What is our primary use case?
The product is used to provide cybersecurity protection to SMBs predominantly in the financial, manufacturing, and retail industry as well as private individuals.
SentinelOne is key in achieving compliance with the General Data Protection Regulation (GDPR) in the European Union and the Protection of Personal Information (POPI) Act in South Africa.
Resolving ransomware encrypted servers or personal computers is costly to the customer, both in repair costs and loss of business due to downtime. In addition, the customer may suffer reputational damage if any of its customer data is compromised.
How has it helped my organization?
Our clients trust us to protect their IT systems and data.
We use SentinelOne because it has proven itself and has never been breached. It offers us a 100% protection record and our company reputation stays intact.
Resolving ransomware encrypted servers or personal computers is both costly and time consuming to both the customer as well as the service provider - protecting against these attacks is a win-win for all.
The SentinelOne portal dashboard provides a good overview of all the sentinels deployed and offers quick access to review and resolve affected sites and endpoints
What is most valuable?
The most valuable feature is that it works and is reliable.
Other solutions I have researched have all been breached, and as far as I can see, SentinelOne is the only one that has never been breached. It provides fully autonomous threat mitigation and ransomware file encryption roll back in real-time without human intervention.
Our clients have been able to survive a ransomware attack without even knowing that they had had files encrypted and automatically rolled back - even their Point of Sale (POS) system did not miss a beat and the business continued as normal without interruption.
What needs improvement?
SentinelOne's ongoing updates and rate of technology improvments are adequate for now, and have kept SentinelOne ahead of the cyber criminals, but we cannot rest, and continuous development - in particular with regard to the areas of automation, machine learning, and artificial intelligence - is required to stay ahead of the cyber criminal techniques and exploits. The "false positive" detection rate could be improved, if possible, but this should not increase the risk of the endpoint being breached.
For how long have I used the solution?
I've used the solution for over 5 years.
What do I think about the stability of the solution?
The stability is excellent.
What do I think about the scalability of the solution?
The scalability is excellent.
How are customer service and support?
The customer support has been good.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I did not use a different solution previously.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
We are able to handle implementations in-house.
What's my experience with pricing, setup cost, and licensing?
If you are an end-user you should procure the service through a Managed Cyber Security Systems Provider.
Which other solutions did I evaluate?
Yes, I have looked into ESET, Crowdstrike, Cylance, Webroot, and many others.
What other advice do I have?
Contact me on cybersec[at]global[dot]co[dot]za
Disclosure: My company has a business relationship with this vendor other than being a customer. We are a managed IT and cyber security services provider and deploy SentinelOne to our customers to as part of the cyber security protection service.
Thank you, Steve, for your thoughtful review. You might be pleased to know that SentinelOne have a thriving enterprise customer base, including several highly recognizable global and regional brands. If I may be of service, please reach out. Cheers, Rick