We primarily use the solution for EDR, which it does in a brilliant way. We are also using it for log management. We can use it for investigations, reporting, and security incident management.
Group Chief Information Officer at NeST Information Technologies Pvt Ltd
Reduces organizational risk, low on machine load, and helps prevent ransomware
Pros and Cons
- "It's effectively helped to reduce organizational risk."
- "They are still largely an EDR product."
What is our primary use case?
What is most valuable?
The most important aspect of the solution is that the load on the machine is not very high. It doesn't take up battery resources.
The solution prevents ransomware and other threats.
So far, it is working brilliantly. The dashboards and UI are user friendly, as is the ability to configure as needed.
It seems to have a lot more capabilities. The XDR capabilities, in particular, look very strong. We're currently looking into that.
If we want to do integrations with third parties, we don't have very many challenges around that.
The ability to ingest and correlate across our security solutions is very useful. It's impressive. The AI engine it has is excellent.
It helps us consolidate our security solutions.
While it does not allow us to reduce alerts per se, it does a good job of correlating. The way it's integrated into the SIM, it's working to the expectations we have.
The solution helps free up people so that they can work on other tasks. We don't have to grow our team too much now. My security team is actually quite small - about five people. We all get more time to handle other tasks.
We've noted that it does help reduce mean time to respond. We can identify events easier and those that are most critical are brought to the forefront. Previously, we were in the dark. Now we have so much more visibility. It's been a huge improvement.
It's effectively helped to reduce organizational risk.
What needs improvement?
They are still largely an EDR product. The MDR side needs to be demonstrated. They need to make zero trust more robust.
For how long have I used the solution?
I've used the solution for around two years now.
Buyer's Guide
SentinelOne Singularity Endpoint
March 2026
Learn what your peers think about SentinelOne Singularity Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
886,174 professionals have used our research since 2012.
What do I think about the scalability of the solution?
I'd rate the solution's ability to scale eight to nine out of ten.
How are customer service and support?
The SLA is good and the support team is quite impressive. They are very quick. I never need to escalate.
Which solution did I use previously and why did I switch?
We were using Sophos and Symantec previously. We switched as SentinelOne took up fewer resources and could support a Linux environment.
How was the initial setup?
The initial setup is fairly straightforward.
What was our ROI?
It's giving me confidence that my network is protected. The ROI is not so much cost savings as security on offer. We can safely sustain our business and secure our data assets. However, the time and cost savings we've seen are quite good.
What's my experience with pricing, setup cost, and licensing?
The solution is moderately priced. It's a valuable solution to have, however.
Which other solutions did I evaluate?
We are evaluating Crowd Strike at the moment.
What other advice do I have?
We are a SentinelOne customer.
The quality and maturity of the product are good. It's one of the market leaders. It's delivered on what it's supposed to do.
I'd rate the solution nine out of ten.
They are a good strategic security partner. They have the right credentials. They're offering a relevant service and it helps me communicate to my customers. I rate them very highly.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Soc Analyst at a tech consulting company with 11-50 employees
Unified security platform has enabled real-time threat detection and streamlined investigations
Pros and Cons
- "The best feature of Singularity Platform is that everything is unified in one platform, which would be a main unique selling point for them."
- "For improvement, I would say the infrastructure is very slow; the application I use is sluggish, potentially due to workload or problems on my company's side."
What is our primary use case?
I use Singularity Platform as a SIEM across many infrastructures, including cloud and on-premises environments, to detect attacks on endpoints, cloud workloads, identities such as Active Directory, and network signals.
Singularity Platform is used to detect, investigate, and respond to threats all in one platform, which is why it is called Singularity Platform, because it has EDR, XDR, and cloud security all unified in one system.
I use fraud detection while working with financial companies and many fintech companies. Although SentinelOne is not known for fraud detection, it does detect stolen credentials, accounts that have been misused, or privilege abuse. I use it to a certain extent, but I cannot provide a deep-dive analysis on it today as I am fatigued from working through the night.
In my organization, I have around ten clients, of which six use SentinelOne as a SIEM, mainly financial companies, with one being a shopping-based company. I cannot provide all client details, but that is the general overview.
What is most valuable?
The best feature of Singularity Platform is that everything is unified in one platform, which would be a main unique selling point for them. The unique feature is Next-Gen AV plus EDR, which detects and blocks threats in real-time.
There is a rollback feature that rolls back to the previous state if anything goes wrong after a new feature is installed or a ransomware attack occurs. Singularity XDR extends visibility beyond the endpoints and correlates how the endpoint, cloud, identity, and network help me to see a full attack chain.
The real-time personalization feature allows for customizing the detection rules and adapting security decisions based on who is doing what and where. It tracks users with behavior-based personalization, detecting abnormalities such as a non-admin gaining admin access. It also detects credential theft by correlating identity plus endpoint data for better context.
For policy personalization in my SOC, I group devices based on alert names, agent versions, or OS types, which helps significantly. I can personalize based on alert severity and true positives or false positives, leading to automated responses. A unique feature in Singularity Platform is StoryLine technology, which connects incidents into a full storyline attack.
It explains the attack pattern in a way that follows commands executed after an incident, and I can write workflows using AI, working even offline, mainly with agent-based decisions without constant cloud dependency.
I have customized dashboards for my companies, including an overview dashboard showing alerts from endpoints. I created a unified dashboard with a network and an endpoint dashboard, consolidating SOC-related unassigned alerts and daily solved alerts. I customized that dashboard myself, and it is very easy to do, being a UI-based feature.
Real-time monitoring is very helpful, helping me stay one step ahead in cybersecurity. It allows me to see exactly what is happening at this moment, and knowing about an attack immediately is better than knowing an hour or two later. The sooner I know, the better it is for me. Real-time monitoring helps me significantly as a SOC analyst, making it one of the best features. After an alert, analyzing what happens next is just two to three clicks away, needing only to input the timeline, the query, and the affected user or endpoint.
What needs improvement?
For improvement, I would say the infrastructure is very slow; the application I use is sluggish, potentially due to workload or problems on my company's side.
Although they have fantastic features, if it is not working properly, it hinders performance. Recently, during maintenance, it was still operational but sluggish, with features not working as efficiently.
Grouping alerts previously worked fine but now requires multiple clicks to achieve the same result, which is problematic. They could improve the UI and focus more on creating new rules from their MDR team.
Although they are working on automation, they could advance automatic remediation capabilities further than they are currently.
For how long have I used the solution?
I have been using Singularity Platform for the last six months.
What do I think about the stability of the solution?
I would give stability a seven, as it usually crashes, requiring me to log in repeatedly.
What do I think about the scalability of the solution?
Singularity Platform is very scalable but requires planning; it is not as easy as Orca Security or agentless platforms because it has agents. I would still give scalability a seven.
How are customer service and support?
I would rate technical support as an eight.
Which other solutions did I evaluate?
Comparing Singularity Platform with other vendors, I find others also have fantastic features, but SentinelOne has unique offerings like the StoryLine feature, Purple AI, and a unified platform where endpoints, cloud security, and assets come together. This gives them a great advantage. Although there are better security tools in the market, considering the money I spend, SentinelOne is much more cost-efficient than other products. For example, Microsoft Sentinel is much too costly for my company, and although CrowdStrike provides top-notch service, SentinelOne is still doing well to keep up with market needs, though there is room for improvement.
What other advice do I have?
Singularity Platform requires maintenance, which is typically done on weekends. Although there was a maintenance window recently, it is almost acceptable, but technical issues can cause lag or latency, which is common in upgrades. They can improve by utilizing a backup or other measures.
I recommend Singularity Platform because of features such as the StoryLine model, Purple AI, and automating workflows with hyper-automation capabilities. I would hesitate to recommend it solely due to reliability issues.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
Last updated: Mar 30, 2026
Flag as inappropriateBuyer's Guide
SentinelOne Singularity Endpoint
March 2026
Learn what your peers think about SentinelOne Singularity Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
886,174 professionals have used our research since 2012.
Co-Founder & VP Sales and Marketing at a tech services company with 11-50 employees
Significantly reduces risks and streamlines our monitoring
Pros and Cons
- "Singularity Platform allows us to have one single view of potential threats and the health of our environment, helping us optimize operational efficiency."
- "The dashboards can be improved, and their dashboarding functionality needs to be better. The way the dashboards look is not really impactful or meaningful."
What is our primary use case?
We protect our endpoints and servers, workstations, and we use Singularity Platform to ingest third-party data for alerts or detections.
We work in the cybersecurity industry, so we use Singularity Platform and implement it for our customers.
How has it helped my organization?
Singularity Platform basically keeps us protected. We utilize it across various sectors, including financial services, insurance, retail, and manufacturing. It has significantly reduced some of the risks associated with the current threats we face, both at the endpoint level and in terms of identity protection.
Singularity Platform allows us to have one single view of potential threats and the health of our environment, helping us optimize operational efficiency.
Singularity Platform is allowing us to detect threats early on and make sure that they don't proliferate in our environment if there are any.
What is most valuable?
The best features of this product include its ability to detect malicious software and malware, and the functionality itself is exceptional. The console is easy to navigate.
What needs improvement?
The dashboards can be improved, and their dashboarding functionality needs to be better. The way the dashboards look is not really impactful or meaningful.
For how long have I used the solution?
I have three years of experience with SentinelOne.
What do I think about the stability of the solution?
Singularity Platform is stable; so far, so good.
What do I think about the scalability of the solution?
It works. It's not designed for scalability, it's designed to protect the enterprise.
How are customer service and support?
I would evaluate their customer service and technical support as very good, five stars.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Before, we were using Kaspersky, but then the Russians came in, and we had to stop using it. It's a Russian product, and with everything happening with that, we stopped using it.
How was the initial setup?
The initial setup of Singularity Platform was straightforward. We have a team member here who handles it.
What about the implementation team?
One person, a really good techie, handled the deployment.
What was our ROI?
I don't really see a return on investment; it's a necessary requirement today to protect the enterprise.
What's my experience with pricing, setup cost, and licensing?
The pricing for Singularity Platform is good, and the setup cost is very minimal.
Which other solutions did I evaluate?
We evaluated CrowdStrike, Microsoft Defender, and Trend Micro before choosing Singularity Platform. The main differences between Singularity Platform and some of these others include threat detection ability, lower cost, and that was the key factor in our decision-making.
What other advice do I have?
I would rate Singularity Platform a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Sep 30, 2025
Flag as inappropriateDomestic Security Alliance Council (DSAC) at KYOCERA AVX Components s.r.o.
Video Review
Consolidation of eight different antiviruses into one platform saved us costs, time, and human resources
Pros and Cons
- "When we first looked at SentinelOne, we had a very distributed legacy antivirus environment. Through SentinelOne's platform, we were able to consolidate about eight different antiviruses globally, thus saving money and time."
- "There are things that they can do to improve the console or improve the product, and they are making strides in it."
What is our primary use case?
We use SentinelOne's EDR platform. We use Ranger for network discovery. It helps to find out any endpoints that do not have an agent or rogue devices that may come up on the network that are not protected. It allows us to isolate them until we have the proper protections in place.
We are starting to delve into Identity.
How has it helped my organization?
The EDR platform has helped us achieve our business goals by providing the best security against ransomware, which is the number one threat to our business.
We have seen a lot of benefits since we deployed SentinelOne many years ago. We were able to consolidate around eight different antiviruses globally. It saved us licensing costs, human capital, and the amount of time it takes to keep up with some of the legacy technologies.
Other than that, the product gives us so much visibility to things. We did not have that visibility before. It also gave us access to every endpoint globally from a single platform. My engineers and my SOC operators are able to touch every endpoint globally in a matter of seconds. We are able to consolidate all the data that we are getting from the platform. We then build rule sets and protections and automate playbooks to be able to help save time so that we can focus on some of the bigger threats that we have.
SentinelOne has had a huge impact on our risk management posture. In my viewpoint, any threats, especially with ransomware being the biggest threat to our business, can lead to downtime for operations. If manufacturers are not making the product, we are not making money.
SentinelOne has helped us improve our analyst efficiency because of the simple fact that it is a single singular platform where they have access to every endpoint data that is out there in the world in our scope of devices. It gives them the ability at their fingertips to dive deep into the telemetry data that they need to make a justification or make a decision about a threat.
SentinelOne helps us reduce noise. We also leverage SentinelOne Vigilance as a managed service provider, which takes away the load from my analysts. It enables us to develop playbooks to cut down the noise and helps us to prioritize what matters the most, which makes us way more efficient. It makes us speedier when it comes to the time to react to a threat.
SentinelOne, especially the Vigilance team, helps us to reduce false positives. It is not only because the technology itself is so good at what it does; it is also because of the information that we get related to a threat or an alert. The information is enough for us to have some sort of disposition on what that is. We can then write a rule or mute that through a click of a button so that it is not constantly coming to the surface.
SentinelOne helps us with our incident response process tenfold. We have so many options, from automation to using Purple AI, to give my analysts more confidence in their abilities. It is an amplifier. It is not a replacement. It is a way for them to build their confidence and skill set, but it also increases our efficiency and our time to respond to threats. The storylines with SentinelOne were probably one of the first things that caught my attention back when EDR was new to the market. They help the analyst develop a storyline or improve the storyline that they have already developed.
SentinelOne helps us with our mean time to detect by the fact that we have every endpoint consolidated into one platform. We have the prioritization based on the rule sets, the type of devices, the classification of the data it holds, or the classification of the department or the sensitivity of a manufacturing process in that environment. These methods help to cut the detection time for my analysts.
The platform provides multiple ways to communicate. With the addition of Vigilance and their main services, there is a very drastic reduction in the mean time to respond based on the information they give us. The information that we receive from those methods helps us to make a lot quicker decisions with the threats.
From an organizational perspective, SentinelOne helps me and empowers my team to be able to communicate to the business about some of the adversarial threats that we have in our environment. A lot of times when an endpoint or a production or line unit is impacted, the teams come to us with reports of a false positive, but in fact, it is not. SentinelOne helps us to educate, inform, and reinforce to the organization why we are here. We are here to help. We are here to help the business grow.
What is most valuable?
When we first looked at SentinelOne, we had a very distributed legacy antivirus environment. Through SentinelOne's platform, we were able to consolidate about eight different antiviruses globally, thus saving money and time. There were savings in terms of human capital or the amount of time it takes to keep up with some of those legacy technologies.
What needs improvement?
Like any vendor, SentinelOne had its challenges, but throughout our history as a partner and as a customer, they followed through with every commitment they made. That is huge. I do not look for a vendor, I look for a partner—a long-term partner. CISOs need partners to be successful. We have to lean on each other. There are things that they can do to improve the console or improve the product, and they are making strides in it. One value that I can bring to them is the fact that I am on the advisory board. As a customer, we bring problems or challenges or even opportunities to them that they take back to their product teams and marketing teams to come up with a solution. Being able to ride side by side with some of the developments they are making now, in the near future, or in the far future is pivotal to the success of a security organization.
For how long have I used the solution?
We have been using SentinelOne's EDR platform since 2018.
How are customer service and support?
The support teams speak various languages worldwide, which is beneficial for a multinational corporation like ours. We have teams across the world, and having support in native languages saves us time and increases efficiency.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We had a very distributed legacy antivirus environment before and selected SentinelOne for its consolidated platform.
We are also using a different SIEM solution currently but are considering migrating to full XDR in the future. We rely very heavily on managed services and Vigilance. We have a small security team, but over time, we will be able to build some hybrid models or hybrid approaches and start to go towards XDR.
When we looked at the EDR, having a single agent was a big deal. We have come a long way since then, but one of the primary reasons why we chose SentinelOne was their ability to package everything from a single agent.
What was our ROI?
The ROI is significant with SentinelOne, as it saves us money, time, and human resources by consolidating eight different antiviruses into one unified platform globally.
What's my experience with pricing, setup cost, and licensing?
SentinelOne makes licensing easy by reducing the number of modules or packages that they have to offer. A lot of other vendors make licensing very complicated with separate modules or separate costs. By bundling necessary features, SentinelOne ensures that security leaders are not left confused by options. This bundling of necessities has served our needs well.
As they bring on more technologies and more offerings, they are either bundled with the premium packages or other packages they have or they are bundled separately as another SKU.
Which other solutions did I evaluate?
We compared SentinelOne against its competitors while evaluating EDR solutions. SentinelOne stands out to me from the competition because they stand by every commitment they make. They are extremely transparent and extremely collaborative with the customer base. They take back everything that the customers bring to the table and make the product better. It is a two-way street. We also have to give. We are giving that money for a product, so we are investing in them. At the same time, we want to have a voice. They allow us to have a voice. The fact that they are a true partner sets them apart from the competition.
Their transparency, their willingness to work with customers and receive feedback, and the humility to admit their faults but figure out a way forward with their trusted partners or customers set them apart from the competition. They have done a good job of getting the endpoints correct. They have done a good job at saturating the market with such a good endpoint product. The endpoint data is the most critical telemetry data that we have. If you think about network and email, those are all delivery methods, but a crime is only committed at the target location, which is the endpoint. With that being the most valuable information we have, they have done such a good job with that. They are already there at the endpoint. There are a lot of other things they can do to improve the data that they have with things like identity and network discovery. There are opportunities where you take Purple AI out and put it on top and extend the width or breadth of your security team. You can extend the breadth of reach across multiple facets or multiple layers of defense from one single platform.
What other advice do I have?
AI is huge. It is a topic that comes with a lot of different variables. Some are good, and some are not so good. AI as a whole is not something to fear. It is no different than what mobile computing or cloud computing was. We have to embrace it. Embracing it empowers security organizations, security leaders, and security teams. It empowers them to make more and better decisions, and it also saves some time because a lot of the things that they are doing can be automated through the use of AI. It empowers the defenders, and by empowering them, it saves them time and allows them to focus on more important projects, more important topics, or more important threats. AI can help us cut down our mean time to detect and mean time to respond.
I have had several colleagues looking at SentinelOne and comparing them against some of the competitors, which is what you are supposed to do. To those who are considering purchasing SentinelOne, I would advise moving beyond the product. Do not just consider the product when evaluating SentinelOne. Focus on the leadership, product development teams, and their commitment to working closely with customers for long-term success.
SentinelOne is a true partner. We have had our issues. We have had our incidents. There were some times when I was desperate and needed help. They have been there. They are not there at the meat of it. They have traveled that road all the way to the end with me. That speaks volumes. To colleagues and people who are not yet using SentinelOne, I would recommend taking a look. Go beyond the curtain, the actual product, and the marketing. Look into the teams. Look into the leadership. Look into the success of other customers out there like myself. Call them. Talk to them. Challenge the product and challenge the teams, but do not let the first responses ever be the answer you go with. Continue to develop that relationship. That is what you should look for as a partner.
On a scale of one to ten, SentinelOne is definitely a ten. That is not just product-specific, customer support-specific, or road map-specific. A lot of different areas combined give it that score. Having a true partnership means that you are bringing everything to the table. You are helping each other grow.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CTO at Molecular Connections Private Limited
Easy to manage, zero-trust option and supports both Linux and macOS
Pros and Cons
- "SentinelOne supports both Linux and macOS."
- "Also, it didn't have much incident management built in."
What is our primary use case?
It's endpoint protection that also takes care of the server.
Mainly, we [my company] have a lot of systems on Linux. So when we were looking for an EDR solution, we evaluated all three top options: SentinelOne, CrowdStrike, and Carbon Black. We found CrowdStrike to be slightly better than SentinelOne in terms of features. But the only reason we chose SentinelOne was that its Linux agent was far superior.
We review our EDR solution every year. So far, it's been SentinelOne. Earlier, it was Trend Micro, I think. So we evaluate and change our protection software almost every year.
How has it helped my organization?
It is quite easy to manage our environment with the Singularity console.
We have policies in place to isolate any suspicious behavior from the network immediately. There's even a zero-trust option that we utilize.
Moreover, visibility into the attack surface and risk is good. It's protecting quite well. We do have incidents regularly, but no major ones at all.
When it comes to threat detection and prevention, it's quite sensitive and quite good.
We do the evaluation every year, so we always see something new that comes in. We evaluate across products and then choose the best one.
What is most valuable?
SentinelOne supports both Linux and macOS. All SentinelOne features were equally supported across Windows, Linux, and Mac, whereas CrowdStrike was more heavy on the Windows side. They did not support all features on Linux.
The Singularity console provides a unified view. But we already had similar dashboards available to the ones we had engineered ourselves. So it's not a deal-breaker. For us, it was about supporting multiple operating systems. That was more important. So, these dashboards we have are third-party tools integrated with SentinelOne.
What needs improvement?
SentinelOne could work on a more centralized dashboard.
Also, it didn't have much incident management built in.
For how long have I used the solution?
We've been using it all across for the last three years.
What do I think about the stability of the solution?
So far, I didn't face any major issue with stability. They communicate in advance about any maintenance downtime or updates. But so far, we haven't faced any outages.
What do I think about the scalability of the solution?
Scalability is quite seamless. We have people who work from home also. There are no issues. It scales across geographies, and we haven't had any problems.
How are customer service and support?
The customer service and support are good. Their responses are quick. We normally interact with them only over emails or their forums.
We never had to talk to them or call anybody. It's always been emails or forums, and it's been efficient.
The forums are really good, actually. As long as you follow their forums, that's more than enough, at least for us. I don't know about others, but for us, we found that asynchronous communication is more than sufficient.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
CrowdStrike was a bit better in terms of features. They had a much more centralized dashboard for tracking, In case of investigating incidents, the evaluating mitigation plans from the community were also good. They were much more mature in those incident management scenarios.
SentinelOne was just detection and isolation; it didn't have much incident management built in. But we have our own incident management function, so that wasn't a deal-breaker.
How was the initial setup?
The initial setup was quite easy and very straightforward.
What about the implementation team?
My team is familiar with most of these products, so for them, it was a breeze. There were no issues.
We normally take an evaluation period of 45 days. That's the trial period they give, during which we test everything and then give them the results.
What's my experience with pricing, setup cost, and licensing?
Overall, the price is very competitive. It's just relatively low compared to other products. The team told me it's something like 12% cheaper than CrowdStrike.
SentinelOne is much more cost-effective compared to other software because they offer a lot of flexibility in terms of licenses, which you can scale every month.
But others might have a more user-friendly, centralized console. If that's a need, then you have to pay a premium for that.
What other advice do I have?
Overall, I would rate the solution a nine out of ten. Considering what happened with CrowdStrike recently, it is all over the news.
The main point is that if you want feature parity across Mac and Linux, they should go with SentinelOne, not CrowdStrike. CrowdStrike may be very good for Windows, but that's also in question right now. We feel SentinelOne is a little better for Windows.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Security Principal at a venture capital & private equity firm with 1,001-5,000 employees
Reduces workload by consolidating functionalities into a single platform
Pros and Cons
- "APT and ransomware protection is valuable."
- "This technology is perfect for us."
- "They should host a data center in Saudi Arabia, making it easy for customers to go for a SaaS model."
- "Sometimes, support can be lacking. We would like to have more interactive sessions, which are not currently available."
How has it helped my organization?
Singularity Complete integrates well. We have changed our monitoring solution, and SentinelOne supports that solution. We are using SecureWorks to monitor our system. It is directly using the SentinelOne agent. All security logs for SentinelOne and other security products are being pushed to that one. SecureWorks consolidates all the logs and alerts, and we are getting 24/7 monitoring.
Singularity Complete significantly reduces alerts. It has reduced false positives by 30% to 40%.
Singularity Complete helps free up our staff for other projects and tasks. We have fewer false positives. We are very comfortable with it. Before, we had to provide extensive technical support for endpoint protection, but after installing the agent, administration became much easier.
Singularity Complete has been excellent, and we have not faced any issues in the last three to four years. It has reduced critical risks significantly.
Singularity Complete has reduced our mean time to remediate to a good level. It has also reduced the organizational risk.
We have used Ranger, but it is not always useful for us because most of our users are working from remote areas. It is a bit difficult for Ranger to identify them because they are working with some local networks. However, we are protecting our endpoints with the agents. It is mandatory for our technicians to install this agent.
What is most valuable?
APT and ransomware protection is valuable. We also use the Vigilance service from SentinelOne. It is a complete XDR platform for us.
What needs improvement?
Sometimes, support can be lacking. We would like to have more interactive sessions, which are not currently available. A chat service for technical support would also be beneficial. With other vendors, we are able to resolve small issues through the chat, whereas with SentinelOne, we have to open a ticket. Without a ticket, we cannot do anything. It takes more time.
They should host a data center in Saudi Arabia, making it easy for customers to go for a SaaS model.
For how long have I used the solution?
We have been working with SentinelOne since 2019. It has been almost five years.
What do I think about the stability of the solution?
For EDR, the solution is perfect. Over the five years of using it, many improvements have been made. Initially, there were issues, particularly on the management side, but now the console is much more stable.
How are customer service and support?
They can provide more interactive options for support. For example, a chat service would be beneficial.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we were using Trend Micro, which posed a lot of issues. Trend Micro has different products for different things. For example, they have a different product for servers and a different product for clients. For management and reporting, there is another product. We have to manage a lot of things in Trend Micro.
SentinelOne has consolidated these functionalities into a single platform, greatly reducing our workload.
How was the initial setup?
The SaaS model is better, but due to some regulations, companies are hesitant to go for it.
Deployment was challenging because we did not have software distribution capabilities at the time, and my technicians faced many challenges. I tried using group policy, and it worked for some clients, but not all, since half of my employees work remotely. Once deployed, agent updates were automated from SentinelOne.
Maintenance is not required because we are using the SaaS model. We do not have any servers to manage, as it is a SaaS-based solution. When there is a new agent release from SentinelOne, we just have to deploy it from the console.
We have different entities inside our organization. It took us three to four weeks to deploy to about 1,500 endpoints.
What about the implementation team?
My team handled the deployments. We had five to six technicians.
What was our ROI?
We have not faced any attacks since we implemented it. We had some critical incidents before this. In that respect, we have saved costs.
What's my experience with pricing, setup cost, and licensing?
Its cost is similar to Trend Micro, but the protection is much better. If you want protection, you have to pay the price.
What other advice do I have?
This technology is perfect for us. They are good at innovation and enhancements. We have good visibility across the network and endpoints. The product is continually improving, and I am very satisfied with it. I have already recommended it to a few people.
Overall, I would rate SentinelOne Singularity Complete a nine out of ten. There are areas for improvement, such as support and hosting data inside Saudi Arabia.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
AGM IT Security at Page Industries Ltd
Achieved enhanced endpoint protection with AI-based zero-day threat mitigation and improved incident response time
Pros and Cons
- "The XDR is a valuable feature."
- "I think they should consider enhancing complete visibility."
What is our primary use case?
I use it for our XDR solution, managing various endpoints including Windows and Deepak. There are around twenty-five hundred endpoints where SentinelOne EDR or the Synchrony Solution is installed, helping me manage all my files. It is a next-generation antivirus solution with zero-day protection using AI or ML-based logic running in the backend to protect endpoints. Currently, there is no integration. It's an independent solution supporting my endpoint protection.
What is most valuable?
The XDR is a valuable feature. The AI-based engine protects against various behaviors and takes action on files being accessed. In terms of protection, I have an advanced app providing visibility of all my endpoints, which was not the case before. My time to respond to incidents has reduced, making it much more complete. I have the ability to isolate endpoints if identified as having malicious files or serious activity.
What needs improvement?
I think they should consider enhancing complete visibility. I haven't explored the network-related aspects, but if lacking, it is an area for improvement. Providing a single pane of visibility for the end user would be beneficial. This means not just seeing endpoints, but also the network and other connected devices through the Singularity portal. This would enhance decision-making and improve security posture.
For how long have I used the solution?
I have used the solution for three years.
What do I think about the stability of the solution?
It's a stable solution. My endpoints use minimal resources, and I have encountered no problems with installation, making it a stable product.
What do I think about the scalability of the solution?
From the console or admin perspective, as it is a SaaS product, scalability and management pose no problems. It's all auto-scale and auto-categorized, configuring automatically.
How are customer service and support?
I think they were responsive, but there was a delay in reaching out to my team on one incident report. This happened only once, which is why I am rating them eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I had a normal antivirus solution before upgrading to the next-gen XDR solution, which is SentinelOne.
How was the initial setup?
The setup is very straightforward. It took one month. Connecting to users was a manual process, but all network-connected devices were integrated without any challenges.
What about the implementation team?
There was a three-member team from the vendor side assisting with configuration and communication with my internal team. One of my team members coordinated with the end customers, who are the employees of my organization.
What was our ROI?
There isn't significant cost saving as such, but it has protected me from numerous virus or malware infections. This demonstrates an ROI.
What's my experience with pricing, setup cost, and licensing?
It's a fixed price per endpoint arrangement.
Which other solutions did I evaluate?
I have not used alternative solutions for the XDR solution. We were using an alternative antivirus solution before, but finalized on SentinelOne after considering other options.
What other advice do I have?
I rate the solution nine out of ten. It prevented potential losses, though not directly affecting ROI. To make it work effectively, ensure proper configuration and understanding of your network landscape. Initially set it to detect mode, then to protect mode, and later to auto-protect and quarantine mode. Allow one to three months to understand the network and work with a knowledgeable partner.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Vice President IT at AS IT Consulting Pvt. Ltd.
Security correlations have boosted compliance operations and improve user productivity
Pros and Cons
- "The main benefits the end-user gets from Singularity Platform are, first, the program itself being very small, and then we get better output from applications running on their systems."
- "In my opinion, the real-time monitoring capabilities in Singularity Platform sometimes work and sometimes they don't, because there are a lot of false positives and people use unsigned applications which get deleted or quarantined by the product."
What is our primary use case?
My main use cases for Singularity Platform are compliance and security operations.
What is most valuable?
I have found the correlations in Singularity Platform to be the most valuable. The main benefits the end-user gets from Singularity Platform are, first, the program itself being very small, and then we get better output from applications running on their systems. The output of the users has gone up 50%, although I don't remember other benefits at this time.
What needs improvement?
There are a lot of false positives in that, which is why I'm not working with it. The use of the fraud detection feature in financial services in Singularity Platform depends on the compliances that are applicable to the organization, so it may be useful for some and may not be useful for others. I did that by myself, not with the help of Singularity Platform. In my opinion, the real-time monitoring capabilities in Singularity Platform sometimes work and sometimes they don't, because there are a lot of false positives and people use unsigned applications which get deleted or quarantined by the product. It's not a 100% foolproof solution.
A point for improvement for SentinelOne is that the false positives are huge since people in India, at least, are using homegrown applications which get blocked. Right now, Singularity Platform is working fine, but people have concerns about enhancements like website monitoring that can be done through Singularity Platform itself, so they don't need to buy any SASE products for people working from home to control their browsing. If that feature can be included, it will be a big advantage.
For how long have I used the solution?
I have been working with Singularity Platform for almost two years now.
What do I think about the stability of the solution?
I had some issues with that.
What do I think about the scalability of the solution?
I would rate the scalability a nine.
How are customer service and support?
Technical support will always be between six and seven.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup for Singularity Platform is very simple; the dashboard is quite simple, and the agents' installations are very simple, like one click, I would say.
What's my experience with pricing, setup cost, and licensing?
For pricing, I would say it's a six. It could be cheaper, as I understand.
Which other solutions did I evaluate?
The main competitor for Singularity Platform is CrowdStrike at number one, and the second is Trellix, which is coming up very fast. The leader on the market is still SentinelOne, but if they don't add some add-ons to their product like Trellix and CrowdStrike have, they may lag very soon. If we do only apple-to-apple comparison on Singularity Platform, then I'll give it ten marks.
What other advice do I have?
Singularity Platform functions as a security information and event management solution, and that is an inbuilt part of it. I believe in the correlations that I get because we work on it, but we don't use the Purple AI part of it. I'm not able to get clarity regarding the real-time personalization feature in Singularity Platform. I do not use the real-time personalization feature in Singularity Platform. It is a matter of false positives when people use it in my area.
Regarding the impact of Singularity Platform on supply chain processes, I don't have much on it, but it's a good product and the tracking is better with the log capturing and the data that we get from it. The customer does require customizations on the dashboards as per the requirement of their organizations; if it's manufacturing, medical, or financial institution or banking, then they will have different requirements for their dashboards, which are yet not available, so we have to actually build up those dashboards for them. I can recommend Singularity Platform to other users. I have provided this review a rating of 9.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
Last updated: Jan 20, 2026
Flag as inappropriateBuyer's Guide
Download our free SentinelOne Singularity Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Endpoint Detection and Response (EDR) Security Information and Event Management (SIEM) Endpoint Protection Platform (EPP) Anti-Malware Tools Extended Detection and Response (XDR) AI-Powered Cybersecurity Platforms AI ObservabilityPopular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Cortex XDR by Palo Alto Networks
Splunk Enterprise Security
IBM Security QRadar
Fortinet FortiEDR
Huntress Managed EDR
HP Wolf Security
Elastic Security
Microsoft Defender XDR
Trellix Endpoint Security Platform
WatchGuard Firebox
Buyer's Guide
Download our free SentinelOne Singularity Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between Carbon Black CB Defense, CrowdStrike, and SentinelOne?
- Which is better - SentinelOne or Darktrace?
- What do you recommend to choose when replacing Symantec EDR: SentinelOne or CrowdStirke Falcon?
- Cortex XDR by Palo Alto vs. Sentinel One
- Which solution do you prefer: CrowdStrike Falcon or SentinelOne Singularity Complete?
- Does SentinelOne have a Virtual Patching functionality?
- What is the biggest difference between EPP and EDR products?
- What is the difference between EDR and traditional antivirus?
- What is your recommendation for a 5-star EDR with low resource consumption for a financial services company?
- Which is the best EDR for a logistics company with 500-1000 employees?


















