

XM Cyber and SentinelOne Singularity Identity compete in cybersecurity solutions with XM Cyber having an edge in proactive vulnerability assessments and remediation and SentinelOne in identity protection.
Features: XM Cyber specializes in identifying security gaps, providing actionable insights for attack prevention, and effective remediation steps for lateral movement detection. SentinelOne Singularity Identity offers identity threat detection and response, advanced analytics, and real-time protection with minimal system impact.
Room for Improvement: XM Cyber can enhance user interface simplicity, expand integration options with various security tools, and provide more extensive reporting capabilities. SentinelOne may improve its pricing flexibility, increase support for legacy systems, and enhance offline protection measures.
Ease of Deployment and Customer Service: XM Cyber offers straightforward deployment focusing on quick integration with minimal disruption and personalized customer service. SentinelOne Singularity Identity provides cloud-based deployment for rapid scaling and emphasizes prompt support through comprehensive assistance.
Pricing and ROI: XM Cyber is budget-friendly, aligning with small to medium-sized enterprises by preventing costly breaches through vulnerability management. SentinelOne may involve higher initial costs, favorable for organizations focusing on advanced identity security with long-term savings through enhanced threat prevention.
It's reduced the timescale to remediate vulnerabilities that are identified as representing a high risk.
There was a specific issue that our other security tooling did not pick up, but XM Cyber did.
They have been responsive to our needs as integrators and those of the client.
The customer support is fantastic; it's probably some of the best we've received across all our security vendors.
Customer support for XM Cyber is good, responsive, and it follows up on issues.
This responsiveness indicates a strong partnership; a security partner that listens to their customers.
Its scalability is great; it's easy to deploy and fully scalable.
We have quite a complex and large IT estate, and we've certainly experienced no limitations or problems arising from the ability of XM Cyber's product to scale across that estate.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
We push the boundaries with digital twins; I understand XM Cyber uses a similar concept of graph databases to map environments.
They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks.
We intend to develop closer integration between XM Cyber and the other tools that help us tackle the issue of threats and vulnerabilities across our IT estate.
We have a large, complicated estate, and in the licensing discussions, we were keen not to have the cost balloon because of the complication, the number of PCs and servers that we have.
With visibility into endpoint telemetry, SentinelOne does provide useful information to find threat actors and empowers those who are in the business of threat hunting.
By far, the best feature of XM Cyber is being able to map out the way vulnerabilities can be exploited based on what they call the choke points in the network where the path that a bad actor would take comes closest to assets within our environment that are most vulnerable but also most valuable.
Our loss exposure amount has reduced significantly, leading to two big wins: our loss exposure amount has gone down, and we have direct savings from focusing our team's time on what's important, allowing them to work on other business benefits and generate value for the company.
XM Cyber allows us to quantify the risk, and we are able to track remediation, so we can quantify the risk at an executive level and also to a technical IT team.
| Product | Market Share (%) |
|---|---|
| SentinelOne Singularity Identity | 0.9% |
| XM Cyber | 1.0% |
| Other | 98.1% |


| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.
Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.
Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.
By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.
XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. Our attack path management platform continuously uncovers hidden attack paths to your critical assets across cloud and on-prem environments, so you can cut them off at key junctures and eradicate risk with a fraction of the effort. This overcomes the big disconnect that security teams experience when they’re presented with endless alerts, yet can’t see which exposures impact risk the most, how they come together to be exploited by an attacker, or how to efficiently eliminate them. This approach is a complete game-changer, which is why some of the world’s largest, most complex organizations choose XM Cyber to help eradicate risk. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.