SentinelOne Singularity Complete and Microsoft Defender for Cloud compete in cybersecurity solutions. SentinelOne appears to have an edge with its user-friendly installation and effective threat detection, whereas Microsoft Defender gains advantage from its seamless ecosystem integration and extensive feature set.
Features: SentinelOne offers advanced threat detection, real-time response capabilities, and a unified platform. Microsoft Defender provides seamless integration into Microsoft services, comprehensive security coverage, and strong protection features.
Room for Improvement: SentinelOne can improve its reporting capabilities, customization of alerts, and analytical tools. Microsoft Defender could benefit from a more streamlined configuration process, enhancements in performance analytics, and reduced initial complexity.
Ease of Deployment and Customer Service: SentinelOne is known for straightforward deployment and robust customer support focused on rapid assistance. Microsoft Defender’s deployment may be complex due to its integration features, but provides knowledgeable support to help users adjust.
Pricing and ROI: SentinelOne users find the pricing competitive with a favorable ROI thanks to less manual oversight and better threat management. Microsoft Defender is seen as higher in cost but justified by its rich features and integration, correlating its price with a robust and integrated feature set.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
Defender proactively indexes and analyzes documents, identifying potential threats even when inactive, enhancing preventative security.
Identifying potential vulnerabilities has helped us avoid costly data losses.
The biggest return on investment is the rapid improvement of security posture.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
Since security is critical, we prefer a quicker response time.
The support team was very responsive to queries.
They understand their product, but much like us, they struggle with the finer details, especially with new features.
They do a great job of figuring out the problem and pointing you to generic documentation or working with you to fine-tune a solution.
SentinelOne's policy required the MSP to contact their company and schedule the deactivation at least 24 hours before.
As soon as we need to add somebody, we just add them to NinjaOne, and then we have a script set up where it automatically deploys and adds them to whichever group we need.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
We are using infrastructure as a code, so we do not have any scalability issues with Microsoft Defender for Cloud implementation because our cloud automatically does it.
Defender won't replace our endpoint XDR, but it will likely adapt and support any growth in the Microsoft Cloud space.
There might be scalability issues as you scale up to large enterprises.
The tool's built-in automation for deploying the agents works well for large infrastructures like mine.
My deployment is relatively small, and SentinelOne Singularity Complete works within those constraints.
In my experience, there has been 100 percent uptime.
SentinelOne Singularity Cloud is incredibly reliable.
The cloud console is very resilient.
Defender's stability has been flawless for us.
Microsoft Defender for Cloud is very stable.
Microsoft sometimes changes settings or configurations without transparency.
It has caused problems with interoperability between third-party tools, which could lead to entire servers crashing or specific tools failing.
This indicates room for improvement in stability when interacting with other solutions.
If I had to ask for anything to make it easier, it would be signed images that are GPG signed and a public repository where we can get the bits from.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
Microsoft, in general, could significantly improve its communication and support.
The artificial intelligence features could be expanded to allow the system to autonomously manage security issues without needing intervention from admins.
I've heard there might be issues with scalability for larger enterprises.
The only thing that prevented the attack from succeeding was a free version of Malwarebytes.
It's challenging to prevent a user from manipulating their privileges or someone else's of others, and it's difficult to control what users can access at the organizational level.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
The price was very, very important to us, and it came down to the price when we were doing our evaluations WatchGuard and SentinelOne.
Covering our 50,000 endpoints would have nearly bankrupted most security programs, even well-funded ones like ours.
Every time we consider expanding usage, we carefully evaluate the necessity due to cost concerns.
We appreciate the licensing approach based on employee count rather than a big enterprise license.
Microsoft Defender for Cloud is pricey, especially for Kubernetes clusters.
They counted many of the instances and licenses as duplicates despite them only being alive once, which was frustrating.
I did not notice a significant increase in cost after adding SentinelOne.
The real-time detection and response capabilities of SentinelOne Singularity Cloud impressive because it is a platform that uses artificial intelligence to determine what is normal and what is abnormal and can lock down any virus it may encounter.
We were shown how ransomware can be immediately stopped in real-time. That was huge.
Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks.
The most valuable feature for me is the variety of APIs available.
This feature significantly aids in threat detection and enhances the user experience by streamlining security management.
The most valuable feature is the recommendations provided on how to improve security.
The setup process is smooth.
The security aspect is the most valuable feature for me.
SentinelOne Singularity Cloud Security protects cloud workloads, offering advanced threat detection and automated response. It integrates seamlessly with cloud environments and secures containerized applications and virtual machines against vulnerabilities.
SentinelOne Singularity Cloud Security is renowned for its efficiency in mitigating threats in real-time. The platform integrates effortlessly with existing cloud environments, ensuring robust cloud security management with minimal manual intervention. Securing containerized applications and virtual machines, it excels in threat intelligence and endpoint protection. However, improvements are needed in performance during high workload periods, and more integrations with third-party tools and better documentation would be beneficial. Users often find the installation process complex, support response times slow, and the dashboard's navigation unintuitive.
What are the key features of SentinelOne Singularity Cloud Security?In specific industries, SentinelOne Singularity Cloud Security is implemented to safeguard critical data and infrastructure. Organizations in finance, healthcare, and technology depend on its real-time threat detection and automated response to protect sensitive information. Its ability to secure containerized applications and virtual machines is particularly valuable in dynamic environments where rapid scaling is necessary.
Microsoft Defender for Cloud is a comprehensive security solution that provides advanced threat protection for cloud workloads. It offers real-time visibility into the security posture of cloud environments, enabling organizations to quickly identify and respond to potential threats. With its advanced machine learning capabilities, Microsoft Defender for Cloud can detect and block sophisticated attacks, including zero-day exploits and fileless malware.
The solution also provides automated remediation capabilities, allowing security teams to quickly and easily respond to security incidents. With Microsoft Defender for Cloud, organizations can ensure the security and compliance of their cloud workloads, while reducing the burden on their security teams.
SentinelOne Singularity Complete provides AI-driven threat detection and response with features like ransomware protection and rollback, offering endpoint protection with minimal system impact and deep forensic analysis.
SentinelOne Singularity Complete combines machine learning and artificial intelligence to offer robust endpoint protection. It delivers real-time insights and advanced threat detection through seamless integration with third-party tools, allowing for efficient endpoint management. With an emphasis on user-friendliness, it ensures reduced false positives. Room for improvement includes better integration options, enhanced reporting, and more precise analytics to tackle false positives. Users seek improved interoperability with systems and comprehensive support for legacy systems.
What are the key features of SentinelOne Singularity Complete?Organizations from industries like finance, healthcare, and technology deploy SentinelOne Singularity Complete to safeguard endpoints such as PCs, servers, and virtual machines. Equipped with EDR, it effectively replaces traditional antivirus systems and integrates with cloud technology for real-time security insights.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.