Try our new research platform with insights from 80,000+ expert users
System Engineer at a tech services company
Reseller
It has provided overall endpoint status visibility
Pros and Cons
  • "SentinelOne’s Rollback is its best feature."
  • "They could add “right click>scan” where most users were trained to do so in handling flash drives."

How has it helped my organization?

Before it was a challenge for us to know who had an existing endpoint issue or who had the most attacks within the corporate network. Since SentinelOne was introduced, it has provided overall endpoint status visibility for us. Giving us the ability to easily pinpoint endpoints which had the most attacks and respond at a faster rate.

What is most valuable?

SentinelOne’s Rollback is its best feature. No solution can ever provide a 100% protection, but their rollback feature closes this gap in endpoint security giving end users a ray of hope in the event of a worst case scenario endpoint breach, especially in ransomware attacks.

What needs improvement?

They need to improve their UI and the way they show that the scanning is running on the endpoint. Sometimes users wanted to see whether their AV is working via visual context.

They could add “right click>scan” where most users were trained to do so in handling flash drives.

Also, add remote code execution via the management console, application control, device control, and all other common features found on the legacy antiviruses. This would help administrators to fully shift from legacy to Next Gen EPP without sacrificing usable features.

What do I think about the stability of the solution?

There have been a few cases where the agent cannot report to the management console, thus this requires a manual restart of the agent via a command prompt.

Buyer's Guide
SentinelOne Singularity Complete
February 2025
Learn what your peers think about SentinelOne Singularity Complete. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

What do I think about the scalability of the solution?

There are no problems with scalability, I could say that the product is easily scalable, since it is not limited to a physical server.

How are customer service and support?

The technical support is quick and very helpful. They often response within the day or by the next business day.

Which solution did I use previously and why did I switch?

As of now, SentinelOne still serves as an augmentation for our existing AV, but some of our devices are now using it as their sole endpoint protection.

How was the initial setup?

The setup is very easy and straightforward. It is just like installing an ordinary program and it automatically reports back to the management console.

What's my experience with pricing, setup cost, and licensing?

The price for it is very competitive compared to other Next Gen EPP. You can really get a great value for it when it is integrated with EDR.

Which other solutions did I evaluate?

No, since we already had experience with other products. As of today, we have tested one of its competitor using AI, but their overall protection still cannot be compared to how SentinelOne protects your endpoint. 

What other advice do I have?

They have an impressive product.

Understand how endpoint protection technologies work, since they do not rely on signature databases anymore. Also, follow deployment guidelines, such as initially deploying it in their production environment using a monitor only policy and giving the agents maturity of at least one to two weeks to allow the management console to build a solid behavior base for their environment.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user768165 - PeerSpot reviewer
Account Director
Reseller
The solution can search for hidden and dormant threats on encrypted traffic in your environment
Pros and Cons
  • "The solution can search for hidden and dormant threats on encrypted traffic in your environment."
  • "Deployment strategy for large organizations that do not use active directory (AD)."

What is most valuable?

If I am breached, they will pay the ransom on my behalf.

Cybercrime is growing in the world of technology, the defense in today’s world has no accountability. If breached, all that is said is that it is zero-day, and you still pay license fees to those vendors. The solution can search for hidden and dormant threats on encrypted traffic in your environment.

How has it helped my organization?

With automation, the time wasted on malware, like ransomware, is dealt with on a scale where everything is centralized. The IT Technician does not have to wait for a user to bring the machine to IT, as all they need is an active internet connection.

What needs improvement?

  • Deployment strategy for large organizations that do not use active directory (AD).
  • Windows updates have not been done on the client side, so minimum requirements stop the installation.

For how long have I used the solution?

One year.

What do I think about the stability of the solution?

None.

What do I think about the scalability of the solution?

None.

How are customer service and technical support?

Excellent, they have customized reports on threats in our environment that we do not have knowledge of.

Which solution did I use previously and why did I switch?

Yes, Sophos, I switched because SentinelOne does more things and guarantees against ransomware and can find hidden threats that other solution could not find.

How was the initial setup?

It is both straightforward and complex to install.

Machines on Windows 10 are easy and seamlessly installed.

Users machines that are not updated require updates to be done first before the solution can be installed.

What's my experience with pricing, setup cost, and licensing?

Spend money on the security for the endpoint. That is where the data lies and where hackers try an attack, not the network or firewalls.

Which other solutions did I evaluate?

Sophos, AVG, Avast, McAfee, Kaspersky, and ESET.

What other advice do I have?

Ask about accountability for hidden and dormant threats that could be in your network.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller and Platinum partner of the solution through Cyber Intelligent Systems.
PeerSpot user
Buyer's Guide
SentinelOne Singularity Complete
February 2025
Learn what your peers think about SentinelOne Singularity Complete. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
reviewer1807851 - PeerSpot reviewer
Student at a university with 1,001-5,000 employees
Real User
Scalable, with an easy environment to work in, however needs some initial stability improvements
Pros and Cons
  • "Sentinel One has improved our organization by protecting the environment we are working in."
  • "We had some stability issues when we started working with SentinelOne."

How has it helped my organization?

Sentinel One has improved our organization by protecting the environment we are working in.

What needs improvement?

We had some stability issues when we started working with SentinelOne. 

For how long have I used the solution?

I have been using Sentinel One for one year now.

What do I think about the stability of the solution?

Initially, there were a lot of issues that kept popping up. Now it has become stable.

What do I think about the scalability of the solution?

It is definitely scalable. We have around eight to ten thousand servers.

What other advice do I have?

I would rate SentinelOne a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Gbemisola Osunrinde - PeerSpot reviewer
Service Assurance Executive at Infoprive
Real User
Excellent auto-rollback feature
Pros and Cons
  • "SentinelOne's auto-rollback feature is the most valuable."
  • "SentinelOne's phishing feature could be improved."

What is our primary use case?

I use SentinelOne to protect against ransomware attacks, validate incoming emails, and ensure websites don't have any malicious coding.

What is most valuable?

SentinelOne's auto-rollback feature is the most valuable.

What needs improvement?

SentinelOne's phishing feature could be improved.

For how long have I used the solution?

I've been using SentinelOne for around five years.

What do I think about the stability of the solution?

SentinelOne is stable and reliable.

What do I think about the scalability of the solution?

SentinelOne is easy to scale.

How are customer service and support?

SentinelOne's technical support is helpful and competent.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup was straightforward and completed within a day because we had run a POC with them to understand the environment and had all the information we needed. I would rate the setup process 3.5 out of five.

What about the implementation team?

We did the implementation in-house with the support of SentinelOne engineers.

What other advice do I have?

I would give SentinelOne a rating of eight out of ten.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
reviewer1947543 - PeerSpot reviewer
Director Information Technology at a wellness & fitness company with 201-500 employees
Real User
Effective detection capabilities, scalable, and reliable
Pros and Cons
  • "The most valuable features of SentinelOne are the endpoint detection of threats, and it does not only rely on signatures for detection."
  • "SentinelOne could improve by creating an autopilot or automated way to roll out the solution more efficiently which would be helpful."

What is our primary use case?

We are using SentinelOne for an endpoint view of the corporate network.

What is most valuable?

The most valuable features of SentinelOne are the endpoint detection of threats, and it does not only rely on signatures for detection.

What needs improvement?

SentinelOne could improve by creating an autopilot or automated way to roll out the solution more efficiently which would be helpful.

For how long have I used the solution?

I have been using SentinelOne for approximately one year.

What do I think about the stability of the solution?

SentinelOne is stable.

I rate the stability of SentinelOne a five out of five.

What do I think about the scalability of the solution?

The scalability of SentinelOne is not a problem. These solutions can easily host up to 10,000 endpoints if not more, and we have 500. We do not have an immediate need to scale, but it is not an issue. As the company grows, the company will increase the usage of the solution.

How are customer service and support?

I am satisfied with the support from SentinelOne.

How was the initial setup?

SentinelOne is not too difficult to set up. The full deployment took a couple of months. The lengthy installation was caused by the fact that many people are remote working and we had 500 systems to install the solution on.

What about the implementation team?

We did our own deployment of SentinelOne. We used three to five people for the deployment.

What other advice do I have?

I rate SentinelOne an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Just Asking - PeerSpot reviewer
Owner at FirewallHire.com
Real User
Quick and easy to deploy with good performance
Pros and Cons
  • "It's quite scalable."
  • "It is an expensive product."

What is our primary use case?

We primarily use the solution for endpoint detection.

What is most valuable?

The solution works well in general.

It's a small size and offers an easy deployment. It's very quick to deploy.

The solution is stable.

It's quite scalable.

What needs improvement?

Every site has its own key. I'm not sure how I can implement the key for the setup package. Therefore, with every installation, I need to do it manually and put on the site keys.

It is an expensive product. They could work on lowering the price a bit.

For how long have I used the solution?

I've used the solution for one year.

What do I think about the stability of the solution?

It is stable and reliable. There are no bugs or glitches. It doesn't crash or freeze.

What do I think about the scalability of the solution?

The solution is quite scalable.

How was the initial setup?

The initial setup and deployment are easy. I can get it up and running in five minutes.

What's my experience with pricing, setup cost, and licensing?

The cost is a bit high. It's around $8 per client per month.

What other advice do I have?

We are partners. We are using the latest version of the product.

I'd recommend the solution to others. We really like it in general.

I'd rate the solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Managing Member at Pender & Associates
Real User
100% Reliable with fully autonomous threat mitigation and real-time ransomware file encryption roll back, without human intervention.
Pros and Cons
  • "Our clients have been able to survive a ransomware attack without even knowing that they had had files encrypted and automatically rolled back - even their Point of Sale (POS) system did not miss a beat and the business continued as normal without interruption."
  • "All is good for now, but we cannot rest, and continuous development - in particular with regard to the areas of automation, machine learning, and artificial intelligence - is required to keep ahead of the cybercriminals."

What is our primary use case?

The product is used to provide cybersecurity protection to SMBs predominantly in the financial, manufacturing, and retail industry as well as private individuals.

SentinelOne is key in achieving compliance with the General Data Protection Regulation (GDPR) in the European Union and the Protection of Personal Information (POPI) Act in South Africa.

Resolving ransomware encrypted servers or personal computers is costly to the customer, both in repair costs and loss of business due to downtime. In addition, the customer may suffer reputational damage if any of its customer data is compromised. 

How has it helped my organization?

Our clients trust us to protect their IT systems and data. 

We use SentinelOne because it has proven itself and has never been breached. It offers us a 100% protection record and our company reputation stays intact.

Resolving ransomware encrypted servers or personal computers is both costly and time consuming to both the customer as well as the service provider - protecting against these attacks is a win-win for all.

The SentinelOne portal dashboard provides a good overview of all the sentinels deployed and offers quick access to review and resolve affected sites and endpoints

What is most valuable?

The most valuable feature is that it works and is reliable. 

Other solutions I have researched have all been breached, and as far as I can see, SentinelOne is the only one that has never been breached. It provides fully autonomous threat mitigation and ransomware file encryption roll back in real-time without human intervention.  

Our clients have been able to survive a ransomware attack without even knowing that they had had files encrypted and automatically rolled back - even their Point of Sale (POS) system did not miss a beat and the business continued as normal without interruption.

What needs improvement?

SentinelOne's ongoing updates and rate of technology improvments are adequate for now, and have kept SentinelOne ahead of the cyber criminals, but we cannot rest, and continuous development - in particular with regard to the areas of automation, machine learning, and artificial intelligence - is required to stay ahead of the cyber criminal techniques and exploits.  The "false positive" detection rate could be improved, if possible, but this should not increase the risk of the endpoint being breached.

For how long have I used the solution?

I've used the solution for over 2 years.

What do I think about the stability of the solution?

The stability is excellent.

What do I think about the scalability of the solution?

The scalability is excellent.

How are customer service and technical support?

The customer support has been okay.

Which solution did I use previously and why did I switch?

I did not use a different solution previously.

How was the initial setup?

The initial setup is straightforward. 

What about the implementation team?

We are able to handle implementations in-house.

What's my experience with pricing, setup cost, and licensing?

If you are an end-user you should procure the service through a Managed Cyber Security Systems Provider.

Which other solutions did I evaluate?

Yes, I have looked into ESET, Crowdstrike, Cylance, Webroot, and many others.

What other advice do I have?

Contact me on cybersec[at]global[dot]co[dot]za

Disclosure: My company has a business relationship with this vendor other than being a customer: We are a managed IT and cyber security services provider and deploy SentinelOne to our customers to as part of the cyber security protection service.
PeerSpot user
Rick Bosworth S1 - PeerSpot reviewer
Rick Bosworth S1Cloud Security (CNAPP, CSPM, CWPP) at SentinelOne
Top 20Real User

Thank you, Steve, for your thoughtful review.  You might be pleased to know that SentinelOne have a thriving enterprise customer base, including several highly recognizable global and regional brands.  If I may be of service, please reach out.  Cheers, Rick

ITgov9887 - PeerSpot reviewer
IT Security Manager at a tech company with 1,001-5,000 employees
Real User
Machine learning feature enables us to identify viruses but the reporting needs improvement
Pros and Cons
  • "In the past, we were not able to identify a few viruses, but now we are able to identify them because of the machine learning feature."
  • "The reporting needs improvement and I would like to see a more granular level of administrative privileges."

What is our primary use case?

We use it for antivirus.

How has it helped my organization?

In the past, we were not able to identify a few viruses, but now we are able to identify them because of the machine learning feature.

What is most valuable?

The machine learning module is the most valuable feature. 

What needs improvement?

The reporting needs improvement and I would like to see a more granular level of administrative privileges.

For how long have I used the solution?

One to three years.

How was the initial setup?

The initial setup was straightforward. It wasn't a long project, it took six months.

What other advice do I have?

I would rate this solution a seven out of ten. 

We don't have a plan to increase the usage, it is purely based on our business requirements.

This product is nothing but different from a traditional anti-virus. We were very apprehensive to try it. Once we tried it, it gave us a good impression.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free SentinelOne Singularity Complete Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free SentinelOne Singularity Complete Report and get advice and tips from experienced pros sharing their opinions.