What is most valuable?
It's pretty good. The best thing is it has a secure shell command that you can use to get into any endpoint and do some jobs. That's a pretty cool feature.
It's pretty much the same as similar typical solutions. It is a CrowdStrike, or SentinelOne, or Windows Defender. They do the same thing.
The pricing is pretty good.
What needs improvement?
It's probably not that top-notch like CrowdStrike or Microsoft Defender. However, it's okay, it's not bad.
The only problem I have is they don't manually review the threat files. That's the only thing I'm concerned about.
The support needs improvement. There are some limitations.
For how long have I used the solution?
I've used the solution for less than six months.
What do I think about the stability of the solution?
It is a very stable product. There are no bugs or glitches, and it doesn't crash or freeze. It is reliable. I'd rate it a nine out of ten.
No matter what software you use, you need to do some fine-tuning.
What do I think about the scalability of the solution?
The solution is scalable. You can pretty much deploy to anywhere.
How are customer service and support?
In terms of if we need to send them some actual threat, they cannot manually verify it. That's the limitation of the company. However, for Microsoft, or Symantec, or CrowdStrike, you can actually submit a threat file, then they can manually review it. That's the only thing I've found so far with SentinelOne. The support is not that good. Obviously, probably eventually, they will get it in one year or two years' time; however, right now, it's not there.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I've used CrowdStrike, Carbon Black, and Microsoft Defender as well.
SentinelOne, CrowdStrike, and Carbon Black do the pretty much same thing. It all depends on the money.
The good thing about Microsoft and CrowdStrike is they can detect the device based on the traffic they're coming from. This is one of the advantages you have. With SentinelOne, this is where they're lacking. For example, for Windows Defender, if you're using your phone, you can figure out it's coming from your phone, or as long as it's coming to your enterprise network, you will know where it's coming from. This is one of the things I could not find in SentinelOne. You can only define it once you deploy it. However, without a proper deployment, you can't actually see it. For the other technologies, even though you don't deploy them, you can actually have a good understanding of the entire fleet and what's happening. For example, all emails are going to Office 365, so that's another way you get an excellent picture of the inventory assets. That's a very good NDM thing that you got it for free. With SentinelOne, they're not to that level yet.
How was the initial setup?
The initial setup is easy. It's even simpler than, for example, Windows Defender.
The maintenance is very low. It depends on how big the organization is. The false positive rate is very low. Obviously, it should be maintained by a team. Regardless, if it's Windows Defender, CrowdStrike, SentinelOne, or Symantec, it has to be built and looked after by a soft team.
What's my experience with pricing, setup cost, and licensing?
For the functionality you get, the pricing is pretty good. I'd rate it four out of five in terms of affordability.
Which other solutions did I evaluate?
I was actually evaluating Windows Defender. I just want to check to see the selling points and the advantages of having Defender over Symantec products.
What other advice do I have?
I didn't do a technical job; I just evaluated the product. I don't have a partnership with SentinelOne.
I'd rate the solution seven out of ten. They are pretty good overall.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner