

SentinelOne Singularity Complete and CyberArk Endpoint Privilege Manager compete in the endpoint security category. SentinelOne seems to have the upper hand due to its advanced automated threat response and competitive pricing.
Features: SentinelOne Singularity Complete offers automated threat response, comprehensive threat visualization, and machine learning. It provides robust integration with other security tools and behavioral analysis that enhances endpoint visibility. CyberArk Endpoint Privilege Manager focuses on managing user application privileges, protecting against unauthorized access, and providing session recording and password rotation features.
Room for Improvement: SentinelOne users seek enhancements in AI-based policy automation, reporting, and granular policy control. Improvements in agent management features are also desired. CyberArk users point out the need for a more consistent user interface and easier policy configuration, along with concerns about its heavy architecture and integration challenges.
Ease of Deployment and Customer Service: SentinelOne shows high flexibility in deployment across various environments, including private and public clouds, and offers fast, responsive customer service. CyberArk, while effective, tends to lean more towards on-premises and public cloud deployments, with some reports of complex deployment processes and slower support response times.
Pricing and ROI: SentinelOne is viewed as offering competitive pricing and notable ROI through efficient threat resolution and reduced incident response times. In contrast, CyberArk, while robust, is perceived as expensive. SentinelOne is praised for its favorable price-performance ratio and quicker ROI compared to CyberArk.
Deploying CyberArk Endpoint Privilege Manager has secured the infrastructure, which saves money, time, and resources.
I consider CyberArk Endpoint Privilege Manager's return on investment to be good since it effectively accomplishes the goals expected from privilege access management solutions.
SentinelOne Singularity Complete has helped reduce my organization's mean time to detect by fifty percent.
Since then, I have not faced any intrusions, which is one reason I chose SentinelOne over ESET.
We have not faced any attacks since we implemented it.
They respond immediately to our inquiries, resolve issues promptly, and provide valuable guidance, especially in critical situations.
We engage them when needed and receive prompt responses that typically resolve our issues.
Earlier, we received support for normal tickets within a day, but now it takes one or two days to resolve issues.
We are using the automated email process for support, and they respond within an hour or two hours sometimes.
A chat service would be beneficial.
The technical support from SentinelOne Singularity Complete is very active and good, with a strong knowledge base available online.
We can set permissions per team or department, allowing some teams to elevate specific applications while others have different permissions.
CyberArk Endpoint Privilege Manager is quite scalable.
The available reports and other security tools assist in scaling it according to my organization's needs.
It's all auto-scale and auto-categorized, configuring automatically.
SentinelOne Singularity Complete is very scalable.
My deployment is relatively small, and SentinelOne Singularity Complete works within those constraints.
It is a robust solution that has effectively supported our environment without major issues.
Since implementing it, we have not experienced any outages or stability issues.
CyberArk Endpoint Privilege Manager offers multiple options for creating and stopping policies.
This indicates room for improvement in stability when interacting with other solutions.
Initially, there were issues, particularly on the management side, but now the console is much more stable.
Everything is managed automatically, so there is no user interference needed for upgrades.
CyberArk Endpoint Privilege Manager could be improved by simplifying the administration process, specifically when setting up policies and applications.
Currently, no user-based policy option is available inside the EPM console.
Some features provided in the self-hosted version of EPM are not supported in the software as a service version, like connection to some analysis applied by Palo Alto.
The only thing that prevented the attack from succeeding was a free version of Malwarebytes.
Providing a single pane of visibility for the end user would be beneficial.
That seems to play a little havoc and can conflict with manual installs, causing issues where it wants to delete and reinstall the client.
CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive.
CyberArk Endpoint Privilege Manager is costly compared to other solutions.
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost.
If you want protection, you have to pay the price.
There are other products that are less expensive, but I tell my clients that in security, they cannot cut corners or look for the cheapest solution.
Reputation and quality are important, but especially in today’s economy, price is a significant factor.
CyberArk Endpoint Privilege Manager effectively reduces malicious content in applications by allowing us to identify and block dangerous applications.
It allows them to granularly manage controls to prevent some malicious activities on the endpoint machine.
CyberArk Endpoint Privilege Manager enhances computer security by providing minimal access, effectively preventing ransomware attacks.
I have an advanced app providing visibility of all my endpoints, which was not the case before.
SentinelOne has a feature to decommission automatically, which has been fantastic.
There's also automation that gives my team free time, preventing them from having to look for every alert.
| Product | Market Share (%) |
|---|---|
| SentinelOne Singularity Complete | 2.6% |
| CyberArk Endpoint Privilege Manager | 1.3% |
| Other | 96.1% |


| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 9 |
| Large Enterprise | 18 |
| Company Size | Count |
|---|---|
| Small Business | 87 |
| Midsize Enterprise | 44 |
| Large Enterprise | 76 |
CyberArk Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks through removing local admin rights, enforcing least privilege, and implementing foundational endpoint security controls across all Windows, macOS and Linux endpoints from hybrid to cloud environments.
Click here for a free 30 day trial: CyberArk Endpoint Privilege Manager free trial
SentinelOne Singularity Complete delivers advanced endpoint protection leveraging AI-driven threat detection and behavior analysis for efficient malware and ransomware response. Its standout features enhance security insights and ensure comprehensive endpoint management.
SentinelOne Singularity Complete provides robust ransomware recovery through unique rollback capabilities and seamless integration with various security solutions. Its machine learning enhances endpoint protection, minimizing false positives and automating responses. While praised for real-time threat monitoring, incident management, and asset management, it faces challenges in managing the console, customizing UI, and maintaining policy flexibility. Some users report difficulties with deployment and integration with existing systems, and enhanced reporting, alert management, and documentation are desired. Its appeal extends to deploying across multiple operating systems, offering comprehensive security coverage and facilitating cybersecurity compliance.
What standout features does SentinelOne Singularity Complete offer?Industries implement SentinelOne Singularity Complete for its AI capabilities in advanced endpoint protection, particularly against malware and ransomware. It's utilized across diverse operating systems, aiding in real-time threat monitoring and facilitating compliance. Organizations use it for vulnerability assessments and asset management, ensuring optimal protection in complex IT environments.
We monitor all Anti-Malware Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.