SentinelOne

4.9 (Based on all products)

SentinelOne is a group of defense and intelligence experts saw savvy attackers compromising endpoints seemingly at will. Tradition... Read More

  • Products
  • User Reviews
  • FAQ’s

SentinelOne Overview

SentinelOne is a group of defense and intelligence experts saw savvy attackers compromising endpoints seemingly at will. Traditional approaches failed to provide sufficient protection. They founded SentinelOne to develop a dramatic new approach to endpoint protection. It’s one that applies AI and machine learning to thwart known and unknown threats.

SentinelOne Products


0 /5


5 /5


4.8 /5


5 /5


5 /5


4.8 /5


4.9 /5


4.9 /5

SentinelOne Rating & Reviews

95%

Highly Recommended

Overall Score

4.9/5
Based on 14 Reviews
  • Singularity complete
  • Singularity XDR
  • Singularity Signal
  • Singularity Control
  • Singularity Ranger
  • Singularity Core
  • Singularity Cloud

Pros

“I like that if a machine gets infected, we have the option of separating the machine from other machines in the network without having to disconnect the Internet. This prevents other computers in the network from getting infected. It has a central management console and there is no overload of manual investigation work for my in-house SOC team like before.” Daniel Fenn - Jun 29, 2021

“It is great at detecting potential threats, it even considers the most benign findings. All unwanted changes can be reversed with just one click. There is no need for extra scripting to resolve threats. The scans have a minimal impact on the endpoint itself. The remote shell feature is great for quick and secure access. I have used it on Linux and Windows.” Sandeep Singh - Jul 5, 2021

Cons

“One issue that I have is to get more details into the latest threats caught by Singularity Complete agent. I think more functionality should be given to the agent. Also, while it is easy to get started and has thorough documentation, the large amount of information can get confusing to look into sometimes. ” Daniel Fenn - Jun 29, 2021

“My main issue, and it's not huge, is that navigating to the information can be confusing on some screens.?While most of the options are given on the left-hand side, some tabs are also available on the top of the screen.” Sandeep Singh - Jul 5, 2021

DF

Daniel Fenn

2-100 Employees

Software user since: 6-12 months

5/5

5/5

5/5

5/5

5/5

9/10

“The software does root cause analysis and delivers automatic endpoint protection”

Pros :

Cons :

Reason for choosing the software :

Posted - Jun 29, 2021

SS

Sandeep Singh

2-100 Employees

Software user since: < 6 months

5/5

5/5

5/5

5/5

5/5

10/10

“I wholeheartedly recommend the software to other security professionals.?”

Pros :

Cons :

Reason for choosing the software :

Posted - Jul 5, 2021

Pros

“The deployment process was very simple. One of my favorite features is that it can take any form of data whether structured or unstructured, analyze it and discover threats from any tech product and platform. Other than this, we can integrate threat intelligence to avoid switching between applications and have more reliable detection from other third-party feeds.” Sk Sajid Ali - Jun 30, 2021

“It can automatically correlate heterogeneous data across the entire organization to detect any malicious behavior. It works well with our existing SOAR solutions and tools and has helped in streamlining our workflows. Also, we needed help troubleshooting an issue once when we initially deployed it. The support staff was quite helpful and the problem was resolved quickly.” Nomi Singh - Jul 4, 2021

Cons

“More transparency around interoperability with other apps, be it native or third-party ones, would be a great advantage. Other area of improvement is the agent update process. If this feature becomes automatic, it will be timely done unlike the current manual process. Other than that, our team never had any issues and it works great. ” Sk Sajid Ali - Jun 30, 2021

“Even though we had no issues with Windows PCs and servers, we had some minor issues with installation for MACs which were thankfully resolved. One improvement I would have liked for complete security control is simplifying the provision of user access and rights to accounts. So far, rest of the experience is great.” Nomi Singh - Jul 4, 2021

SS

Sk Sajid Ali

2-100 Employees

Software user since: < 6 months

5/5

5/5

5/5

5/5

5/5

10/10

“The software is easy to deploy and has a wide range of built-in integrations”

Pros :

Cons :

Reason for choosing the software :

Posted - Jun 30, 2021

NS

Nomi Singh

2-100 Employees

Software user since: < 6 months

4.7/5

4.5/5

5/5

5/5

4.5/5

10/10

“The software gives consolidated visibility into entire organization ecosystem”

Pros :

Cons :

Reason for choosing the software :

Posted - Jul 4, 2021

Pros

“From my experience, it provides complete insight into what are the potential threats and their possible impact based on the data harnessed from all sources. It provides daily, weekly, and monthly threat intelligence reports which are relevant to our company. The open platform gives room to our SOC and IT teams to take the right action on time.” Ullas Naik - Jun 29, 2021

“One thing I like is that you can bring in cyber data from other sources. The marketplace has many useful sandboxing solutions and there are integration options with threat intelligence data streams. Segregation of reports based on our organization’s location and size helps our team focus on emergent threats we are more vulnerable to in our industry.” Gopal Bhola - Jun 28, 2021

Cons

“While working with it, I noticed that there is a bit of a minor bug in setting the filters in case of some dashboard panels. For example, if I use the filter checkboxes at the top of the page that I have opened, you may or may not actually get the results in the low and medium threats category. This factor should be considered during next improvement. ” Ullas Naik - Jun 29, 2021

“While it has been a great solution and we should have brought it sooner, there are certain issues I have. Initially, I had to struggle while figuring out how to add an endpoint into the new group that I create.” Gopal Bhola - Jun 28, 2021

UN

Ullas Naik

2-100 Employees

Software user since: < 6 months

5/5

5/5

5/5

5/5

5/5

10/10

“This software has great customization options and provides actionable insights”

Pros :

Cons :

Reason for choosing the software :

Posted - Jun 29, 2021

GB

Gopal bhola

2-100 Employees

Software user since: < 6 months

5/5

5/5

5/5

5/5

5/5

10/10

“This software solves scalability issues and has numerous integration options”

Pros :

Cons :

Reason for choosing the software :

Posted - Jun 28, 2021

Pros

“I like that there is a centralized policy-based control which is easier to manage. Also, since it is customizable, my team could make the modifications according to our requirements. Another great feature is that it can control any USB device type or BLE device. This way we can avoid security vulnerabilities in the system due to USB and Bluetooth.” Lova Mani - Jul 2, 2021

“Initial deployment was simple as there were no network changes or additional infrastructure requirements. Its ability to assign network control depending on the physical location of the system is a great feature. Moreover, not having to worry about compliance with security KPIs is a huge relief. It is automatically done and my team is really happy!” Rajib Das - Jul 6, 2021

Cons

“The only issue I have is that for some of the services, there were no notifications in the admin console for user action and they were not allowed to start. ” Lova Mani - Jul 2, 2021

“I think that it would be great to have more automation in creating policies which is currently not present for all cases. This can decrease the time for deploying the system.” Rajib Das - Jul 6, 2021

LM

Lova Mani

2-100 Employees

Software user since: < 6 months

5/5

5/5

5/5

5/5

5/5

10/10

“The software identifies all unprotected endpoints and protects network devices”

Pros :

Cons :

Reason for choosing the software :

Posted - Jul 2, 2021

RD

Rajib Das

2-100 Employees

Software user since: < 6 months

4.7/5

5/5

4.5/5

4.5/5

5/5

10/10

“The software enables detailed network flow control and administrative clarity”

Pros :

Cons :

Reason for choosing the software :

Posted - Jul 6, 2021

Pros

“The setup was very easy and did not require any hardware or network changes. I was glad to see the simplicity of isolating suspicious devices from other managed devices and its understanding of the network. Another thing I like is how it instantly gives information about IP-enabled devices and product inventories located anywhere across the world.” Kiran Kumar - Jul 4, 2021

“I like that the existing agents are used as sensors and there is no need to install another agent. This makes it easily scalable. It fingerprints the OS and the role of every device. It builds an asset inventory for every scanned network and my team finds it very useful to export this data. Another great feature is that different networks can have different policies.” Umair Ali - Jul 1, 2021

Cons

“While it is great that it gives alerts about anything even remotely suspicious, sometimes they become too many. ” Kiran Kumar - Jul 4, 2021

“I do not have any major issues, just wanted to know more about the triggers and working of the alerts from the vendor. It should be more in depth for the users. ” Umair Ali - Jul 1, 2021

KK

Kiran Kumar

2-100 Employees

Software user since: < 6 months

5/5

5/5

5/5

5/5

5/5

9/10

“It is great for blocking unauthorized devices and reporting network information”

Pros :

Cons :

Reason for choosing the software :

Posted - Jul 4, 2021

UA

Umair Ali

Individual

Software user since: < 6 months

4.8/5

5/5

5/5

4.5/5

5/5

9/10

“Everything is transparent and scan policies are customizable by admins”

Pros :

Cons :

Reason for choosing the software :

Posted - Jul 1, 2021

Pros

“The software is easy to install, manage, and maintain. Additionally, the vendor gave us the choice of regional hosting and data storage locations. As protection against malware and malicious activities is not dependent on cloud, it is very reliable. Ability to integrate with MS Power BI was another plus that my team loved.” Joydevdutta - Jun 30, 2021

“It worked for all our desktops and servers including the legacy versions of Windows. With so many cyber threats out there, it was difficult to find an inclusive yet simplistic solution like this. It uses AI to predict and stop attacks. There is no data loss or recovery process is done in a click. There is no need to restore the system back to factory settings.” Ashish Grover - Jul 1, 2021

Cons

“The reporting capabilities could be further improved. Getting individual client reports would be great. ” Joydevdutta - Jun 30, 2021

“There were unexpected resource usage spikes on some of our devices, although they were later resolved by the support team. ” Ashish Grover - Jul 1, 2021

J

Joydevdutta

2-100 Employees

Software user since: < 6 months

5/5

5/5

5/5

5/5

5/5

9/10

“It protects against cyber threats and does not rely on virus definitions”

Pros :

Cons :

Reason for choosing the software :

Posted - Jun 30, 2021

AG

Ashish Grover

2-100 Employees

Software user since: < 6 months

5/5

5/5

5/5

5/5

5/5

9/10

“It has high interoperability and reverses unauthorized changes in one click”

Pros :

Cons :

Reason for choosing the software :

Posted - Jul 1, 2021

Pros

“My team works with MS Azure and this software is a great addition in our organization. It offers scalable deployment and we plan to expand further. Singularity Cloud offers high protection for Azure Kubernetes service and we have never faced issues yet. There is no container interference for ensuring runtime container protection.” Burhan Tailor - Jul 6, 2021

“There is just one agent for a worker node without any pod instrumentation. One multi-cloud console is present for all cloud infrastructure. Also, Storyline and EDR data retention options help prevent recurrence of the same issues. Apart from that, auto-deployment of Linux server Sentinels?to Google Compute Engine is impressive.” Nisha S Endloori - Jul 5, 2021

Cons

“I think that everything about the software is great so far. The only improvement I can think of is a custom language for deep visibility console searches.” Burhan Tailor - Jul 6, 2021

“Whitelisting and blacklisting should be easier. Instead of individual marking, it should be possible in bulk to save time. This option is not available yet. ” Nisha S Endloori - Jul 5, 2021

BT

Burhan Tailor

2-100 Employees

Software user since: < 6 months

4.8/5

5/5

5/5

4.5/5

5/5

9/10

“The software ensures protection of all cloud workloads using AI”

Pros :

Cons :

Reason for choosing the software :

Posted - Jul 6, 2021

NS

Nisha S Endloori

2-100 Employees

Software user since: < 6 months

5/5

5/5

5/5

5/5

5/5

9/10

“There is a single console to secure all user endpoints and IoT devices”

Pros :

Cons :

Reason for choosing the software :

Posted - Jul 5, 2021

SentinelOne FAQ’s

What type of company is SentinelOne?

SentinelOne is an IT solutions provider that caters to the process automation needs of millions of businesses in India with Endpoint Security Software and Cyber Security Software.

What does SentinelOne do?

SentinelOne provides customized and scalable Endpoint Security Software and Cyber Security Software, which is transforming business processes across industries. Its team of experts makes IT solutions implementation and usage quite simple.

What is SentinelOne’s main product?

SentinelOne primarily deals in Endpoint Security Software and Cyber Security Software and caters to personalized business needs with diverse modules.
  • Secure Payments 15000+
    Software
  • Secure Payments Best Price
    Guaranteed
  • Secure Payments Free Expert
    Consultation
  • Secure Payments 20 Lacs+
    Happy Customers