Arctic Wolf Managed Risk vs SentinelOne Singularity Identity comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Arctic Wolf Managed Risk and SentinelOne Singularity Identity based on real PeerSpot user reviews.

Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Arctic Wolf Managed Risk vs. SentinelOne Singularity Identity Report (Updated: May 2024).
770,924 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"We have a patch management solution that scans for any patches that can be applied and then applies these patches, but it doesn't hit everything. It also doesn't find all misconfigurations and things like that. Arctic Wolf Managed Risk kind of fills in the gaps and makes us aware of vulnerabilities or misconfigurations that exist out there. It does an agent scan for software versions and compares them to what CVs are out there and lets us know.""This solution has made huge strides in improving the awareness of our end users.""The most valuable feature of Arctic Wolf Managed Risk is being informed about what vulnerabilities there are exposed currently.""We get access to quarterly reviews with their team.""There are companies that do vulnerability scans. However, what adds value is when two experts come and sit with you to scan and patch the vulnerabilities. Any 50-member or small company that has an IT footprint carries risk from a cybersecurity perspective. These companies use tools but don't have the talent to leverage them."

More Arctic Wolf Managed Risk Pros →

"The threat detection capability is the most valuable feature.""Behind the scenes, SentinelOne has real people who evaluate problems and mark them as false positives. That's what I find most helpful.""The incident and threat logs are great.""Having high visibility into all of our network concerns and a customizable UI are the most valuable features.""The biggest value for us is getting a much better picture of what our risks are.""The most valuable feature of SentinelOne Singularity Identity is its ability to detect based on behavior rather than just static signatures.""The XDR capabilities are very good.""They have different levels of support. We have the highest level where they are constantly checking all the endpoints. If at any certain point, they identify that a computer has been triggered by a virus, a link, or something else, they would automatically tell us that within 15 seconds. If they notice something, they automatically send us an email saying that they noticed something in the computer, and they are going to block it."

More SentinelOne Singularity Identity Pros →

Cons
"Arctic Wolf Managed Risk needs to add more integrations.""It could be easier to use. They could present things in a little bit more ranked order rather than kind of giving you everything out there. It should highlight the really important stuff and make it easier to get to good rather than perfect.""As far as the product is concerned, I would really like the scanning feature to let us know that a threat has been addressed once we apply the relevant patch. We are not seeing this currently when running a scan.""The scalability could improve.""The best way to take this product to the next level would be to implement a patch management solution."

More Arctic Wolf Managed Risk Cons →

"The first-level support has room for improvement.""The primary reason for this discontent is that we frequently encounter performance issues with our servers.""The solution's query resolution time could be reduced further, and a faster resolution could be provided.""I don't like SentinelOne's reporting tools. Their reports seem fine theoretically, but the issue is the sample size. For example, it will report that there were four incidents, and that equals 25 percent fewer incidents compared to the previous months. It would be a great improvement if I could expand the range to see reports for the last six months, but it's always one month. That would be an easy thing for them to resolve.""The policies could be more precise, and Singularity should use more templates like alternative solutions have. Endpoint management is poor. We cannot manage individual endpoints and must rely on policies, exclusions, or block lists to apply settings to a group instead of the individual agent. If I have to make settings for one computer, I need to create a group, apply the configuration, and move the agent there. It's challenging to manage endpoints that way.""Sometimes I get kicked out of the console. I don't know why.""Our engineers are dealing with issues to add exclusions to the antivirus for custom applications.""We haven't received the expected support whenever we've had questions."

More SentinelOne Singularity Identity Cons →

Pricing and Cost Advice
  • "It depends on the company size quite a bit."
  • "The price of Arctic Wolf Managed Risk is reasonable compared to the competition."
  • "Arctic Wolf Managed Risk is reasonably priced and I rate it a four out of ten."
  • More Arctic Wolf Managed Risk Pricing and Cost Advice →

  • "The price is affordable."
  • "SentinelOne seemed to offer more while being priced lower than its competitors."
  • "The cost of SentinelOne Singularity Identity is better than CrowdStrike."
  • "The price of SentinelOne Singularity Identity is relatively high, but it offers numerous features and capabilities that make it well worth the investment."
  • "Ideally, I would like SentinelOne to lower their prices a little bit."
  • "The pricing is a bit high."
  • "Its price is a little bit high. It is a nice product, but it comes at a cost. Compared to other products, it is not cheap, but you sometimes have to pay for the value you get. It is not cheap, but it is worth it."
  • "SentinelOne Singularity Identity's pricing is cheaper than CrowdStrike and is really good."
  • More SentinelOne Singularity Identity Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    770,924 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:There are companies that do vulnerability scans. However, what adds value is when two experts come and sit with you to scan and patch the vulnerabilities. Any 50-member or small company that has an IT… more »
    Top Answer:Arctic Wolf Managed Risk is reasonably priced and I rate it a four out of ten.
    Top Answer:Arctic Wolf Managed Risk needs to add more integrations.
    Top Answer:Yes -- SentinelOne has a Virtual Patching functionality called Virtual Patching and Exploit Shield. This preventive security solution uses behavioral AI to identify and block zero-day attacks and… more »
    Top Answer:If a company is a Microsoft shop, it makes sense to stick with Microsoft tools. It doesn't have mature SIEM capabilities or root cause analysis. It does not have a seamless integrated log management… more »
    Ranking
    24th
    Views
    748
    Comparisons
    416
    Reviews
    3
    Average Words per Review
    378
    Rating
    9.0
    9th
    Views
    220
    Comparisons
    154
    Reviews
    14
    Average Words per Review
    1,156
    Rating
    8.6
    Comparisons
    Learn More
    Overview

    Delivered by security experts - Concierge Security® Team; the Arctic Wolf® Managed Risk solution enables you to define and contextualize your attack surface coverage across your networks, endpoints, and cloud environments; provides you with the risk priorities in your environment; and advises you on your remediation actions to ensure that you are benchmarking against configuration best practices and continually hardening your security posture.

    Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.

    Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.

    Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.

    By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.

    Sample Customers
    Zelle LLP, DNI Corp, Roper Pump, Baker Sterchi Cowden & Rice
    Information Not Available
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company15%
    Healthcare Company8%
    Manufacturing Company8%
    Financial Services Firm8%
    REVIEWERS
    Manufacturing Company21%
    Healthcare Company14%
    Retailer7%
    Logistics Company7%
    VISITORS READING REVIEWS
    Financial Services Firm17%
    Computer Software Company15%
    Manufacturing Company9%
    Government8%
    Company Size
    VISITORS READING REVIEWS
    Small Business33%
    Midsize Enterprise27%
    Large Enterprise40%
    REVIEWERS
    Small Business20%
    Midsize Enterprise27%
    Large Enterprise53%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise19%
    Large Enterprise57%
    Buyer's Guide
    Arctic Wolf Managed Risk vs. SentinelOne Singularity Identity
    May 2024
    Find out what your peers are saying about Arctic Wolf Managed Risk vs. SentinelOne Singularity Identity and other solutions. Updated: May 2024.
    770,924 professionals have used our research since 2012.

    Arctic Wolf Managed Risk is ranked 24th in Vulnerability Management with 5 reviews while SentinelOne Singularity Identity is ranked 9th in Vulnerability Management with 14 reviews. Arctic Wolf Managed Risk is rated 8.6, while SentinelOne Singularity Identity is rated 8.6. The top reviewer of Arctic Wolf Managed Risk writes "Reasonably priced with helpful quarterly reviews and excellent reporting". On the other hand, the top reviewer of SentinelOne Singularity Identity writes "It offers deep and continuous visibility into our attack surface". Arctic Wolf Managed Risk is most compared with Rapid7 InsightVM, Tenable Nessus, Qualys VMDR, Adlumin Security Operations Platform and Wiz, whereas SentinelOne Singularity Identity is most compared with Microsoft Defender for Identity, Qualys VMDR, Tenable Vulnerability Management, Microsoft Defender for Office 365 and SailPoint IdentityIQ. See our Arctic Wolf Managed Risk vs. SentinelOne Singularity Identity report.

    See our list of best Vulnerability Management vendors.

    We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.