Leaderboard for SentinelOne Singularity Complete
Check out the members with the highest scores who have reviewed SentinelOne Singularity Complete.
#1. Nagendra Nekkala
1795
Points
Senior Manager ICT & Innovations at Bangalore International Airport Limited
Reviewed SentinelOne Singularity Complete:
Easy to configure, has increased our security score, and reduces our costs#2. Mohit Dhingra
300
Points
Senior Vice President IT at a tech services company
Reviewed SentinelOne Singularity Complete:
Helps free up time, save costs, and reduce organizational risk#3. reviewer2198103
300
Points
Manager, Information Technology at a consumer goods company
Reviewed SentinelOne Singularity Complete:
Effectively ingests and correlates data from all our security solutions#4. Dinesh Yadav
245
Points
Sales Director at CLOUD MIND
Reviewed SentinelOne Singularity Complete:
Offers MITRE ATT&CK reports, forensic investigation, and ransomware prevention#5. ShashikaKodikara
235
Points
Head of Cybersecurity at Technovage Solution
Reviewed SentinelOne Singularity Complete:
A valuable autonomous platform but the use case is valid mostly for the cloud deployments#6. Werner Lunow
235
Points
CISO at a financial services firm
Reviewed SentinelOne Singularity Complete:
Helps mitigate risks, reduces alerts, and provides great visibility#7. Greg Walia
235
Points
IT Manager at a healthcare company
Reviewed SentinelOne Singularity Complete:
If there's an attack on the machine, the system can automatically roll back the data and the hard…#8. Tallis Newkirk
215
Points
CEO/Team Lead at Intech Computer Solutions
Reviewed SentinelOne Singularity Complete:
Well designed and does what it says it's going to do#9. reviewer2281251
210
Points
Network Engineer at a financial services firm
Reviewed SentinelOne Singularity Complete:
A mature solution that has a good amount of documentation and provides comprehensive threat…#10. Leonard Altamura
210
Points
Security Architect at WaveLength Ind
Reviewed SentinelOne Singularity Complete:
Effectively prevents vulnerable devices from being compromised by isolating their network traffic