We performed a comparison between Trend Micro Apex One and SentinelOne based on our users’ reviews in four categories. After reading all of the collected data, you can find our conclusion below.
Comparison Results: Based on the parameters we compared, Trend Micro Apex One comes out ahead of SentinelOne. Our reviewers found that SentinelOne's deployment time may vary, which could be an inconvenience for some customers, it also lacks reporting, policies, and endpoint visibility, which are important for many organizations.
"The solution was relatively easy to deploy."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"The most valuable feature is the analysis, because of the beta structure."
"The product's initial setup phase is very easy."
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"Deep Visibility is a valuable feature."
"The most valuable features of SentinelOne are the lateral movement and the use of the Active Directory."
"The Deep Visibility feature is the most useful part of the EDR platform. It gives us good insights into what is actually happening on the endpoints, e.g., when we have malicious or suspicious activity. We came from a legacy type AV previously, so we didn't have that level of visibility or understanding. For simplifying threat-hunting, it is extremely useful, where traditional techniques in threat hunting are quite laborious. We can put in indicators of compromise and it will sweep the environment for them, then they would give us a breakdown of what assets have been seen and where they have been seen, which is more of a forensics overview."
"Our impressions of the solution's ability to ingest and correlate across our security solutions is perfect."
"The deep visibility is really important for us. With it, we can really look deep into some of the incidents."
"The initial setup is very straightforward and easy."
"The anti-ransomware capability to analyze the threats and user-friendliness are the most valuable features."
"The hunting feature is most valuable for detecting malicious or suspicious activity."
"The main benefit is the threat intelligence network of Trend Micro."
"The number of accessories included is the most valuable feature."
"We don't use application control but instead, we use behavior monitoring, which is a good feature. The real-time scanning, data loss prevention, and endpoint sensor we use are beneficial"
"It's a good solution, and they have something called Suite incorporating many, many engines like encryption, GLB, anti-virus."
"It is available on our OS platform and will automatically scan our machines daily or weekly."
"The solution offers good community support."
"Its ability to detect ransomware and malware is the most valuable. Its protection is also good."
"The most valuable feature is Vulnerability Protection."
"ZTNA can improve latency."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"FortiEDR can be improved by providing more detailed reporting."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"I haven't seen the use of AI in the solution."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"The grouping feature needs improvement."
"The reporting needs improvement and I would like to see a more granular level of administrative privileges."
"I would like SentinelOne to add a threat-hunting report and more UEBA features. They could add more SIEM functionality. It would be nice to have the ability to easily drag all the logs from the agents, so there's no need for multiple agents installed on the endpoint."
"Improvements for SentinelOne's Singularity Complete could include adjusting pricing for specific markets, ensuring affordability, and better alignment with customer expectations in those regions."
"Communication and documentation could be improved."
"It would be good to see some small tools to test files or hashes that are a potential threat, I know there are already products offering this."
"Their documentation could afford to be a little bit better communicated. A lot of times we have to look at things in the knowledge base, and much of that could be communicated better, but that would probably be the only thing that needs to be improved."
"The speed of investigation of the MDR service team must be improved."
"I think that this product needs to improve the data loss prevention port."
"I would like to see a sandboxing feature in the next release - which is currently something being supported by a third party - in addition to EDR capability on the cloud applications."
"The product can be a bit heavy."
"I don't give it a perfect 10 because of the Active Directory integration. It would make things easier if the Active Directory were integrated more seamlessly."
"The CPU usage when scanning is too high and we have run into bottlenecks were it consumes a lot of CPU time."
"Sometimes HTTPS sites are not blocked properly."
"The main thing they need to improve is their reporting functionality and the forensics for their on-premise consult. They do not have very good reporting features or forensic functionality in the on-premise version. They need to improve that."
"It would be ideal if the solution could be simplified a bit."
More SentinelOne Singularity Complete Pricing and Cost Advice →
SentinelOne Singularity Complete is ranked 2nd in Endpoint Protection Platform (EPP) with 177 reviews while Trend Micro Apex One is ranked 6th in Endpoint Protection Platform (EPP) with 125 reviews. SentinelOne Singularity Complete is rated 8.8, while Trend Micro Apex One is rated 8.2. The top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". On the other hand, the top reviewer of Trend Micro Apex One writes "We can get consolidated logs of suspicious objects and malware attacks in a single console". SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace, ThreatLocker Protect and Wazuh, whereas Trend Micro Apex One is most compared with Trend Micro Deep Security, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon and Intercept X Endpoint. See our SentinelOne Singularity Complete vs. Trend Micro Apex One report.
See our list of best Endpoint Protection Platform (EPP) vendors and best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.