

Trellix Network Detection and Response and SentinelOne Singularity Identity are prominent in the cybersecurity domain. Trellix is favored for its integration and threat investigation tools, whereas SentinelOne is recognized for unified threat visibility and lightweight design, providing an edge in seamless endpoint management.
Features: Trellix enhances cybersecurity with advanced sandboxing, deep malware analysis, and adept zero-day attack detection. It integrates multiple security functions, offering insightful threat investigations. SentinelOne distinguishes itself through dynamic behavior-based threat detection, unified threat visibility, and strong prevention capabilities, bolstered by AI-driven features and streamlined endpoint management.
Room for Improvement: Trellix could improve integration with other solutions, analytics, and user-friendliness in endpoint security management. There's a desire for better cloud connectivity and advanced machine learning features. SentinelOne needs more user-friendly interfaces, improved support, and enhanced endpoint management, with attention to agent update management and comprehensive web filtering.
Ease of Deployment and Customer Service: Trellix operates on-premises, with users noting detailed technical support and a supportive setup. SentinelOne, focused on cloud deployment, is praised for its highly-rated customer service and ease of use, despite some concerns about first-level support responsiveness.
Pricing and ROI: Trellix is perceived as slightly expensive, with significant maintenance costs but notable threat detection capabilities. SentinelOne is deemed cost-effective, with competitive pricing, though there are concerns about price increases and the need for yearly licenses. Both products offer strong ROI, with Trellix improving analysis speed and SentinelOne enhancing threat prevention.
They have been responsive to our needs as integrators and those of the client.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
The customer support for Trellix Network Detection and Response is great.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
I would like to see in Trellix Network Detection and Response more explanation about some details of the threat.
With visibility into endpoint telemetry, SentinelOne does provide useful information to find threat actors and empowers those who are in the business of threat hunting.
What makes Trellix Network Detection and Response stand out for me compared to other tools is the way you can detect threats. It is very easy and comfortable to use, and the detection shows clearly on the screen, which is very easy to understand.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
| Product | Mindshare (%) |
|---|---|
| SentinelOne Singularity Identity | 2.0% |
| Trellix Network Detection and Response | 4.1% |
| Other | 93.9% |


| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 8 |
| Large Enterprise | 19 |
SentinelOne Singularity Identity offers AI-driven detection, prevention, and cloud protection, providing real-time coverage and streamlined security management through its unified console and customizable interface.
Singularity Identity enhances threat detection with dynamic capabilities, facilitating real-time protection and easy user workflows. Its management console offers a unified view for deeper risk analysis, boosting operational security. Through behavioral analysis and adaptable interfaces, threat response becomes efficient. Key elements include identity guarding and quick incident mitigation. Automated remediation options and rollback features are impactful, ensuring decreased response times. Challenges include improving user accessibility, especially for non-IT individuals, and enhancing customer support with faster solutions and robust reporting. Performance issues like CPU usage demand solutions, while endpoint management and agent updates could benefit from automation. Adding network response features and lowering costs may enhance engagement.
What are the most important features?Industries leverage SentinelOne Singularity Identity for comprehensive threat monitoring across networks. It ensures cloud and endpoint security, plus control over identity and data breaches. By replacing outdated antivirus systems, organizations emphasize proactive defense, visibility, incident response, and detecting lateral movements. Implementing this solution supports strong network and endpoint security, enhances cloud management, and maintains a robust security framework.
Trellix Network Detection and Response provides robust threat protection with advanced detection of zero-day attacks and APTs. Its user-friendly dashboard and real-time response capabilities enhance security and visibility across networks.
Trellix Network Detection and Response stands out with its MVX engine, leveraging virtual machines for comprehensive behavioral analysis. The solution supports detection of advanced cyber threats through features like sandboxing and application filtering, offering real-time response and packet capture for detailed contextual insights. Companies benefit from seamless integration with other platforms, enhancing usability and overall protection. User-friendly interfaces improve network visibility, while stability and ease of configuration safeguard against both signature-based and signature-less threats.
What key features does Trellix offer?Companies in sectors like finance, healthcare, and enterprise security utilize Trellix Network Detection and Response for tasks such as network intrusion detection, endpoint protection, and securing data transmission paths. It aids in threat investigations, pre-sales demos, and network forensics, reducing risks by protecting against cyber threats like phishing.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.