybersecurity federal procurement across vendors, which itself deserves independent scrutiny, and (2) the Trump April 2025 clearance revocation as a modern precedent for political-rather-than-structural risk to cybersecurity vendor federal access. These angles matter for understanding cybersecurity sector accountability but do not rise to 'significant' or 'critical' status because they do not bear directly on the NRO/classified-space-intelligence investigative thread the prior analytical chain was pursuing.