We primarily use the solution for endpoint protection.
CEO at ERG Solutions
Simple to install and manage, providing aggressive defense at a competitive price
Pros and Cons
- "SentinelOne is very simple to install and very simple to manage. It's very aggressive, so it does protection well, and it seems to be stopping attacks that other solutions cannot."
- "The ability to integrate this product with an antivirus solution would be welcome. Even consolidation with more security products, like Umbrella networking abilities etc. to provide more on this platform, that would be great."
What is our primary use case?
What is most valuable?
SentinelOne is very simple to install and very simple to manage. It's very aggressive, so it does protection well, and it seems to be stopping attacks that other solutions cannot.
What needs improvement?
The ability to integrate this product with an antivirus solution would be welcome. Even consolidation with more security products, like Umbrella networking abilities etc. to provide more on this platform, that would be great.
For how long have I used the solution?
We have been implementing this product for our customers for a few months now.
Buyer's Guide
SentinelOne Singularity Complete
February 2025

Learn what your peers think about SentinelOne Singularity Complete. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
We have implemented this product for companies ranging from 10 to 200 endpoints, with many hundreds of users and it has been fine with this volume.
How are customer service and support?
We get support from our local reseller in Israel and their support has been fine.
Which solution did I use previously and why did I switch?
We trialed an ESET product, but it didn't provide us with the solution we needed.
How was the initial setup?
The implementation time depends on the size of the network but it's usually very short, no more than a day or two.
What's my experience with pricing, setup cost, and licensing?
The pricing of the solution seems reasonable, we got a discount but it still seems reasonable. The licensing cost is $3 to $4 per endpoint and can be paid monthly or yearly, with the price changing according to commitment.
What other advice do I have?
I would rate this solution a nine out of ten.
I would say it is important to understand all the settings to deliver exactly what the customer requires.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Lead Security Analyst at SecurityHQ
Provides a better graph showing when the alert started, the process, the challenges, and the parameters; has an AI that segregates and categorizes events
Pros and Cons
- "The most valuable feature of SentinelOne is the good graph it provides. It has a specific page where it detects the recent attacks on other machines or the hackers, for example, group APT28 and all."
- "An area for improvement in SentinelOne is the search feature. You can't go beyond twenty thousand events, which ruins the task because it isn't enough when you're doing your investigation."
What is our primary use case?
Using SentinelOne isn't part of my daily tasks. My team only uses it when there's a detection, so the tool is only kept as a screenshot or wallpaper and is only used when there's an alert. It doesn't give us many alerts anyway.
My company uses SentinelOne for EDR purposes for alerts, detections, and patch deployment. For example, some clients ask my team to patch multiple devices and apply policies to the devices, so my team updates policies, applies patches, and updates machines per Windows and Mac updates.
My company also uses SentinelOne for EDR detections and investigations, including forensic purposes.
What is most valuable?
The most valuable feature of SentinelOne is the good graph it provides. It has a specific page where it detects the recent attacks on other machines or the hackers, for example, group APT28 and all. It shows the active group or predators in the market, the tactics the group uses, and the recent attacks the group performed.
My company even asked a particular client to onboard devices on SentinelOne because it's easier to graph the alerts. The tool can provide you with a better graph that shows when the alert started, the process, the challenges, and the parameters of the processes.
SentinelOne also has a knowledge base embedded in it. You have to visit the page to get the details.
I also like that you can see the activities performed for the alerts received from your end. You have a bunch of people working on SentinelOne, and you don't have to worry about not knowing who received and resolved the alerts because you can get information on the activities on the tool. You can view the actions on the alerts and who has taken action. This is a valuable feature of SentinelOne that's not usually provided on the other EDRs because it's unrelated to the investigations. I can see who recently closed or resolved a particular alert on SentinelOne because the name of the person who took action will appear on the activity page.
Another feature I like a lot about SentinelOne that I can't find in other EDR solutions is the AI segregation and categorization of events. You'll be directed to the logon events category if you're looking into logon-related events. If you're looking into network-related events, you'll be directed to another category, the appropriate one. Based on your search, the SentinelOne AI will segregate the results into categories. You can click on the category and view the categories related to your events. The segregated results then make it easier to do the investigations.
What needs improvement?
An area for improvement in SentinelOne is the search feature. It could be easier. For example, you can select the number of results that will be shown to you, such as two thousand events, and you can even go up to twenty thousand events for the search you've made, but you can't go beyond twenty thousand. You can only receive up to twenty thousand if you find login-related, detection-related, or process creation-related events. That's the limitation in the search feature of SentinelOne, which ruins the task because it isn't enough when you're doing your investigation.
The retention period of the tool also has room for improvement. The retention period is a time when you can patch up the logs, even older ones. Still, on SentinelOne, the retention period is only one week or one week up to twenty-eight days, and that period is insufficient, especially for a security breach. If a security breach occurs within the company, it could be six months to a year, so if you want to view the logs, you cannot go beyond the limit set by SentinelOne.
The retention period of the tool is way less than what other EDR solutions provide. SentinelOne and CrowdStrike come with a shorter retention period, which means you cannot go beyond one month when investigating the logs.
One month is the timeframe of the retention period, and one week is real-time, as scheduled by the vendor. For forensics purposes, the retention period is critical, so what would make SentinelOne better is a more extended retention period that lets you investigate logs. If you want to patch logs, you can directly call or reach out to the vendor who can provide you with the logs. If the vendor has no logs, you won't get the initial alert when the incident starts.
What I want to see from SentinelOne in its next release is a faster search. I also wish that the twenty thousand event limitation be removed.
For how long have I used the solution?
I've been using SentinelOne for nine to ten months now.
What do I think about the stability of the solution?
SentinelOne is a stable tool that never crashes. It's a good product.
Its stability is nine out of ten because, at times, the tool lacks robustness when searching. For example, if I want to search, it can take some time based on my ability to search. Searching on SentinelOne can be much faster because, search-wise, it could be a little laggy.
What do I think about the scalability of the solution?
The scalability of SentinelOne is much better than other tools, so it's a ten for me, scalability-wise.
How are customer service and support?
I haven't contacted the technical support for SentinelOne, but many of my colleagues had experience getting SentinelOne support. One case was about the retention period because a client had been compromised and needed more logs from SentinelOne, but the support team couldn't provide more logs as the retention period was too short.
Which solution did I use previously and why did I switch?
My company chose SentinelOne over other solutions because it's powerful in the areas of detection, flagging for alerts, and logs. The alert creation is stronger in SentinelOne, so my company went with this tool.
How was the initial setup?
The initial setup for SentinelOne was easy, and I manually performed it. It's easy to deploy a device onto SentinelOne. You have to run the agent, and the application, then the tool will be onboarded. It's that easy.
The deployment of SentinelOne hardly took me half an hour. Once you've learned how and executed the agent file on the machine, you'll start getting the logs. You'll test, configure, and collect the right resources and receive the logs.
What about the implementation team?
I implemented SentinelOne, so it's in-house.
What's my experience with pricing, setup cost, and licensing?
As a developer, I have no information on the pricing of SentinelOne.
What other advice do I have?
I'm using SentinelOne, the EDR solution.
SentinelOne is deployed on the cloud, probably the public cloud, though I wonder if it's private or public. It's on the cloud because it has many more features and doesn't use up many resources even when there's a high workload, and as a tool, SentinelOne performs very well. It may be on AWS or Azure, though.
Within the company, twenty people personally use SentinelOne daily.
My company is a partner of SentinelOne, so my team recommends it to clients, especially if clients require more detection and easy onboarding.
I'd tell anyone looking into implementing the tool that it's fun to learn and use. You can use it without needing many clicks to isolate the machine or perform your required activities. One of the best features of SentinelOne is that it has minimal mouse actions. For example, when you click on a machine, you'll get the hyperlink that shows you the machine details, the uptime, when it was first and last seen, the memory, and all the machine details. You get the details in one location, such as the applications installed on the machine, the network-related configurations of the machine, and the machine processes. You won't get as many features from other EDR solutions. You can isolate the machine, repair and update the machine, update the knowledge base and software, and onboard a particular device on SentinelOne. The tool has many more features. It's a good tool.
My rating for SentinelOne is nine out of ten. Still, if the twenty-thousand event limitation is removed, then that's the time I'd give the tool a score of ten because if there's no limit set, then you can get all process details related to your investigation.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
SentinelOne Singularity Complete
February 2025

Learn what your peers think about SentinelOne Singularity Complete. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
Information Technology Security Specialist at infoark
Automatic update alerts, with minimal computer resources consumed, and is easy to use
Pros and Cons
- "The initial setup is very straightforward and easy."
- "There are features that I would like them to add. They have little to do with endpoint protection, but if they could add encryption and DLP on, it would make it even better."
What is our primary use case?
I use it for company computers in reference to end-point protection scanning for malware, hunting for malware on the network, and on the devices.
How has it helped my organization?
One is the behavioral engine and the AI are both built into the agent, so it doesn't need the internet.
What is most valuable?
The interface is good and it is easy to use. The engine that they use to look for malware and for viruses is very good.
What needs improvement?
There are features that I would like them to add. They have little to do with endpoint protection, but if they could add encryption and DLP on, it would make it even better.
For how long have I used the solution?
I have been working with SentinelOne for just over a year now.
What do I think about the stability of the solution?
Yeah, it is stable. It does not use a lot of computer resources, even though the engine is built into the agent. If there are new updates, it alerts you when the updates are there and need to be installed. SentinelOne is an efficient solution.
What do I think about the scalability of the solution?
Yes, it is scalable.
How are customer service and support?
I have not had any issues that I needed to talk to customer support about.
How was the initial setup?
The initial setup is very straightforward and easy. Once you install it, auto-updates are initialized. When you put in watches, you are searching for items, you need customization, and you add or remove rules, which is quite easy.
What about the implementation team?
I use in-house implementation.
What was our ROI?
We are seeing a return on our investment.
What's my experience with pricing, setup cost, and licensing?
The licensing is okay. I don't think it is bad. Depending on which one you get, I think it is fifty dollars for each user annually. The more users you have, the cheaper it is.
Which other solutions did I evaluate?
I use all security tools from SIMS to DAMs, to DLP solutions, firewalls, etc.
What other advice do I have?
For me, the experience has been very good. I would rate SentinelOne a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Head of Information Technology at a healthcare company with 201-500 employees
Responsive support with complete and total protection
Pros and Cons
- "It has saved us from a couple of ransomware attacks already."
- "If they can extend their product further on the DLP side of it so that I don't have to have another agent run exclusively for DLP production, that would be ideal."
What is our primary use case?
We primarily use the solution for security. It’s for endpoint and response detection.
It is primarily protecting all my servers now, and most of the end users are connected to SharePoint OneDrive and emails, which are already taken care of from Microsoft through endpoint security. I don't have to really worry too much from the end-user point of view. Still, in case if they ever happen to click on any of the phishing emails or malicious files, it will block their computer immediately without even coming through the server level.
How has it helped my organization?
It is covering one of my IT audit purposes - not only from the protection of the data and doing security through my network but also addresses most of the compliances from an audit point of view.
What is most valuable?
It is very effective so far. It has saved us from a couple of ransomware attacks already. I'm very impressed.
They support most of the operating systems that we use - not just Windows or not just prominent versions of Apple or Linux. I have various versions that support almost all the operating systems in the market.
If there is any suspicious activity, they just straight away block the computer from further infection. The moment we call the support, they investigate everything in detail. Only then will they release it - if they find it is okay. During their own verification, they’ll see how it works and will not give access to the IT admin or to me. Only they will enable it when they are sure it is safe. The responsibility is taken off of us and onto them completely.
It is all automated. If any user or any Sentinel client is having an issue, the email alert will come, and we'll have to just look at it.
It's complete and total protection.
What needs improvement?
I cannot speak to any missing features. It has what we need.
If they can extend their product further on the DLP side of it so that I don't have to have another agent run exclusively for DLP production, that would be ideal.
For how long have I used the solution?
I’ve been using the solution for a bit more than six months now.
What do I think about the stability of the solution?
The solution is absolutely stable. There are no bugs or glitches.
What do I think about the scalability of the solution?
I haven't seen all the features. However, I will probably start looking at it since it has saved us from a couple of cyber attacks. Probably I will take a walk-through again from the technical team to understand if there are any further scalable options to implement on my infrastructure.
We are using it for service only right now. However, we have decided to scale up for all the end users.
How are customer service and support?
Support is very good, and their help is immediate.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I'm still using VDAT on Windows endpoints. We use Defender. Windows is comprehensive as well. Most Windows users with personal PCs have Windows Defender, and it works well. That said, I was not sure and still am not sure how well it will protect the servers if there is any ransomware attack on the network.
How was the initial setup?
It’s very easy to implement the solution. It’s not complex at all. I’d rate it a five out of five in terms of ease of implementation.
For me to implement across eight servers, it took maybe a day. Two days at a maximum.
It’s on the cloud and therefore doesn’t require maintenance.
What about the implementation team?
They did the implementation. However, I installed the agent. Everything and the configuration were already set. They just guided me through how exactly it was set up. They did the walk-through of the complete product, and that's it.
What was our ROI?
We’ve already seen a 100% ROI even after just a few months. I’d rate it five out of five.
What's my experience with pricing, setup cost, and licensing?
We pay to license every year. However, I’m not sure of the pricing. They might cost $100 each. It’s reasonably priced. I’d rate it four out of five in terms of affordability.
Which other solutions did I evaluate?
I did compare it to other solutions and found this product to be more compatible with more operating systems.
What other advice do I have?
We are using the latest version of the solution.
I highly recommend the solution to others.
We’re just customers.
I’d rate the solution nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Chief Information Security Officer at Lone Star National Bank
A good choice based on the cost and the services it delivers
Pros and Cons
- "It is a good endpoint solution. That's the reason we chose it. We looked at other solutions, such as CrowdStrike, and based on the cost and the services it delivers, it was the better choice."
- "I would like to see a better control panel for the managed service side of it."
What is our primary use case?
It is an endpoint solution. It is for our workstations and other devices to alert us to any kind of malware threats that might be lurking.
In terms of deployment, it is through a managed service.
What is most valuable?
It is a good endpoint solution. That's the reason we chose it. We looked at other solutions, such as CrowdStrike, and based on the cost and the services it delivers, it was the better choice.
What needs improvement?
I would like to see a better control panel for the managed service side of it.
For how long have I used the solution?
We have been working with it for about six to eight months.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
As far as I know, it is easily scalable.
How are customer service and support?
It is through a managed service.
How was the initial setup?
It takes a little time to put it in.
What other advice do I have?
It is a good solution. You just need to check out the managed service part of it.
I would rate it a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Head of Cybersecurity at Technovage Solution
A valuable autonomous platform but the use case is valid mostly for the cloud deployments
Pros and Cons
- "The autonomous platform is valuable because we can separate false positives and negatives."
- "There is not much focus on the on-premise solution as the license cap is so huge for small and medium-sized institutions."
What is our primary use case?
Our primary use case for the solution was covering all the endpoints, including servers. We also added the Kubernetes nodes with the CI/CD platform, which covered end-to-end features that we need to fill the required security controls.
How has it helped my organization?
The solution has benefited us by monitoring most of the activities to endpoints that we control over the USB and the browser monitoring. Activity monitoring was also done through the XDR platform. We had a couple of incidents where there was zero-day malware planted inside the Lenovo firmware upgrade, which we were able to capture through the auto-detection feature.
What is most valuable?
The autonomous platform is valuable because we can separate false positives and negatives and update the database during certain types of automation.
What needs improvement?
The solution can be improved by ensuring threats are being mitigated on the platform autonomously and by considering introducing an on-premises solution with affordable pricing for government institutions.
There is not much focus on the on-premise solution as the license cap is so huge for small and medium-sized institutions.
For how long have I used the solution?
We have been using the solution for approximately one year.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable and can use the facility to do the same license, which could be used for Kubernetes. So it is the same license but different scales which we have utilized. Approximately 1,000 users are using the solution.
How are customer service and support?
Our team has had a good experience with customer service and support.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup was straightforward. Our team has also done an equally simple upgrade. It took approximately 24-48 hours.
What was our ROI?
I would say that there could be better ROI if we tend to use more than 500 licenses under a multi-cloud solution. But it would not be the same for an on-premise solution.
What's my experience with pricing, setup cost, and licensing?
The license for the solution is quite expensive, but it is cheaper than CrowdStrike. However, if you consider specific organization requirements, it has covered them all, so we might move to CrowdStrike after evaluating three years. Then, we assess the kind of tool in line with our requirements and implement the latest and the best tool in the quadrant, and currently, in Cambodia, CrowdStrike and TrendMicro are more popular.
What other advice do I have?
I rate the solution a seven out of ten. The solution is good but can be improved by ensuring threats are being mitigated on the platform and considering reducing the license cap for an on-premises solution.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Principal Forensics Lead at Dotcom Security
The most valuable features are Deep Visibility, Remote Script Orchestration, and Ranger
Pros and Cons
- "The solution is extremely stable."
- "The solution can improve by adding more granular firewall capabilities."
What is our primary use case?
The primary use case of the solution is cybersecurity. The solution provides endpoint protection against direct threats and insider threats.
What is most valuable?
The most valuable features are Deep Visibility, Remote Script Orchestration, and Ranger.
What needs improvement?
The solution can improve by adding more granular firewall capabilities. I would like to see an interface where I can in one view change the security posture of all groups with one click. I would like to have a listing of all the groups and then apply what's relevant to all the groups at once.
For how long have I used the solution?
I have been using the solution for one year.
What do I think about the stability of the solution?
The solution is extremely stable.
What do I think about the scalability of the solution?
The solution is scalable.
How are customer service and support?
The tech support is brilliant.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is straightforward. It takes about four weeks to deploy.
What about the implementation team?
The implementation was done in-house.
What was our ROI?
The ROI is good. Once you go through the stabilization phase and get to know and understand the customer's environment and configure accordingly to what the customer needs, the return is there immediately.
What's my experience with pricing, setup cost, and licensing?
The license is paid annually and is competitive. There are features that are not included in the licensing cost but it does include Vigilance and STAR.
What other advice do I have?
I give the solution a nine out of ten.
On average, once the implementation phase is complete the solution only requires two people to maintain it.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Senior Manager INFOSEC AND Risk ASSESSMENT Engineering at Atlas Systems
Beneficial ransomware blocking, simple deployment, and easy to use
Pros and Cons
- "SentinelOne Singularity has hundreds of features. The most valuable feature of the solution is the ease of use and threat control."
- "The training for SentinelOne Singularity should be free. The solution has a lot of features but we do not know how to use them all. The moment someone purchases the solution they should contact them and provide them with a feature session on how to use the features."
What is our primary use case?
We use SentinelOne Singularity for cybersecurity. For example, ransomware protection. It protects our network against the latest cybersecurity threats, continuous monitoring, and real-time checks of our network.
There are many things that we consider in a solution, such as how often it updates and does patches, and what issues are there in the network or on the desktop or OS. If any patch is missing, it should inform me and send me CVSS and CVSE scoring of my threat perspective.
What is most valuable?
SentinelOne Singularity has hundreds of features. The most valuable feature of the solution is the ease of use and threat control.
What needs improvement?
The training for SentinelOne Singularity should be free. The solution has a lot of features but we do not know how to use them all. The moment someone purchases the solution they should contact them and provide them with a feature session on how to use the features.
When we connect the solution to our patch management system they should explain to us how to do it. Additionally, it should be notifying me what patch is missing in my system.
For how long have I used the solution?
I have been using SentinelOne Singularity for approximately six months.
What do I think about the stability of the solution?
SentinelOne Singularity is stable.
What do I think about the scalability of the solution?
We have approximately 250 users using this solution in my organization.
How are customer service and support?
I have used the support team from SentinelOne Singularity.
I rate the support from SentinelOne Singularity a four out of five.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used two solutions for the comparison, CrowdStrike and McAfee. We did do tests before going to SentinelOne Singularity in many areas, such as ease of use, technical comparison, scanning capabilities in terms of cybersecurity perspective, and ransomware protection. Ransomware blocking is a better feature in SentinelOne Singularity.
We have a team of people who have a set of parameters that we use to scan all these tools. They perform comparisons on each and every aspect and SentinelOne Singularity scored better.
How was the initial setup?
The deployment of SentinelOne Singularity is straightforward and very easy. The whole process of deployment took four hours.
What's my experience with pricing, setup cost, and licensing?
When it came to the price compared to other solutions we tested, SentinelOne Singularity gave us the price of our expectations whereas CrowdStrike could not.
What other advice do I have?
First-time users of this solution should prioritize what they want to protect, and establish if they have the expertise to maintain it. The solutions don't require any high-end expertise to be deployed or maintained but a normal IT system administrator is needed to do it.
I would recommend this solution to others.
I rate SentinelOne Singularity a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free SentinelOne Singularity Complete Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Product Categories
Endpoint Detection and Response (EDR) Endpoint Protection Platform (EPP) Anti-Malware Tools Extended Detection and Response (XDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
Cisco Secure Endpoint
Microsoft Defender XDR
IBM Security QRadar
Elastic Security
Intercept X Endpoint
Trend Vision One Endpoint Security
Kaspersky Endpoint Security for Business
HP Wolf Security
Check Point Harmony Endpoint
Trend Vision One
Buyer's Guide
Download our free SentinelOne Singularity Complete Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between Carbon Black CB Defense, CrowdStrike, and SentinelOne?
- Which is better - SentinelOne or Darktrace?
- What do you recommend to choose when replacing Symantec EDR: SentinelOne or CrowdStirke Falcon?
- Cortex XDR by Palo Alto vs. Sentinel One
- Which solution do you prefer: CrowdStrike Falcon or SentinelOne Singularity Complete?
- Does SentinelOne have a Virtual Patching functionality?
- What is the biggest difference between EPP and EDR products?
- What is the difference between EDR and traditional antivirus?
- What is your recommendation for a 5-star EDR with low resource consumption for a financial services company?
- Which is the best EDR for a logistics company with 500-1000 employees?