Palo Alto Networks VM-Series and SentinelOne Singularity Identity compete in the cybersecurity sector, particularly in managing and mitigating threats. SentinelOne seems to have the upper hand due to its strong integration with other tools and effective threat detection capabilities.
Features: Palo Alto Networks VM-Series includes App-ID, Content-ID, and deep packet inspection, providing robust security across cloud environments such as AWS. SentinelOne Singularity Identity offers behavior-based threat detection, seamless integration with security tools, and comprehensive threat intelligence and incident management.
Room for Improvement: Palo Alto Networks VM-Series could enhance scalability, third-party integration, and the user-friendliness of its command-line interface. SentinelOne Singularity Identity could improve its endpoint management granularity, agent updating process, and provide more transparent documentation and support.
Ease of Deployment and Customer Service: Palo Alto Networks VM-Series allows flexible deployment across various cloud infrastructures, with mixed experiences in technical support. Its interface may require additional guidance for effective use. SentinelOne Singularity Identity provides a smooth cloud-based deployment and has responsive customer support, though its guidance could be clearer.
Pricing and ROI: Palo Alto Networks VM-Series is regarded as expensive with complex licensing structures that may not always justify feature usage, although it offers significant ROI by enhancing security and efficiency. SentinelOne Singularity Identity is competitively priced but faces transparency issues with pricing updates, yet it provides a strong ROI through its security features.
Customers can see data within a week, indicating a quick return on investment.
The support quality could be improved.
The technical support is very good.
It is very hard to reach, and the process can be lengthy and frustrating because support involves several layers.
They have been responsive to our needs as integrators and those of the client.
They are easy to upgrade, and with credit licensing, they scale effectively according to demand.
If I were to rate it on a scale, it would receive nine out of ten, and with two-factor authentication, it would be ten.
Hardware is generally very stable.
I have not experienced any major problems or downtime.
Most customers go for partner-enabled support, which involves multiple layers, leading to delays.
There is a need for two-factor authentication, particularly for VPN and CloudProtect.
When managing the firewall, it involves a Strata Cloud web browser that requires improvement to enhance deployment ease and call center efficiency.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
The cost involves purchasing through a vendor, which might mark up due to the supply chain.
Palo Alto is expensive in terms of pricing, particularly when comparing features to cost.
The pricing is reasonable and reflects the quality of the product.
We use these tools to prevent all known and unknown threats using Palo Alto Networks' Wildfire and other data filtering tools to gather information, analyze traffic, manage malicious traffic, and offer visibility, control, and attack prevention.
Palo Alto's robust threat intelligence supports new updates, and I can open cases directly with their Threat Intelligence team.
Palo Alto Networks VM-Series is very strong in security features like antivirus, anti-spyware, and machine learning capabilities that help scan for antivirus and anti-spam.
With visibility into endpoint telemetry, SentinelOne does provide useful information to find threat actors and empowers those who are in the business of threat hunting.
Palo Alto Networks VM-Series is a highly effective advanced threat protection (ATP) solution and firewall that can be hosted on cloud computing technologies designed by many different companies. It decreases the amount of time that it will take administrators to respond to threats. Users that deploy VM-series have 70% less downtime than those who use similar firewalls. Neither protection nor efficiency are concerns when this next-generation firewall is in play.
VM-Series is being deployed to protect both public and private cloud environments. This level of flexibility empowers organizations to run the environment or environments that best meet their needs without worrying that they are going to be exposed to digital threats due to the environment that they choose.
In the public cloud, users of Palo Alto Networks VM-Series can automate their deployment and dynamically scale up their environment while experiencing a consistent level of protection. This dynamic scalability means that they also integrate their security into their DevOps workflows so that their security can keep up with their activities and requirements. Users of private cloud environments can set up security policies that can be automated to be provisioned as the need arises. Organizations don’t need to slow down when they deploy VM-Series because it makes the task of defending them so simple that they can set their defenses and forget that they are even there.
Users gain a deep level of visibility when they deploy Palo Alto Networks VM-Series. App-ID technology enables organizations to see their network traffic on the application level and spot threats that might be trying to sneak in through vulnerable points in their defenses. It also leverages Palo Alto Networks WildFire and advanced threat protection to block the threats before they can escalate.
Palo Alto Networks VM-Series Features:
Reviews from Real Users:
Palo Alto Networks VM-Series is a solution that stands out when compared to other similar solutions. Two major advantages that it offers are its ability to protect users without degrading the efficiency with which their networks perform and its centralized management system.
Jason H., the director of information technology at Tavoca Inc, writes, “There is no noticeable trade-off between security and network performance. In fact, so far, we've not seen any negative network performance with it. We're very impressed in that regard.”
An information technology manager at a tech services company says, “We use Palo Alto’s Panorama centralized management system. We have an on-prem firewall where Panorama is very good for pulling logs in from the cloud so we can see what is going on. It gives us visibility into that as well as shows us what attacks are coming in. Palo Alto’s Panorama centralized management system simplifies our security posture based on our requirements. Instead of manually pulling logs, then generating them into readable formats, it gives us the console in a readable format to view.”
Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.
Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.
Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.
By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.