We compared SentinelOne Singularity Complete and ThreatLocker Protect based on our user's reviews in several parameters.
Based on user reviews, SentinelOne Singularity Complete and ThreatLocker Protect both have strengths in advanced threat detection and customer support. However, while SentinelOne's focus is on comprehensive protection and ease of use, ThreatLocker excels in providing granular control and visibility over file activities. SentinelOne users appreciate the platform's AI technology and user-friendly interface, while ThreatLocker users value its seamless integration with existing systems and effectiveness in preventing unauthorized access. Overall, both products have received positive feedback from users, with SentinelOne standing out for its proactive security measures and ThreatLocker for its granular control features.
Features: SentinelOne Singularity Complete stands out with its comprehensive threat detection, advanced AI, intuitive interface, and swift response to emerging threats. In contrast, ThreatLocker Protect offers advanced threat detection, seamless integration, ease of use, reliable blocking, granular control, and visibility over file activities.
Pricing and ROI: SentinelOne Singularity Complete and ThreatLocker Protect differ in terms of setup cost. Users have expressed their perspectives on the pricing, setup cost, and licensing of both products. While customers have shared insights about the cost-effectiveness and ease of setting up ThreatLocker Protect, opinions on the setup cost of SentinelOne Singularity Complete are also available., The ROI for SentinelOne Singularity Complete is driven by its comprehensive protection, real-time threat detection, and proactive security measures, while ThreatLocker Protect offers significant value and returns by enhancing security, preventing threats, and minimizing potential damages.
Room for Improvement: Users have provided feedback on SentinelOne Singularity Complete that highlights the need for improvements in system performance, user interface, customization options, reporting capabilities, and integration with other security solutions. On the other hand, for ThreatLocker Protect, user feedback specifically focuses on identifying the product's drawbacks.
Deployment and customer support: The user reviews for SentinelOne Singularity Complete indicate that the timeframe for deployment and setup are generally the same and should be considered together. However, the user reviews for ThreatLocker Protect highlight the variability in the time required for deployment, setup, and implementation phases., Customer service for SentinelOne Singularity Complete has been positively praised for its prompt and helpful assistance, as well as reliable and efficient support staff. On the other hand, ThreatLocker Protect's customer service also receives high praise for its prompt and helpful assistance, knowledgeable and efficient support team, and commitment to customer satisfaction.
The summary above is based on 148 interviews we conducted recently with SentinelOne Singularity Complete and ThreatLocker Protect users. To access the review's full transcripts, download our report.
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"It is stable and scalable."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"The product detects and blocks threats and is more proactive than firewalls."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"The most valuable feature of Singularity Complete is the Ranger function."
"The most valuable features are asset tracking, patching, endpoint tagging, and policy updates."
"The most valuable features are forensic investigation and ransomware prevention."
"The tool deletes the problem-causing process and prevents issues."
"The solution can search for hidden and dormant threats on encrypted traffic in your environment."
"It identifies what applications are vulnerable. If I go to the applications, such as Adobe Photoshop or Adobe Reader, I can see our current list of vulnerabilities: How many are vulnerable and how many need to be updated with patching. One of the most valuable aspects is the ease of finding specific vulnerabilities."
"The Microsoft integrations are most valuable right now."
"The most valuable feature is that it just unintrusively works in the background to carry out the protection."
"The sandbox functionality is fantastic."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself."
"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."
"Every single feature has been invaluable."
"Using ThreatLocker is effortless because I can access it from an app on my phone, so I can help clients after hours. My client had an issue while I was at dinner, and I didn't have a tech on the problem, but I could deal with it from my phone. I can see what the client is doing and approve or deny it. It helps me deliver better service to my clients when they need it."
"The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."
"The only minor concern is occasional interference with desired programs."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"Cannot be used on mobile devices with a secure connection."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"SentinelOne Singularity Complete should focus on analytical data. Backend aggregation can make things faster in the front end."
"SentinelOne should include Ranger Pro out of the box with Singularity Complete."
"It would help if they could get all the relevant threat information, the related events, in one place. Currently, we need to go to a number of places and do research. If they could have it all in one place, that would help investigations."
"In automation, if we could schedule when we run the task and on which systems we want to run the task, it would improve automation."
"We have had one or two occasions when we had to roll back off our Windows machine. Then, we had an issue with SentinelOne where we couldn't let the client make contact with the cloud service anymore. Therefore, the integration with the Windows Service Recovery could be improved in the future."
"There is not much flexibility in terms of policy fine-tuning. We can turn it off or turn it on, but, there's nothing much else to do. Everything is predefined. It's good in a way, but you don't get much flexibility if you want to do something particular."
"I am not a fan of the UI and feel it has room for improvement."
"The solution can use up a lot of resources when scanning. It would be ideal if it was lighter."
"From a reporting perspective, enhancing the ability to customize reports would be beneficial."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"Adding applications to the allowlist can sometimes feel overwhelming."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats."
"ThreatLocker Allowlisting needs to improve its user interface and overall workflow."
"ThreatLocker could offer more flexible training, like online or offline classes after hours. The fact that they even provide weekly training makes it seem silly to suggest, but some people can't do it during the day, so they want to train after work. They could also start a podcast about issues they see frequently and what requires attention. A podcast would be helpful to keep us all apprised about what's going on and/or offline training for those people who can't train during the week."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
More SentinelOne Singularity Complete Pricing and Cost Advice →
SentinelOne Singularity Complete is ranked 2nd in Endpoint Protection Platform (EPP) with 177 reviews while ThreatLocker Protect is ranked 26th in Endpoint Protection Platform (EPP) with 13 reviews. SentinelOne Singularity Complete is rated 8.8, while ThreatLocker Protect is rated 9.2. The top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace, Datto Endpoint Detection and Response (EDR) and Wazuh, whereas ThreatLocker Protect is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress, GravityZone Business Security and Fortinet FortiClient. See our SentinelOne Singularity Complete vs. ThreatLocker Protect report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.