I use SentinelOne Singularity Complete as our next-generation antivirus on our endpoint. I review detected malware and verify whether it is legitimate or a false positive. Additionally, we can control endpoints, such as correlating them or blocking specific activities on any endpoint. We also have visibility into what is happening, including what is installed, being installed, or uninstalled on endpoints.
Security Analyst at MPAC
Has a nice UI, a great hunting feature, and saves us time
Pros and Cons
- "The hunting feature is most valuable for detecting malicious or suspicious activity."
- "The way Singularity Complete handles blocking external mass storage is annoying because it is so difficult to unblock single endpoints."
What is our primary use case?
How has it helped my organization?
SentinelOne Singularity Complete can help reduce alerts, but we must first add exclusions based on our existing features to keep the false positive rate low.
SentinelOne has helped our staff save time investigating and handling incidents.
It has helped reduce our MTTD and our MTTR.
What is most valuable?
The hunting feature is most valuable for detecting malicious or suspicious activity.
What needs improvement?
The way Singularity Complete handles blocking external mass storage is annoying because it is so difficult to unblock single endpoints. We can only add a general rule to block everything, and we cannot add any exceptions. Additionally, Singularity Complete uses different names for endpoints other than the actual actions that will happen or be taken, such as quarantining a device. This is also confusing, as the wording used by Singularity Complete is slightly different from other endpoint security solutions and can be difficult at the start.
Buyer's Guide
SentinelOne Singularity Complete
September 2025

Learn what your peers think about SentinelOne Singularity Complete. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
869,832 professionals have used our research since 2012.
For how long have I used the solution?
I have been using SentinelOne Singularity Complete for almost three months.
What do I think about the stability of the solution?
Singularity Complete is stable.
What do I think about the scalability of the solution?
Singularity Complete is extremely scalable.
How are customer service and support?
Technical support is super helpful.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
The price of Singularity Complete compared to some of its competitors is competitive.
What other advice do I have?
I would rate SentinelOne Singularity Complete eight out of ten.
SentinelOne Singularity Complete has room to grow, but it is overall very good. It is a mature software product with an awesome UI. There are many options and actions available.
No maintenance is required from our end.
SentinelOne Singularity Complete is a straightforward, stable solution that is easy to learn.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Systems Administrator at a government with 201-500 employees
Is a lightweight solution, has a valuable dashboard, and saves us time
Pros and Cons
- "The management dashboard is the most valuable feature."
- "The most difficult part of using Singularity Complete is logging in, as they often update the management console."
What is our primary use case?
We use SentinelOne Singularity Complete as the antivirus for our computers.
We wanted a solution that could maintain the protection of our computers so we implemented SentinelOne Singularity Complete.
How has it helped my organization?
SentinelOne Singularity Complete is a lightweight application with a quick threat response.
Singularity Complete has helped reduce our alerts with prompt responses.
Singularity Complete has freed up several hours of our staff's time each week, allowing them to focus on other projects. They no longer need to manually monitor hundreds of computers, as they now have a single dashboard to manage them.
It has reduced our MTTD through prompt action taken against the vulnerability or threat.
It has also reduced our MTTR through quick notifications that allow us to respond within minutes.
Singularity Complete has helped us reduce our organizational risk.
What is most valuable?
The management dashboard is the most valuable feature.
What needs improvement?
The most difficult part of using Singularity Complete is logging in, as they often update the management console. I don't know if our accounts become disassociated or what the deal is, but if we don't log in within a certain amount of time, we have to go through a password reset or account reset process.
For how long have I used the solution?
I have been using SentinelOne Singularity Complete for around five years.
What do I think about the stability of the solution?
SentinelOne Singularity Complete is stable with no downtime.
What do I think about the scalability of the solution?
SentinelOne Singularity Complete is scalable.
How are customer service and support?
The technical support team is prompt.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
The price is fair for what we are getting.
What other advice do I have?
I would rate SentinelOne Singularity Complete nine out of ten.
SentinelOne is very mature. It's a lightweight application that does not waste a lot of resources, and the quality is definitely good.
Singularity Complete is a self-sustained standalone application that updates to the cloud. Every computer checks in and updates as needed.
I manage our future application deployments and ensure that Singularity Complete is automatically pushed out and kept up to date.
SentinelOne is a good overall security partner.
It's always worth testing out different solutions and finding the one that works for each organization. But as far as SentinelOne Singularity Complete goes, it's been an easy process for our organization and I recommend it to others.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
SentinelOne Singularity Complete
September 2025

Learn what your peers think about SentinelOne Singularity Complete. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
869,832 professionals have used our research since 2012.
Manager of Information Security at a recreational facilities/services company with 1,001-5,000 employees
Reduces alerts, offers deep visibility, and saves time
Pros and Cons
- "The deep visibility is really important for us. With it, we can really look deep into some of the incidents."
- "We did use the Ranger functionality. However, there was some scanning going on and it caused a lot of noise, so we had to disable it."
What is our primary use case?
We use it at our enterprise to protect all of our endpoints. We needed an EDR tool, and this product was one of the top options that we looked at at the time.
How has it helped my organization?
We definitely get a lot more insights into incidents. When we get an alert, we can go a lot deeper into the information and investigate.
What is most valuable?
The deep visibility is really important for us. With it, we can really look deep into some of the incidents.
Singularity's interoperability with other SentinelOne is okay. It does an okay job. We can tie it into some of our other tools.
The solution's ability to ingest and correlate across our security solutions is okay. We can tie it into messaging solutions so that we can get alerts directly rather than logging into the console.
It reduces alerts. There are not a lot fewer false positives. I'm not sure the percentage it has reduced, however in comparison to before, it is definitely less.
The product does save a lot of time and we are able to get to tasks and respond quicker. It's helped reduce our mean time to respond.
It's helped us save costs in some areas. It would be based on hours saved. While the solution itself is a little more expensive, operationally, it helps us reduce costs.
What needs improvement?
We did use the Ranger functionality. However, there was some scanning going on and it caused a lot of noise, so we had to disable it.
The remote console is currently an add-on. Having the remote console without having to pay a huge fee would be ideal. They could reduce the cost a lot.
There was an issue a few months ago where the agent kept getting shut off, however, now there's a newer agent and that's not happening anymore.
For how long have I used the solution?
I've used the solution for almost two years now.
What do I think about the stability of the solution?
The stability has gotten better and better over the last two years.
What do I think about the scalability of the solution?
The solution is deployed across 2,000 machines in four properties.
It can scale well. We keep deploying it further and it works.
How are customer service and support?
Technical support does a good job. I've never had to work with support a ton. They do a decent job.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We had previously used a few solutions, including FireEye and Endgame. We left Endgame when they got bought out shortly after we bought them and it felt stagnant.
How was the initial setup?
The deployment was pretty straightforward. We deployed it originally in a reduced state until we had an outline for a majority of machines when we could protect the environment better.
We had two or three staff members who handled the deployment.
There is some maintenance required. We do have to monitor and fix agents and occasionally update the product. There are two to three people who perform occasional maintenance duties.
What about the implementation team?
We set up the product ourselves.
What was our ROI?
We have witnessed an ROI, although I can't speak to the exact number or percentage.
What's my experience with pricing, setup cost, and licensing?
I don't have any visibility on the pricing.
Which other solutions did I evaluate?
We did evaluate other options. We looked into CrowdStrike and SentinelOne and maybe one other option, however, it wasn't considered very long. We demoed CrowdStrike and went with SentinelOne as it was more user-friendly and had a better flow. CrowdStrike felt thrown together and was hard to navigate.
What other advice do I have?
SentinelOne's ability to be innovative is good. They've done a good job. Over the last two years, the product has continued to improve, change, and add valuable features.
The quality of the product is good. It feels mature and is well-developed. I don't have any concerns with its technology.
They are a good strategic security partner. They are a growing company and one of the leading EDR tools in the space.
I'd rate the solution nine out of ten. I would recommend it to others.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Security Architect at a retailer with 1,001-5,000 employees
Indicators of compromise, such as hash files, IP addresses, and domain names are blocked for all endpoints with one click
Pros and Cons
- "It is purely cloud-based, meaning you don't need to have something installed, such as a server on-prem. You have cloud management and can access it from anywhere, with integration with SSO, with one click. It's also very lightweight."
- "Since SentinelOne Hologram was an Attivo Networks product acquired by Microsoft, I have to install a different agent on endpoints for that product. It would be better if the same SentinelOne agent could be used for both the EDR and deception technology."
What is our primary use case?
Initially, we had only detection and response on each endpoint where we installed the agent. Now, we are expanding from detection and response to action. For example, if it finds something on the endpoint, it will not only detect and report it, but it will also respond and block it or isolate the endpoint.
It's all about protecting our endpoints and devices, including servers, Windows and Mac machines, whether laptops or desktops.
How has it helped my organization?
As a security guy, I don't need to have a VMware or Windows expert help me deploy this environment because it's purely cloud-based.
We had Trend Micro with an on-prem server from which we were pushing updates on a daily basis. We have connectivity between our head office and regional offices, but if that connection was overutilized, those updates would not be pushed in a timely manner. Now we don't have that issue. A laptop, for example, just pulls the updates automatically, and they don't need to come through a congested connection.
Overall, it has reduced our risk by 50 to 60 percent.
What is most valuable?
It is purely cloud-based, meaning you don't need to have something installed, such as a server on-prem. You have cloud management and can access it from anywhere, with integration with SSO, with one click. It's also very lightweight. It provides granular control as it is cloud-based, and there is no on-prem hardware or software to manage.
It protects against malware, suspicious activities, and suspicious people on the endpoint itself. The endpoint can be a user machine, a server, or an IoT device.
Another feature I like is that when there are indicators of compromise, such as hash files, IP addresses, or domain names, you can add them straight away with one click, and, boom, everyone will have them blocked right away.
The detection is very good and very fast. Once we install it, files or malicious software that are installed on the system are quarantined or deleted right away. The response is also fast.
We have many old machines with outdated software that have been compromised, with malicious software installed on them. It detects all these issues, including that the software is not updated and that they have all these malicious files. It helps us identify those endpoints. All those machines are sent to be upgraded and to have things removed or installed—whatever actions are needed. And for servers that are running software for the business and that can't be upgraded on-the-fly, isolated, or shut down right away, we create an isolated network for them and give access only to the particular users who need them.
What needs improvement?
Since SentinelOne Hologram was an Attivo Networks product acquired by Microsoft, I have to install a different agent on endpoints for that product. It would be better if the same SentinelOne agent could be used for both the EDR and deception technology. I don't want to have to install an additional agent on all 5,000 of our endpoints. If the SentinelOne EDR agent could be used for both Hologram and SentinelOne, that would be ideal.
For how long have I used the solution?
It's been a year since we started using this product. We recently extended it to XDR for instant response. We have expanded with SentinelOne EDR.
What do I think about the stability of the solution?
It is very stable. So far, we haven't faced an issue.
What do I think about the scalability of the solution?
The scalability is a nine out of 10.
How are customer service and support?
The support is excellent.
As a strategic security partner they are a nine out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We tried CrowdStrike. The issue with it was that it was not compatible with older iOS and Windows OSes. We have some old servers in our data center that are now undergoing a migration process. On top of that, we have some Windows machines that are running on Windows 8, and it did not support them. We had to switch to SentinelOne since it supports those clients. CrowdStrike is also a very expensive solution.
Trend Micro is not smart; sometimes it's unable to detect malicious files.
SentinelOne is faster. It scans and detects issues and vulnerabilities on endpoints in real time. That's the main thing you look for when it comes to EDR.
How was the initial setup?
The initial deployment was straightforward and simple for us. We just needed to install the agent on the end-user machines, open communication to their cloud URLs through our firewalls, and do some initial configuration on the console with help from their team.
We have a hybrid structure, not only on-prem. We have services running in the cloud as well as on-prem. We have multiple locations across regions and in different countries.
It's not difficult to maintain since it's purely on the cloud. If there are updates, they notify us. That is the maintenance activity. They update our services. Once all the environments move to the cloud, we won't need to worry about maintenance anymore. It depends on the vendor; there's nothing much to do on our end. They push any end-user updates, or they make them available to us and we push them out from the console.
What about the implementation team?
It was not done in-house. We worked directly with SentinelOne support. They provided trial versions for two to three months and assigned SentinelOne engineers to help deploy it on some machines as a PoC. There were three or four people involved in total, including their engineers. After that PoC we bought the product.
What other advice do I have?
We have a SOC solution as well, and we are trying to integrate playbooks. With the SIEM solution, we are able to run multiple playbooks without issues. Using our proxy gateway and detection technology, we have pretty good options to create playbooks without any hard configuration.
The quality and maturity of the solution are excellent. I would recommend SentinelOne.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud Security Practice Head at Tech Mahindra Limited
It's a complete solution that detects threats in near real time, but it produces many false positives
Pros and Cons
- "SentinelOne gives us visibility into various high-level vulnerabilities on every gateway on the network. It helps us prevent vulnerable devices from being compromised. We primarily use Singularity for its EDR functions. We're happy with that."
- "Managing the alerts is a challenge. Singularity generates a lot of alerts and false positives."
What is our primary use case?
SentinelOne Singularity is our endpoint protection solution. It protects our endpoints against malware. It's integrated with our centralized log management solutions.
How has it helped my organization?
SentinelOne is helpful from an endpoint security perspective because it's a consolidated solution. We don't need any other product. SentinelOne has reduced our detection time significantly.
We can detect suspicious behavior in near real-time. It isn't 100 percent, but I would say 99 percent of the time, it detects threats almost instantly and notifies us. The solution has reduced our risks from an endpoint perspective by about 20 percent.
What is most valuable?
SentinelOne gives us visibility into various high-level vulnerabilities on every gateway on the network. It helps us prevent vulnerable devices from being compromised. We primarily use Singularity for its EDR functions. We're happy with that.
What needs improvement?
Managing the alerts is a challenge. Singularity generates a lot of alerts and false positives. While it speeds up our detection time, it takes us longer to respond because we have to do a follow-up analysis to weed out the false positives. A lot of time goes into determining whether it's a genuine threat.
For how long have I used the solution?
I have used SentinelOne Singularity for a year or so.
What do I think about the stability of the solution?
SentinelOne Singularity is a stable product.
What do I think about the scalability of the solution?
Singularity is scalable. We haven't had any issues so far. We have no plans to increase usage right now. If the number of users increases, we'll look at it.
How are customer service and support?
I rate SentinelOne support seven out of 10. The response isn't fast enough.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used Symantec antivirus but switched to SentinelOne for its EDR features.
How was the initial setup?
Deploying SentinelOne is straightforward. Rolling out agents across the endpoints takes time, but that's because of our company's internal procedures. We can start using it once the agents are deployed across all the systems. It took around three months or so.
What was our ROI?
We see a return in the form of increased endpoint security, but we aren't seeing cost savings or reducing the number of personnel. In fact, we need to increase resources on the SOC side because they are handling so many alerts. However, we get better visibility from the console compared to a traditional antivirus solution.
What's my experience with pricing, setup cost, and licensing?
I rate Singularity Complete four out of 10 for affordability. SentinelOne costs more than traditional antivirus solutions, but we get more out of it. It hasn't saved us any money, but it's an EDR solution, so we get a lot of value from it.
Which other solutions did I evaluate?
We also looked at CrowdStrike. The decision ultimately came down to cost. SentinelOne was the cheaper option.
What other advice do I have?
I rate SentinelOne Singularity Complete seven out of 10. It's a comprehensive, innovative solution that covers many of the network features and core antivirus functionality. It's a solid solution from a coverage perspective. The only thing that needs improvement is the false positive rate. If SentinelOne can address that, it would be excellent. My advice to new users is to have a team of people trained to use and manage the solution.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Assistant Manager at airtel
Easy to deploy with good reporting and good rollback features
Pros and Cons
- "The reporting part is awesome."
- "Email security should also integrate with it to get more visibility on it."
What is our primary use case?
It is used in my customer's companies. It handles incident management, firewall implementation, and device control.
What is most valuable?
The most valuable feature is the rollback.
Remediation is great.
The ranger feature for work devices is most useful.
The reporting part is awesome.
It is easy to deploy the product.
What needs improvement?
It should not limit itself to EDR. I need some other solutions to integrate into it. It should give us more visibility by integrating other solutions with it.
I want some other solutions like email security. Email security should also integrate with it to get more visibility on it.
Agent upgrades might cause some issues. Most of the time, an agent gets removed after it is not communicating with the server. After every three months, it will get automatically removed. That might cause an issue.
The solution is expensive. It is costlier than Trend Micro and Palo Alto XDR.
For how long have I used the solution?
I've used the solution for around six months.
What do I think about the stability of the solution?
The solution is stable. We've found the performance to be good. It's light. There are no bugs or glitches.
What do I think about the scalability of the solution?
We have 1500 users on the solution right now. It is pretty scalable.
How are customer service and support?
With technical support, I've got an immediate response, and when I log a ticket, I get good assistance.
Which solution did I use previously and why did I switch?
I had worked on Palo Alto XDR as well. However, the remediation is not so good. There is no option with the rollback as well. That might cause data loss during a ransomware attack.
I'm also aware of the Trend Micro solution.
How was the initial setup?
It's easy to set up and has a very lightweight agent. It's very easy to deploy.
The time it takes to deploy all depends upon the number of uses, the number of clients, which machines are there, et cetera. In the Ranger, you have options. If you have advanced features for deployment, Ranger deployment, it is easy.
What's my experience with pricing, setup cost, and licensing?
The solution is a bit pricey and they should look at the costs involved. You have to pay extra for certain features, such as the Ranger feature. Everything should be included in the subscription.
What other advice do I have?
We are partners.
It's a good solution as compared to others. In terms of MML features, it is fine.
I'd rate it eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
IT Manager at American Incorporated
The MDR service is convenient for a small team like ours
Pros and Cons
- "SentinelOne's managed detection response service Vigilance Respond is convenient for companies like ours with small IT teams. If something happens on the weekend, SentinelOne steps in and resolves the issue. It's a false positive 97% of the time, but at least they're resolved instead of hanging around for us to find on Monday."
- "Managing the false positives creates additional management overhead. The behavioral analysis engine might misinterpret real user behavior as malware. For example, a drafter was cleaning up a Revit folder and deleting 4,000 files. That looks like ransomware. The SentinelOne agent kicked his computer off the network."
What is our primary use case?
We're a construction company using SentinelOne for endpoint security with endpoint detection and response. SentinelOne covers all of our endpoints and servers. It protects everyone across the company, even those not actively using an AV.
How has it helped my organization?
SentinelOne's managed detection response service Vigilance Respond is convenient for companies like ours with small IT teams. If something happens on the weekend, SentinelOne steps in and resolves the issue. It's a false positive 97% of the time, but at least they're resolved instead of hanging around for us to find on Monday.
We have the Ranger feature for network scans, allowing us to pick up any new devices that show up on a network. That was especially useful for us when we shifted to working from home.
If two or more agents are in a remote network, they will scan the network and give you an inventory of the MAC addresses and device types they see. This is handy when you have a small office or someone working from home. We do not allow employees to bring their own devices, but people are plugging their company computers into their home network, exposing them to risks. The ability to report on connections in remote networks is handy.
What is most valuable?
SentinelOne's machine learning engine is purely behavioral. The engine will shut down anything that's bad, isolate the system from the network, and alert everyone. We had tremendous success with CylancePROTECT for over five years. Zero successful attacks. In 18 months in with SentinelOne, we've seen the same lack of drama. No endpoints have been compromised to the degree that it has negatively impacted our network.
What needs improvement?
Managing the false positives creates additional management overhead. The behavioral analysis engine might misinterpret real user behavior as malware. For example, a drafter was cleaning up a Revit folder and deleting 4,000 files. That looks like ransomware. The SentinelOne agent kicked his computer off the network.
We interrupted that process and then isolated his computer and the file server. It was somewhat disruptive in the middle of the day. At the same time, it was a perfect simulation of what ransomware would do, so it was reassuring that SentinelOne stepped up and said, "Nope!"
It was not a malicious process running that was detected. It was simply behavior he shouldn't have done. Now, our drafters know to co my team when they're going to do some file cleanup. The false positives are just inherent in just the large amount of poorly written software that's out there. Any competent antivirus is going to have a behavioral, heuristic engine looking at what's actually being done.
It might be something bad done by the software you use. We used a machine learning engine for five years. The Wire Hauser Corporation builds subpar software because they're supposed to be building lumber products. It triggered a false positive, that's about the only negative for any modern AV is just false positives.
In the future, I would like to see SentinelOne implement integrated patch management. It would be great to manage endpoint patching through SentinelOne. We're on our third patch manager in three years because they are lackluster. It would be nice to have a new patch management tool.
For how long have I used the solution?
I have been using Sentinel One for about a year and a half.
What do I think about the stability of the solution?
SentinelOne is stable and constantly improving. Today I did a demo of a new acquisition they made for Active Directory. Ranger is the product that scans networks. This is a new product from a company they bought.
They do automated scans of your Active Directory infrastructure to identify fixable problems and anyone trying to take advantage of the unfixable problems. They're improving their core product while adding new functionality and products that I'm interested in.
What do I think about the scalability of the solution?
SentinelOne is highly scalable. I know folks with 10 times the number of endpoints we have, and they're pleased with it. One fellow I know has 4,000 endpoints under management.
How are customer service and support?
I rate SentinelOne support nine out of 10. I wish our other vendors had tech support as good as SentinelOne. I can only think of one other vendor that possibly has better tech support, but the vast majority of software companies have sub-par tech support. Little goes wrong, but get a quick turnaround time when something comes up.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were using CylancePROTECT, one of the early innovators in machine learning next-gen AV. Then they added on an EDR component called CylanceOPTICS. CylancePROTECT was an outstanding product for us. It was extremely low overhead and highly efficient. It crushed it in the proof of concept and did an excellent job for us.
Blackberry acquired the solution in 2019, the last year of our three-year agreement. It was awful. Development essentially stopped. All of the intelligent people started leaving. I found out that some went to SentinelOne. It was clear my worst fears were realized: that Blackberry was going to screw up yet another good thing.
How was the initial setup?
I had prior experience with this kind of antivirus, so I thought setting up SentinelOne was very straightforward. We stood up three different products in the course of 60 days to do this test. I didn't think there was anything unusual or unexpected about setting it up. It's perfectly understandable if you know what you're doing.
We have automated tools for deploying software. The biggest problem was getting the old endpoint solution off and the new endpoint solution parked on top of it. We had a 30-day window to get it all done for 250 endpoints.
My IT group has four people, including me, but it's not hard to manage or deploy. It fits right within our normal imaging endpoints, so it's super-low overhead.
What about the implementation team?
We did the deployment in-house. I'm paranoid. I wouldn't let anybody touch our security software.
What's my experience with pricing, setup cost, and licensing?
We pay $30,000 a year for 275 endpoints. We're growing, so I plan to buy another 75 endpoints. There is still a year and a half left in my three-year subscription, so I'm going to increase my endpoint count by 30 percent.
I'm buying midterm. We're a little over our licensing right now—less than 10%—but we'll correct our device count and plan for future growth. We pay for additional managed detection and Ranger network scanning.
Which other solutions did I evaluate?
We started doing proofs of concept for a short list of candidates in October 2020 when things calmed down a little bit. In addition to SentinelOne, we were looking at Sophos Intercept X, and CrowdStrike Falcon, which I assumed would win the bake-off. I had every expectation that Falcon was going to be our new endpoint. SentinelOne was kind of a startup. CrowdStrike Falcon was number three. Our second choice would've been Sophos Intercept X.
We left behind traditional AVs like Symantec and Norton Antivirus in 2016. It's awful stuff. We would've been good with Intercept X or Falcon, but SentinelOne has just proven to be the right choice for what we're doing. I hope they don't get bought.
What other advice do I have?
I rate SentinelOne 10. It's an excellent next-gen AV with none of the signature-update nonsense. It'll kill anything that does something bad, which sometimes is an Adobe product, etc. False positives are expected in that situation, but it's not a problem.
If you're considering SentinelOne, devote time, money, and staff to a thorough proof of concept. If you don't test your use cases, You will regret it. Just assume it's going to be an exit project to do an endpoint security selection. Ignore Gartner's and the press. Don't pay attention to the big analysts. Read the peer reviews and the community feedback.
Do the heavy lifting with a proof of concept. If you think you're spending too much time on it, you're probably not spending enough. It's so important. Treat picking a product like you would any other big project.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Executive Director of Information Security and Compliance at a pharma/biotech company with 51-200 employees
Multi-feature, easier to use, flexible, and provides excellent technical support
Pros and Cons
- "SentinelOne Singularity Complete, together with SentinelOne Vigilance, is an EDR tool with capabilities such as these, which I found valuable: the dashboard that shows you all the information and the power to either manually or automatically quarantine issues or threats in the environment."
- "In terms of areas for improvement in SentinelOne Singularity Complete, it needs to give more straightforward directions or communication about detection or what has been detected."
What is our primary use case?
My company leverages SentinelOne Vigilance and SentinelOne Singularity Complete for managed SOC.
What is most valuable?
SentinelOne Singularity Complete, together with SentinelOne Vigilance, is an EDR tool, with capabilities such as these, which I found valuable: the dashboard that shows you all the information and the power to either manually or automatically quarantine issues or threats in the environment.
SentinelOne Vigilance is one of the feature sets of SentinelOne Singularity Complete as a whole, and my company found SentinelOne Singularity Complete a little bit easier to use and flexible; plus, it had several feature sets.
What needs improvement?
I've not been using SentinelOne Singularity Complete for a long time to have a lot of feedback on its areas for improvement, as my team is still learning the tool, but what comes to mind is the need for it to give more straightforward directions or communication about detection or what has been detected.
For how long have I used the solution?
We officially deployed SentinelOne Singularity Complete, including its feature set SentinelOne Vigilance, about three months ago.
What do I think about the stability of the solution?
SentinelOne Singularity Complete has been very stable, so it's an eight out of ten for me, stability-wise.
What do I think about the scalability of the solution?
SentinelOne Singularity Complete is a scalable solution, which is one of the reasons why my company uses it.
How are customer service and support?
I found the technical support for SentinelOne Singularity Complete excellent, especially in terms of communication. Support is nine out of ten for me.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Atos as our SIEM tool and wanted to replace it with a newer technology, so we're now using SentinelOne Singularity Complete.
How was the initial setup?
I'm involved in deploying SentinelOne Singularity Complete, and I found the process straightforward. My company is still going through with the deployment because of the ninety-day deployment model.
What about the implementation team?
I have people in my team assisting with SentinelOne Singularity Complete implementation.
What was our ROI?
I've seen ROI from SentinelOne Singularity Complete within a month after deploying the solution, mainly after my company started getting different alerts, which I was happy about.
What's my experience with pricing, setup cost, and licensing?
I found the pricing for SentinelOne Singularity Complete reasonable, which is one of the reasons my company went with it.
What other advice do I have?
SentinelOne Singularity Complete requires just a little bit of maintenance, as my team has to update agents and do some finetuning, but not too much.
My rating for SentinelOne Singularity Complete as a solution is eight out of ten.
My advice to people looking into using SentinelOne Singularity Complete is to ask for sample reports and processes to understand how SentinelOne would let you do it.
The company I work with is a SentinelOne customer.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Buyer's Guide
Download our free SentinelOne Singularity Complete Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Endpoint Detection and Response (EDR) Endpoint Protection Platform (EPP) Anti-Malware Tools Extended Detection and Response (XDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
IBM Security QRadar
Microsoft Defender XDR
HP Wolf Security
Cortex XDR by Palo Alto Networks
Elastic Security
Fortinet FortiClient
WatchGuard Firebox
Trellix Endpoint Security Platform
Huntress Managed EDR
Buyer's Guide
Download our free SentinelOne Singularity Complete Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between Carbon Black CB Defense, CrowdStrike, and SentinelOne?
- Which is better - SentinelOne or Darktrace?
- What do you recommend to choose when replacing Symantec EDR: SentinelOne or CrowdStirke Falcon?
- Cortex XDR by Palo Alto vs. Sentinel One
- Which solution do you prefer: CrowdStrike Falcon or SentinelOne Singularity Complete?
- Does SentinelOne have a Virtual Patching functionality?
- What is the biggest difference between EPP and EDR products?
- What is the difference between EDR and traditional antivirus?
- What is your recommendation for a 5-star EDR with low resource consumption for a financial services company?
- Which is the best EDR for a logistics company with 500-1000 employees?