We performed a comparison between AgileBlue and SentinelOne Singularity Complete based on real PeerSpot user reviews.
Find out what your peers are saying about CrowdStrike, SentinelOne, Wazuh and others in Extended Detection and Response (XDR)."Among the most valuable features are the alert timeline, the alert story, which is pretty detailed. It gives us complete insight into what exactly happened on the endpoint. It doesn't just say, "Malware detected." It tells us what caused that malware to be detected and how it was detected. It gives us a complete timeline from beginning to end."
"In Microsoft 365 vendor products, monitoring and connectivity across all Microsoft and third-party connectors enable viewing of all activity within those environments."
"I like that it's stable. It's been stable for a long time, and Microsoft Defender has done a good job there."
"Microsoft 365 Defender is a good solution and easy to use."
"Microsoft 365 Defender's most valuable feature is the ability to control the shadow IP."
"The ability to integrate and observe a more cohesive narrative across the products is crucial."
"Scanning, vulnerability reporting, and the dashboard are the most valuable features."
"Defender XDR has a feature called the timeline that lets you track all activities. It helps a lot with investigations."
"In addition to managing the SOC, they offer Endpoint Detection and Response (EDR) capabilities for servers and systems. What stood out for us is the product's lightweight nature, unlike other EDRs we evaluated that tend to be system-intensive. This lightweight feature significantly piqued our interest and influenced our decision to use the solution. The solution is stable. I rate it a seven out of ten. The solution is scalable. I rate it an eight out of ten. The support team is remarkably prompt. They quickly resolve any issues we encounter. The initial setup was straightforward. With strong timings and BSLAs, AgileBlie stands out when compared to competitors."
"The deep visibility and the ability to perform security investigations and assess our endpoint security posture are the most valuable features."
"I appreciate that it is easy to review incidents that have been detected by the behavioral AI or the SentinelOne Cloud."
"The rollback feature is the most valuable aspect of the solution."
"SentinelOne also provides equal protection across Windows, Linux, and macOS. I have all of them and every flavor of them you could possibly imagine. They've done a great job because I still have a lot of legacy infrastructure to support. It can support legacy environments as well as newer environments, including all the latest OS's... There are cost savings not only on licensing but because I don't have to have different people managing different consoles."
"I have been a Mac guy for twenty years, and the feature parity and the capabilities of a Macintosh agent are unparalleled in the industry. It is the first anti-malware and antivirus that does not make you feel that you bought the wrong processor. It is really good and lightweight."
"The most valuable features are asset tracking, patching, endpoint tagging, and policy updates."
"The tool deletes the problem-causing process and prevents issues."
"The deep visibility is a valuable feature. I can use it during threats or alert signals that we get. I can also use it when we have alert signals from other security tools that we have."
"When we do investigations, it would be better if Microsoft could populate the host dashboard more. When we open any host for investigation, we want the entire timeline of what is happening on the host, including all the users logging in, their hardware, Windows version, etc."
"The design of the user interface could use some work. Sometimes it's hard to find the exact information you need."
"The console is missing some features that would be helpful for a managed services provider, like device and user management."
"I'd like to see a wider solution that includes not only desktop devices but also other devices, such as servers, storage cabinets, switching equipment, et cetera."
"My client would like the solution to be more customizable without using code. You can only build on the default console, but we're not allowed to change it."
"Correctly updated records are the most significant area for improvement. There have been times when we were notified of a required fix; we would carry out the fix and confirm it but still get the same notification a week later. This seems to be a delay in records being updated and leads to false reporting, which is something that needs to be fixed."
"Because of the training model, Defender XDR's automatic response sometimes blocks legitimate users and activities. Also, the UI sometimes responds slowly."
"Generally, antivirus products provide a central control to manage every device in terms of who is installing it or who is trying to disable it, but Microsoft doesn't have such a control center for the antivirus product it provides."
"There is always room for improvement. There's potential for further enhancement in the capabilities of the EDR. However, there are positive changes we are satisfied with. They revamped the dashboard, addressing a previous issue."
"I would like to see something a little more sophisticated than simply being able to mark a false positive as safe or there's usually just one or two options in certain areas and they're a little rudimentary at this stage."
"Their CASB tool needs to mature. I think there are some CASB vendors out there that have a dashboard tool that's much more mature than SentinelOne. That would be the only constructive criticism that I have."
"The solution does not have an application security and control module."
"There is not much flexibility in terms of policy fine-tuning. We can turn it off or turn it on, but, there's nothing much else to do. Everything is predefined. It's good in a way, but you don't get much flexibility if you want to do something particular."
"We are now using an external monitoring tool to monitor the services of SentinelOne, because apparently they don't have any solution for that. When the SentinelOne agent is down, you can go to the interface and see a mark on SentinelOne that something is not correct or the server needs to be rebooted, but you will not get an alert. You will not be warned that there is an issue with the SentinelOne agent. I have found that a little bit disturbing, because then we need to use a third-party monitoring tool to make sure that all services of SentinelOne are up and running."
"I'd like to see us be able to take action on one platform for items such as security variation, security orchestration, automation, and response (SOAR)."
"Interoperability with other SentinelOne solutions and other third-party tools is an area where you can run into some issues. Because of the way the agent works, there are sometimes things that are blocked or prevented from happening that are not identified as a threat, and therefore, not alerted in the console. Sometimes, we do have to dig through the logs, run tests, and adjust the whitelisting or exclusions to make sure that other applications will run properly."
"As a cloud-based product, there is a minimum number of licenses that need to be purchased, which is unfortunate."
More SentinelOne Singularity Complete Pricing and Cost Advice →
AgileBlue is ranked 25th in Extended Detection and Response (XDR) with 1 review while SentinelOne Singularity Complete is ranked 2nd in Extended Detection and Response (XDR) with 177 reviews. AgileBlue is rated 8.0, while SentinelOne Singularity Complete is rated 8.8. The top reviewer of AgileBlue writes "A Lightweight Solution Offering a Seamless Experience". On the other hand, the top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". AgileBlue is most compared with CrowdStrike Falcon, whereas SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace, ThreatLocker Protect and Datto Endpoint Detection and Response (EDR).
See our list of best Extended Detection and Response (XDR) vendors.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.