Try our new research platform with insights from 80,000+ expert users

SentinelOne Singularity Complete vs ThreatLocker Zero Trust Endpoint Protection Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.6
SentinelOne Singularity Complete enhances efficiency and security, reducing response time, costs, and incidents while increasing productivity and savings.
Sentiment score
8.2
ThreatLocker enhances security and productivity with real-time protection, leading to revenue growth and improved efficiency in one year.
The measurable benefits of using ThreatLocker include ensuring real-time protection of organizational resources and maintaining user authentication and protection levels to reduce risks.
 

Customer Service

Sentiment score
7.3
SentinelOne's support is praised for efficiency, expertise, and responsiveness, despite occasional slow responses and non-interactive communication.
Sentiment score
8.8
ThreatLocker Zero Trust Endpoint Protection offers highly-rated, efficient customer service, with rapid response times and knowledgeable support, achieving user satisfaction.
They do a great job of figuring out the problem and pointing you to generic documentation or working with you to fine-tune a solution.
SentinelOne's policy required the MSP to contact their company and schedule the deactivation at least 24 hours before.
ThreatLocker's technical support process could be streamlined by reducing the number of steps required to reach a human agent.
It could be better, especially with response times.
 

Scalability Issues

Sentiment score
8.1
SentinelOne Singularity Complete enables seamless scalability and integration, supporting global enterprises with effective endpoint protection and management.
Sentiment score
8.3
ThreatLocker efficiently scales for all business sizes, seamlessly managing thousands of endpoints without issues, supporting diverse infrastructures.
The tool's built-in automation for deploying the agents works well for large infrastructures like mine.
My deployment is relatively small, and SentinelOne Singularity Complete works within those constraints.
It is scalable to an extent, depending on where it is used.
 

Stability Issues

Sentiment score
7.9
SentinelOne Singularity Complete is praised for stability, effective performance, and reliable updates, with occasional third-party software conflicts.
Sentiment score
6.8
ThreatLocker offers stable endpoint protection, with minimal issues that are quickly resolved, enhancing reliability and performance for users.
This indicates room for improvement in stability when interacting with other solutions.
It has caused problems with interoperability between third-party tools, which could lead to entire servers crashing or specific tools failing.
Stability can be improved as there are times it goes down or requires management to adjust policies.
 

Room For Improvement

SentinelOne Singularity Complete needs console improvements, better integration, clear documentation, efficient updates, and enhanced automated threat responses.
ThreatLocker could enhance its platform with flexible training, user interface improvements, better integrations, and more comprehensive support.
The only thing that prevented the attack from succeeding was a free version of Malwarebytes.
It's challenging to prevent a user from manipulating their privileges or someone else's of others, and it's difficult to control what users can access at the organizational level.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
 

Setup Cost

SentinelOne Singularity Complete balances higher costs with robust endpoint protection, justifying prices of $5-$8 per endpoint monthly.
Enterprise users value ThreatLocker's cost-effective Zero Trust Platform for its comprehensive features, excellent support, and customizable tiered pricing.
They counted many of the instances and licenses as duplicates despite them only being alive once, which was frustrating.
I did not notice a significant increase in cost after adding SentinelOne.
The pricing is reasonable and normal.
 

Valuable Features

SentinelOne Singularity Complete offers robust security, automation, and integration, excelling in threat prevention and minimal disruption across platforms.
ThreatLocker offers mobile access, zero trust protection, granular control, and support, enhancing security and reducing management costs.
Their support team walked us through configuring the agent to handle other third-party tools properly.
The security aspect is the most valuable feature for me.
ThreatLocker's most valuable feature is its scanning capability, which executes all types of executable files.
 

Categories and Ranking

SentinelOne Singularity Com...
Ranking in Endpoint Protection Platform (EPP)
2nd
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
192
Ranking in other categories
Anti-Malware Tools (2nd), Endpoint Detection and Response (EDR) (3rd), Extended Detection and Response (XDR) (2nd)
ThreatLocker Zero Trust End...
Ranking in Endpoint Protection Platform (EPP)
12th
Average Rating
9.0
Reviews Sentiment
7.6
Number of Reviews
18
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th), Ransomware Protection (6th)
 

Mindshare comparison

As of December 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of SentinelOne Singularity Complete is 4.4%, down from 7.0% compared to the previous year. The mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Prince Joseph - PeerSpot reviewer
Reduces organizational risk, low on machine load, and helps prevent ransomware
The most important aspect of the solution is that the load on the machine is not very high. It doesn't take up battery resources. The solution prevents ransomware and other threats. So far, it is working brilliantly. The dashboards and UI are user friendly, as is the ability to configure as needed. It seems to have a lot more capabilities. The XDR capabilities, in particular, look very strong. We're currently looking into that. If we want to do integrations with third parties, we don't have very many challenges around that. The ability to ingest and correlate across our security solutions is very useful. It's impressive. The AI engine it has is excellent. It helps us consolidate our security solutions. While it does not allow us to reduce alerts per se, it does a good job of correlating. The way it's integrated into the SIM, it's working to the expectations we have. The solution helps free up people so that they can work on other tasks. We don't have to grow our team too much now. My security team is actually quite small - about five people. We all get more time to handle other tasks. We've noted that it does help reduce mean time to respond. We can identify events easier and those that are most critical are brought to the forefront. Previously, we were in the dark. Now we have so much more visibility. It's been a huge improvement. It's effectively helped to reduce organizational risk.
Roy Richardson - PeerSpot reviewer
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
824,052 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Manufacturing Company
7%
Financial Services Firm
6%
Government
6%
Computer Software Company
37%
Retailer
8%
Financial Services Firm
5%
Manufacturing Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. The ability to reverse damage caused by ransomware with minimal interruptions to...
Which is better - SentinelOne or Darktrace?
Which solution is better depends on which is more suitable specifically for your company. Darktrace, for example, is meant for smaller to medium-sized businesses. It is also a good option for organ...
What do you like most about SentinelOne?
The AI solution makes it easy for customers to detect and manage policies, as well as documents that help customers manage their platform.
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
I handle the technical aspects, while my manager deals with pricing. Although the pricing seems good, there have been inconsistencies in contract negotiations. What we are told during calls sometim...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker would benefit from incorporating an antivirus feature or comprehensive 24-hour log monitoring, a valuable enhancement for both business and enterprise-level users.
 

Also Known As

Sentinel Labs, SentinelOne Singularity
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

 

Sample Customers

Havas, Flex, Estee Lauder, McKesson, Norfolk Southern, JetBlue, Norwegian airlines, TGI Friday, AVX, Fim Bank
Information Not Available
Find out what your peers are saying about SentinelOne Singularity Complete vs. ThreatLocker Zero Trust Endpoint Protection Platform and other solutions. Updated: December 2024.
824,052 professionals have used our research since 2012.