

SentinelOne Singularity Complete and Check Point Harmony SASE are contenders in cybersecurity, offering advanced solutions for security infrastructure and endpoint management. Based on features, SentinelOne takes the upper hand for its standalone detection capabilities, while Check Point excels in comprehensive network security.
Features: SentinelOne Singularity Complete offers centralized visibility for endpoint management, AI-driven threat detection, and autonomous response features, ensuring a high level of security and operational efficiency. Enhanced threat hunting and reporting capabilities are also key strengths. Check Point Harmony SASE provides Zero Trust Network Access, integrated threat intelligence from ThreatCloud, and a seamless secure browsing experience. These features make Harmony SASE ideal for organizations requiring real-time network security and GDPR compliance.
Room for Improvement: SentinelOne could improve by offering more flexible reporting options, enhancing console performance for extensive deployments, and better integration with other IT tools to ease complex operations. Check Point Harmony SASE could streamline its initial configuration, improve third-party identity provider integration, and enhance mobile client capabilities for improved BYOD management.
Ease of Deployment and Customer Service: SentinelOne Singularity Complete is adaptable across various environments like on-premises, private, public, and hybrid clouds, with mostly positive customer support feedback, although response times for complex issues can be slow. Check Point Harmony SASE is noted for simple deployment across cloud environments, strong customer support, and, though requiring a minimum user count, emphasizes ease of management and real-time security intelligence.
Pricing and ROI: SentinelOne offers competitive pricing with a clear ROI through reduced incident response time and minimized manual interventions. Its automation abilities support efficient resource management, providing cost-effective security solutions. Check Point Harmony SASE may have a higher price point, but its advanced security features, scalability, and comprehensive threat prevention justify the cost. It offers ROI by enhancing cybersecurity, reducing manual security tasks, and providing advanced integration options, thus benefiting larger organizations with complex security needs.
Check Point Harmony SASE (formerly Perimeter 81) blocked access to those URLs at the network level before users could click through.
We are saving 40% of our time, which is good.
SentinelOne Singularity Complete has helped reduce my organization's mean time to detect by fifty percent.
If I engage five engineers for this project and implement SentinelOne, then only one resource is needed to manage the dashboard and criticality alerts.
Since then, I have not faced any intrusions, which is one reason I chose SentinelOne over ESET.
I would rate support 10 out of 10.
People working really hard, listening to every issue and request, and replying within hours.
If we get stuck at midnight, any other TAC team will be in GMT or Europe or America, and they will assign our support engineer and suddenly schedule a call for us and resolve the issue.
We are using the automated email process for support, and they respond within an hour or two hours sometimes.
A chat service would be beneficial.
The cloud-native model ensures we are not tied to any specific location or hardware, which has been a great game changer in terms of agility.
I would rate it nine out of ten for scalability.
Check Point Harmony SASE's scalability is good; it can handle growth easily, allowing me to easily add another region and gateway to have more people join in.
The platform is designed to handle thousands of endpoints without significant performance degradation.
It's all auto-scale and auto-categorized, configuring automatically.
SentinelOne Singularity Complete is very scalable.
There are some lags and glitches with connectivity, so I would rate the stability as between seven or eight out of ten.
After the last improvement, I can say it is much more stable now.
Check Point Harmony SASE is stable most of the time, but there are still some issues that are hard to troubleshoot.
If I have to rate the stability level of Singularity Platform from one to ten, I would say it would be a strong nine.
The automation helps a lot, and once implemented, we face no further issues regarding stability or scalability; everything works absolutely fine.
Even if the agent disconnects from our console, it will still protect the desktop or laptop.
A local data center in Turkey would enhance the product, as currently, our Internet traffic goes to another country, which is problematic for us.
One area for improvement is integration with third-party identity providers.
The product is lacking features that other competitors have, making it quite challenging to migrate customers to this solution because it feels very much unfinished.
The only thing that prevented the attack from succeeding was a free version of Malwarebytes.
When I find a log suspicious, if it automatically points out that a particular point in the log at a specific timing or frame is looking malicious, it would be easier for me.
SentinelOne Singularity Complete doesn't have data security solutions such as Forcepoint DLP or 48 layer; SentinelOne Singularity Complete doesn't have that DLP solution.
Cost efficiency is a consideration, as SASE products are not the cheapest security products.
The cost is a bit expensive for most users.
It is a bit expensive.
If you want protection, you have to pay the price.
There are other products that are less expensive, but I tell my clients that in security, they cannot cut corners or look for the cheapest solution.
Reputation and quality are important, but especially in today’s economy, price is a significant factor.
The firewall management is the most valuable feature for me.
The Zero Trust Network Access (ZTNA) feature is a major highlight as it gives users seamless and secure access to internal resources without requiring a full-blown VPN, which improves both security and user experience.
The Zero Trust and segmentation have helped my team and our customers significantly because we are able to protect every scope and allow the work-from-home users to access internal resources while passing through a threat prevention gateway, ensuring that everything is safe.
I have an advanced app providing visibility of all my endpoints, which was not the case before.
SentinelOne has a feature to decommission automatically, which has been fantastic.
There's also automation that gives my team free time, preventing them from having to look for every alert.
| Product | Mindshare (%) |
|---|---|
| SentinelOne Singularity Complete | 2.5% |
| Check Point Harmony SASE (formerly Perimeter 81) | 0.8% |
| Other | 96.7% |


| Company Size | Count |
|---|---|
| Small Business | 53 |
| Midsize Enterprise | 20 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 104 |
| Midsize Enterprise | 51 |
| Large Enterprise | 79 |
Check Point Harmony SASE, formerly Perimeter 81, offers robust security features like split tunneling, MFA, and Zero Trust Network Access focused on secure remote access and optimized connectivity for remote teams.
Check Point Harmony SASE delivers advanced security through a user-friendly interface, efficient VPN connections, and a centralized management console. It enhances security with real-time threat intelligence from ThreatCloud and traffic management via built-in optimization. Firewall as a Service and Secure Web Gateway safeguard against unauthorized access and phishing. While users seek enhanced networking customizations and better integration with identity providers, there's an emphasis on improving reporting, real-time analytics, and policy management. Requests also include a Chrome extension, traffic balancing, and simplified configuration to address some resource-intensive aspects.
What are the key features of Check Point Harmony SASE?
How can organizations benefit from using Check Point Harmony SASE?
Check Point Harmony SASE is used across industries for secure remote access and connectivity, protecting sensitive data, and managing access to corporate resources. It is ideal for those with hybrid cloud models and requires comprehensive security measures combined with existing IT infrastructures to meet specific industry demands.
SentinelOne Singularity Complete is an advanced endpoint security platform featuring centralized management across multiple locations. It leverages AI-driven behavior detection, threat prioritization, and ransomware rollback for enhanced protection and streamlined operations.
With a focus on endpoint protection, threat detection, and automated response, SentinelOne Singularity Complete provides comprehensive security through AI-powered behavioral analysis and real-time threat detection. The centralized console simplifies management, offering seamless integration and minimal system impact. Its robust reporting capabilities facilitate compliance with audit-ready reports. Lightweight agents operate across diverse environments, improving visibility and performance while curbing manual efforts. To optimize its utility, faster console load times and improved customizability in reports and dashboards are recommended. Users may benefit from smoother integration with IT tools and enhanced policy management flexibility, as well as upgraded agent processes and simplified endpoint deployment. Expanding built-in analytics and refining alert management can further heighten platform efficacy.
What are the key features of SentinelOne Singularity Complete?In various industries, SentinelOne Singularity Complete is implemented for endpoint protection and incident management. Companies rely on it for its real-time threat detection and automated response capabilities, ensuring compliance and reduced manual intervention. Its adaptive nature supports diverse environments, enhancing operational efficiency.
We monitor all Anti-Malware Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.