SentinelOne Singularity Complete and ThreatLocker Zero Trust Endpoint Protection compete in the endpoint security market. SentinelOne appears to have an upper hand with its AI-driven threat detection and rollback capabilities, while ThreatLocker focuses on application control and network visibility.
Features: SentinelOne Singularity Complete provides a robust rollback feature for rapid threat recovery and advanced AI-driven behavioral analysis for detecting novel attacks. It offers comprehensive visibility into potential threats and detailed endpoint activity insights. ThreatLocker Zero Trust Endpoint Protection emphasizes stringent application allowlisting with ring-fencing capabilities to minimize threats proactively. It also provides an intuitive management dashboard for easy administration and real-time user activity monitoring.
Room for Improvement: SentinelOne users seek improved reporting features, machine learning refinement, and more detailed administration controls. There are also concerns about deployment complexities due to frequent updates. ThreatLocker users note network load issues during updates, seek enhanced allowlisting features for developers, and desire improved training and PSA system integrations.
Ease of Deployment and Customer Service: SentinelOne supports diverse deployment environments such as public and private clouds, on-premises, and hybrid models, allowing deployment flexibility. While customer service is generally satisfactory, some users cite delays for non-critical issues. ThreatLocker offers similarly flexible deployment options with quick and responsive customer support, receiving praise for ease of resolution and knowledgeable support teams.
Pricing and ROI: SentinelOne is a premium-priced solution but justifies the cost with substantial threat mitigation capabilities and reduced response times. It consolidates security functions, demonstrating ROI through improved manpower efficiency. ThreatLocker offers competitive pricing with clear value, fostering ROI by decreasing security incidents and operational costs. SentinelOne users value the reduced workforce requirements and enhanced security posture, and ThreatLocker users highlight its attractive pricing and adaptability as strengths.
The measurable benefits of using ThreatLocker include ensuring real-time protection of organizational resources and maintaining user authentication and protection levels to reduce risks.
They do a great job of figuring out the problem and pointing you to generic documentation or working with you to fine-tune a solution.
ThreatLocker's technical support process could be streamlined by reducing the number of steps required to reach a human agent.
It could be better, especially with response times.
The tool's built-in automation for deploying the agents works well for large infrastructures like mine.
It is scalable to an extent, depending on where it is used.
It has caused problems with interoperability between third-party tools, which could lead to entire servers crashing or specific tools failing.
Stability can be improved as there are times it goes down or requires management to adjust policies.
It's challenging to prevent a user from manipulating their privileges or someone else's of others, and it's difficult to control what users can access at the organizational level.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
They counted many of the instances and licenses as duplicates despite them only being alive once, which was frustrating.
The pricing is reasonable and normal.
Their support team walked us through configuring the agent to handle other third-party tools properly.
ThreatLocker's most valuable feature is its scanning capability, which executes all types of executable files.
SentinelOne Singularity Complete provides AI-driven threat detection and response with features like ransomware protection and rollback, offering endpoint protection with minimal system impact and deep forensic analysis.
SentinelOne Singularity Complete combines machine learning and artificial intelligence to offer robust endpoint protection. It delivers real-time insights and advanced threat detection through seamless integration with third-party tools, allowing for efficient endpoint management. With an emphasis on user-friendliness, it ensures reduced false positives. Room for improvement includes better integration options, enhanced reporting, and more precise analytics to tackle false positives. Users seek improved interoperability with systems and comprehensive support for legacy systems.
What are the key features of SentinelOne Singularity Complete?Organizations from industries like finance, healthcare, and technology deploy SentinelOne Singularity Complete to safeguard endpoints such as PCs, servers, and virtual machines. Equipped with EDR, it effectively replaces traditional antivirus systems and integrates with cloud technology for real-time security insights.
ThreatLocker Zero Trust Endpoint Protection Platform offers robust endpoint security through application control and allowlisting, safeguarding servers and workstations from unauthorized software execution.
ThreatLocker Zero Trust Endpoint Protection Platform provides extensive application control with features like ring-fencing and selective elevation, ensuring meticulous execution management. Offering learning mode and extensive support, it integrates threat detection and activity monitoring to enhance compliance, reduce costs, and bolster cybersecurity through alerts and approvals. Despite its strengths, there are areas for improvement in training flexibility, policy updates, and interface enhancements, along with challenges in handling non-digitally signed software. Deployed across environments, it works well with existing cybersecurity instruments for real-time threat prevention.
What are the top features of ThreatLocker?ThreatLocker Zero Trust Endpoint Protection Platform is widely implemented to safeguard IT infrastructures against unauthorized access and application use. In sectors where data security is paramount, this platform enables users to prevent unauthorized software installations and control device applications, ensuring real-time threat prevention and compliance with industry regulations.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.