SentinelOne Singularity Complete and CrowdStrike Falcon are both leaders in the endpoint detection and response (EDR) category. SentinelOne tends to have the upper hand due to its robust rollback functionality, which offers critical ransomware protection and autonomous endpoint security.
Features: SentinelOne Singularity Complete is known for its AI-driven threat analysis and autonomous endpoint protection capabilities, including a unique rollback feature, comprehensive threat remediation, and endpoint-centric intelligence. Conversely, CrowdStrike Falcon excels with its real-time threat intelligence, extensive network visibility, and superior intelligence-gathering capabilities, making it greatly effective for comprehensive live monitoring and external threat insights.
Room for Improvement: SentinelOne's management console can be complex, with critiques targeting role-based access and reporting functionalities, while user interface intuitiveness could be improved. CrowdStrike Falcon could benefit from refining its reporting capabilities and offering more granular policy controls, as some users find GUI changes disruptive. Streamlining configuration and customization processes would further enhance usability for both products.
Ease of Deployment and Customer Service: SentinelOne is celebrated for its ease of deployment across various cloud environments and well-received customer support, particularly during deployments. It suits hybrid and on-premises setups effectively. CrowdStrike Falcon offers smooth integration and ease of deployment, with prompt and effective customer support, although personalized assistance could sometimes be improved.
Pricing and ROI: SentinelOne is competitively priced and offers strong ROI, justified by its features and reduced incident response times. Some users find it expensive compared to traditional antivirus solutions. CrowdStrike Falcon, while often more costly, especially for small to medium enterprises, justifies its price with advanced threat detection and real-time monitoring capabilities, appealing to larger enterprises with demanding security requirements.
Since then, I have not faced any intrusions, which is one reason I chose SentinelOne over ESET.
We have not faced any attacks since we implemented it.
It has absolutely helped reduce our organizational risk.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
They do a great job of figuring out the problem and pointing you to generic documentation or working with you to fine-tune a solution.
We are using the automated email process for support, and they respond within an hour or two hours sometimes.
A chat service would be beneficial.
It has adequate coverage and is easy to deploy.
When it comes to scalability, it is entirely based on premium models according to demand.
It's all auto-scale and auto-categorized, configuring automatically.
The tool's built-in automation for deploying the agents works well for large infrastructures like mine.
My deployment is relatively small, and SentinelOne Singularity Complete works within those constraints.
I have never seen instability in the CrowdStrike tool.
We are following N-1 versions across our environment, which is stable.
It has caused problems with interoperability between third-party tools, which could lead to entire servers crashing or specific tools failing.
This indicates room for improvement in stability when interacting with other solutions.
Initially, there were issues, particularly on the management side, but now the console is much more stable.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
The only thing that prevented the attack from succeeding was a free version of Malwarebytes.
Providing a single pane of visibility for the end user would be beneficial.
It's challenging to prevent a user from manipulating their privileges or someone else's of others, and it's difficult to control what users can access at the organizational level.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
If you want protection, you have to pay the price.
They counted many of the instances and licenses as duplicates despite them only being alive once, which was frustrating.
It’s cheaper than other competitors.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
The machine learning behavior for anomaly detection is a valuable feature.
Real-time response (RTR) is a feature of EDR.
I have an advanced app providing visibility of all my endpoints, which was not the case before.
SentinelOne has a feature to decommission automatically, which has been fantastic.
There's also automation that gives my team free time, preventing them from having to look for every alert.
CrowdStrike Falcon provides endpoint protection and threat intelligence using a cloud-based platform for real-time detection and response. Its minimal impact on system performance and ease of deployment are key benefits along with advanced logging and reporting for compliance and forensic analysis.
CrowdStrike Falcon is known for its efficacy in identifying malware, ransomware, and sophisticated cyber threats. The platform's cloud-native architecture and advanced AI capabilities ensure comprehensive endpoint visibility and rapid response times. Users appreciate the lightweight agent and seamless deployment process, along with detailed reporting features. Integration with security tools and efficient customer support are essential features, although some users highlight high pricing, occasional detection delays, and challenges with integration. Frequent alerts and the mobile app's performance are areas for improvement.
What are the key features of CrowdStrike Falcon?
What are the benefits or ROI of CrowdStrike Falcon?
In industries like finance, healthcare, and retail, CrowdStrike Falcon is often used for critical security due to its robust threat detection capabilities. Financial firms value its rapid response and detailed reporting for compliance, while healthcare providers appreciate the minimal system performance impact. Retailers benefit from its comprehensive endpoint visibility and integration with other security tools.
SentinelOne Singularity Complete provides AI-driven threat detection and response with features like ransomware protection and rollback, offering endpoint protection with minimal system impact and deep forensic analysis.
SentinelOne Singularity Complete combines machine learning and artificial intelligence to offer robust endpoint protection. It delivers real-time insights and advanced threat detection through seamless integration with third-party tools, allowing for efficient endpoint management. With an emphasis on user-friendliness, it ensures reduced false positives. Room for improvement includes better integration options, enhanced reporting, and more precise analytics to tackle false positives. Users seek improved interoperability with systems and comprehensive support for legacy systems.
What are the key features of SentinelOne Singularity Complete?Organizations from industries like finance, healthcare, and technology deploy SentinelOne Singularity Complete to safeguard endpoints such as PCs, servers, and virtual machines. Equipped with EDR, it effectively replaces traditional antivirus systems and integrates with cloud technology for real-time security insights.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.