Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Detection and Response (EDR).
For smaller organizations, other products may provide better value for money.
They do a great job of figuring out the problem and pointing you to generic documentation or working with you to fine-tune a solution.
SentinelOne's policy required the MSP to contact their company and schedule the deactivation at least 24 hours before.
If you want to write your own correlation rules, it is very difficult to do, and you need Splunk's support to write new correlation rules for the SIEM tool.
The technical support for Splunk met my expectations.
The tool's built-in automation for deploying the agents works well for large infrastructures like mine.
My deployment is relatively small, and SentinelOne Singularity Complete works within those constraints.
They struggle a bit with pure virtual environments, but in terms of how much they can handle, it is pretty good.
It has caused problems with interoperability between third-party tools, which could lead to entire servers crashing or specific tools failing.
This indicates room for improvement in stability when interacting with other solutions.
It provides a stable environment but needs to integrate with ITSM platforms to achieve better visibility.
It is very stable.
The only thing that prevented the attack from succeeding was a free version of Malwarebytes.
It's challenging to prevent a user from manipulating their privileges or someone else's of others, and it's difficult to control what users can access at the organizational level.
An API with Microsoft Sentinel or a similar SIEM tool would be a good idea.
Splunk Enterprise Security would benefit from a more robust rule engine to reduce false positives.
They counted many of the instances and licenses as duplicates despite them only being alive once, which was frustrating.
I did not notice a significant increase in cost after adding SentinelOne.
I saw clients spend two million dollars a year just feeding data into the Splunk solution.
Splunk is priced higher than other solutions.
The security aspect is the most valuable feature for me.
The setup process is smooth.
The Splunk Enterprise Security's threat-hunting capabilities have been particularly useful in later releases.
They have approximately 50,000 predefined correlation rules.
SentinelOne Singularity Complete provides AI-driven threat detection and response with features like ransomware protection and rollback, offering endpoint protection with minimal system impact and deep forensic analysis.
SentinelOne Singularity Complete combines machine learning and artificial intelligence to offer robust endpoint protection. It delivers real-time insights and advanced threat detection through seamless integration with third-party tools, allowing for efficient endpoint management. With an emphasis on user-friendliness, it ensures reduced false positives. Room for improvement includes better integration options, enhanced reporting, and more precise analytics to tackle false positives. Users seek improved interoperability with systems and comprehensive support for legacy systems.
What are the key features of SentinelOne Singularity Complete?Organizations from industries like finance, healthcare, and technology deploy SentinelOne Singularity Complete to safeguard endpoints such as PCs, servers, and virtual machines. Equipped with EDR, it effectively replaces traditional antivirus systems and integrates with cloud technology for real-time security insights.
Splunk Enterprise Security is widely used for security operations, including threat detection, incident response, and log monitoring. It centralizes log management, offers security analytics, and ensures compliance, enhancing the overall security posture of organizations.
Companies leverage Splunk Enterprise Security to monitor endpoints, networks, and users, detecting anomalies, brute force attacks, and unauthorized access. They use it for fraud detection, machine learning, and real-time alerts within their SOCs. The platform enhances visibility and correlates data from multiple sources to identify security threats efficiently. Key features include comprehensive dashboards, excellent reporting capabilities, robust log aggregation, and flexible data ingestion. Users appreciate its SIEM capabilities, threat intelligence, risk-based alerting, and correlation searches. Highly scalable and stable, it suits multi-cloud environments, reducing alert volumes and speeding up investigations.
What are the key features?Splunk Enterprise Security is implemented across industries like finance, healthcare, and retail. Financial institutions use it for fraud detection and compliance, while healthcare organizations leverage its capabilities to safeguard patient data. Retailers deploy it to protect customer information and ensure secure transactions.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.