

Microsoft Defender for Endpoint and SentinelOne Singularity Identity are major competitors in the cybersecurity category. While Defender is a cost-effective alternative for enterprises integrated with Windows, SentinelOne offers advanced AI-driven threat detection making it a preferred choice for proactive threat detection.
Features: Microsoft Defender for Endpoint is integrated with Windows, ensuring seamless functionality with the operating system. It includes a comprehensive suite with real-time alerts, automation, and a large user base leveraging Microsoft's ecosystem. SentinelOne Singularity Identity focuses on AI-driven threat detection and behavior-based analytics, providing robust protection capabilities and advanced response mechanisms.
Room for Improvement: Microsoft Defender for Endpoint users often face challenges with slow customer support, complex configurations, and the demand for enhanced ransomware defenses and reporting functionalities. SentinelOne Singularity Identity users experience a clunky user interface and performance impact on servers and frequently require technical support for resolving issues. Its alerting system also requires refinement.
Ease of Deployment and Customer Service: Microsoft Defender for Endpoint benefits from its Windows integration, offering seamless deployment for existing users, albeit with mixed feedback on technical support responsiveness. SentinelOne Singularity Identity provides extensive support, though users note complexity in initial setup and deployment, indicating a need for streamlined support processes.
Pricing and ROI: Microsoft Defender for Endpoint offers an attractive pricing model often included with Windows, benefiting organizations already using Microsoft solutions, although additional licenses may be required for advanced features. It provides positive ROI via integration and extensive protection capabilities. SentinelOne Singularity Identity, while priced competitively, receives feedback on pricing transparency and annual increments. However, it delivers strong ROI through its comprehensive security features.
Without detection and protection measures, organizations would face substantial payments and reputational damage, including the necessity to inform customers about data breaches, potentially leading to loss of business.
We have seen a return on investment when using Microsoft Defender for Endpoint, as it saves labor by reducing the need for staff to focus on it.
The biggest return on investment for me when using Microsoft Defender for Endpoint is the time saving.
The Microsoft agent, who did not actually work for Microsoft, is one of the vendors that Microsoft uses for support, said, 'Just to set expectations, my lunch break is in an hour and I am going to go away then.'
The level-one support seems disconnected from subject matter experts.
I rate Microsoft support 10 out of 10.
They have been responsive to our needs as integrators and those of the client.
We managed to scale it out in a short amount of time, with two months of planning and three months of implementation on 10,000 computers.
Microsoft Defender for Endpoint is scalable enough to handle various devices across environments, whether they are laptops, Android devices, or operating in hybrid environments.
Compatibility is its main feature.
I haven't seen any outages with Microsoft.
I rate Defender 10 out of 10 for stability.
Defender for Endpoint is extremely stable.
Repeated interactions are necessary due to Level One's lack of tools and knowledge, hindering efficient problem-solving and negatively impacting our experience with Microsoft support.
In contrast, competing products offer reduced pricing for long-term commitments, which makes it difficult for us in that environment.
We use Microsoft partners to help govern the platform, and as part of an alliance, we want to gather data from each tenant and combine them for a complete view.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
That has been the trend we have seen with Microsoft lately—it is just getting more and more expensive.
Given our extensive Microsoft licensing, transitioning to Defender for Endpoint did not affect licensing costs.
It costs $15 per VM for the P2 plan, which is seen as affordable for customers.
Defender for Endpoint's coverage across different platforms in our environment is pretty good. We have devices running Linux, Mac OS, Windows, iOS, and Android. It covers all of them.
Microsoft Defender for Endpoint provides a unified management interface allowing customers to manage their on-premises and hybrid infrastructures from a single pane.
One of the best features of Microsoft Defender for Endpoint is its database for identifying zero-day attacks or malware attacks.
With visibility into endpoint telemetry, SentinelOne does provide useful information to find threat actors and empowers those who are in the business of threat hunting.
| Product | Mindshare (%) |
|---|---|
| Microsoft Defender for Endpoint | 5.7% |
| SentinelOne Singularity Identity | 2.0% |
| Other | 92.3% |


| Company Size | Count |
|---|---|
| Small Business | 82 |
| Midsize Enterprise | 43 |
| Large Enterprise | 95 |
| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
Microsoft Defender for Endpoint provides comprehensive threat protection that integrates well with current systems, offering proactive threat detection and automatic updates while reducing manual efforts.
The platform is designed for seamless integration with Microsoft products, facilitating efficient management and use. It offers proactive ransomware protection and valuable threat intelligence, crucial for timely response and increased visibility across devices. Users highlight its ability to secure endpoints from viruses and malware, integrating with Windows and Office 365 to enhance real-time detection capabilities in diverse environments, including hybrid and on-premises setups. However, enhancements are needed in Linux integration, detection accuracy, and policy implementations.
What are the key features of Microsoft Defender for Endpoint?Microsoft Defender for Endpoint is implemented across industries for securing endpoints, relying on its deep integration with Windows and Office 365 to protect against malware and viruses. Organizations benefit from its real-time detection and comprehensive management capabilities, particularly in hybrid environments where diverse digital infrastructures need safeguarding.
SentinelOne Singularity Identity offers AI-driven detection, prevention, and cloud protection, providing real-time coverage and streamlined security management through its unified console and customizable interface.
Singularity Identity enhances threat detection with dynamic capabilities, facilitating real-time protection and easy user workflows. Its management console offers a unified view for deeper risk analysis, boosting operational security. Through behavioral analysis and adaptable interfaces, threat response becomes efficient. Key elements include identity guarding and quick incident mitigation. Automated remediation options and rollback features are impactful, ensuring decreased response times. Challenges include improving user accessibility, especially for non-IT individuals, and enhancing customer support with faster solutions and robust reporting. Performance issues like CPU usage demand solutions, while endpoint management and agent updates could benefit from automation. Adding network response features and lowering costs may enhance engagement.
What are the most important features?Industries leverage SentinelOne Singularity Identity for comprehensive threat monitoring across networks. It ensures cloud and endpoint security, plus control over identity and data breaches. By replacing outdated antivirus systems, organizations emphasize proactive defense, visibility, incident response, and detecting lateral movements. Implementing this solution supports strong network and endpoint security, enhances cloud management, and maintains a robust security framework.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.