

SentinelOne Singularity Identity and Varonis Platform are key players in the cybersecurity category, both offering unique strengths. SentinelOne is often seen to have the upper hand due to its lower cost and AI-driven capabilities, while Varonis is favored for its comprehensive data security.
Features: SentinelOne Singularity Identity excels in AI-driven threat detection, endpoint protection, and automated mitigation which reduce response times and enhance security. Its machine learning capabilities provide dynamic threat detection, and the lightweight agent ensures efficient resource usage. Varonis Platform is known for robust data access governance, effective data classification, and detailed reporting capabilities, helping organizations manage sensitive data and compliance seamlessly.
Room for Improvement: SentinelOne could benefit from better endpoint management flexibility, improved web filtering, and more responsive support. User engagement and support speed are areas noted for enhancement. Varonis could improve its cloud integration and reduce licensing complexity, with the user interface needing enhancement for more intuitive use. Its high cost and extensive permission requirements are also seen as potential barriers for mid-sized companies.
Ease of Deployment and Customer Service: SentinelOne offers a cloud-centric deployment with strong, though sometimes slow, customer support, praised for responsiveness. Varonis provides hybrid deployment options and receives accolades for its technical support, though simplification of its interface could enhance user experience. Both prioritize customer success but could improve initial support response times.
Pricing and ROI: SentinelOne offers competitively priced solutions with significant ROI through time savings and increased security benefits, seen as cost-effective against competitors like CrowdStrike. Varonis, while pricier, justifies the cost with its advanced data governance, making it ideal for enterprises focused on data regulations and security. Both platforms demonstrate ROI by boosting security and operational efficiency.
I have seen a return on investment mainly through time savings and improved security for sensitive data, making it a valuable investment.
I definitely say that we have had time savings by using the DataVantage module and also time savings using the AD module when we are dealing with different incidents.
They have been responsive to our needs as integrators and those of the client.
However, I do get my resolution every time.
I would rate the customer support for Varonis Platform at nine out of ten.
They respond quickly to anything we need, which is not common among platforms.
Varonis Platform is highly rated for scalability.
Varonis's scalability as eight to eight point five out of ten.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
Varonis requires more access permissions for its core functions compared to competitors, which can be a concern for companies about data safety.
For example, when somebody is trying to print something, Varonis Platform cannot block that action.
Enhancing tighter integration with third-party solutions, such as SIEM or SOAR platforms, for smoother incident response workflows.
My experience with pricing, setup costs, and licensing for Varonis Platform has been good, with competitive costs.
Varonis is known for its high licensing cost, which can include the cost of multiple servers required for its operations, called collectors.
SentinelOne has definitely reduced their mean time to respond.
Varonis is excellent for scanning unstructured data sources like file shares, OneDrive, SharePoint, Azure Blob Storage, and S3s.
Varonis Platform is agent-based and AI-driven for detection and response, identifying data based on its content and context.
We have created automatic scripts in case there is a chance that it is a ransomware malicious actor, and it will automatically disable the user, log them out, and disable the actual workstation.
| Product | Mindshare (%) |
|---|---|
| SentinelOne Singularity Identity | 6.0% |
| Varonis Platform | 5.8% |
| Other | 88.2% |


| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 2 |
| Large Enterprise | 13 |
Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.
Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.
Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.
By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.
Varonis Platform enhances data security and governance with advanced analytics, identifying unusual access patterns and sensitive areas. Its centralized interface manages permissions across systems, offering essential capabilities for alerting and reporting.
Varonis Platform provides continuous data protection and monitoring by identifying and alerting on unauthorized data access. It offers comprehensive insights into file access and user activities, supporting data classification and simplifying compliance with tracking and monitoring capabilities. Integration with storage systems enables users to manage permissions and access effectively. Room for improvement includes cloud integration and simplifying its interface and calculation engine for ease of use. Challenges include on-premises dependency, licensing costs, and a need for enhanced DLP capabilities.
What are the primary features of Varonis Platform?
What benefits and ROI should users expect?
In finance, Varonis aids in safeguarding sensitive financial data, while in healthcare, it secures patient records. Legal industries utilize it for protecting client information, and retail sectors manage sensitive customer data. These industries benefit from Varonis' ability to prevent unauthorized access and streamline compliance.
We monitor all Identity Threat Detection and Response (ITDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.