Try our new research platform with insights from 80,000+ expert users

CRITICALSTART vs SentinelOne Singularity MDR comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 18, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CRITICALSTART
Ranking in Managed Detection and Response (MDR)
32nd
Average Rating
9.4
Reviews Sentiment
7.3
Number of Reviews
10
Ranking in other categories
Security Orchestration Automation and Response (SOAR) (28th)
SentinelOne Singularity MDR
Ranking in Managed Detection and Response (MDR)
25th
Average Rating
8.0
Reviews Sentiment
7.7
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Featured Reviews

JH
The transparency of data in the platform is perfect: You see everything as they are seeing it
Their Zero Trust Analytics Platform (ZTAP) engine, which is kind of their correlation engine, is by far and away one of the best in the business. We can filter and utilize different lists to build out different alerts, such as, what to alert on and when not to alert. This engine helps reduce our number of alerts and false positives. The service's Trusted Behavior Registry helps the provider solve every alert. The way that they have it built out is very intelligent. The way every alert comes in, it gets triaged one direction or another. If it is already a false positive, then it is still getting addressed and reviewed on a regular cadence. Also, true positive alerts get escalated to the appropriate personnel. Its mobile app is great. The ability just to be able to quick reference and see what's coming in when you're on the move or go. You don't always need to have your computer or laptop handy, because you can operate it just from the mobile app. It can communicate with analysts, which is great. The mobile app is great at affecting the efficiency of our security operations. Those guys are using it throughout the day, whether that be at the office, home, or off hours. Typically, they triage from the mobile app. Then, if an escalation needs to be done on a computer, they will pull out a computer. We were on the original UI for a few years, so the updated UI has been a refreshing change. It has significantly more ability to filter and translate data, then load that data. It is rather intuitive to click through for some of our junior analysts or interns, especially as we are starting to onboard and teach them different aspects of the security operations team.
Prathamesh Samant - PeerSpot reviewer
Effective integration and threat hunting capabilities boost operational ease, but interface improvements are needed
I would like to improve the dashboard in SentinelOne Singularity MDR, as it could be much better, along with the reporting structure. The granularity of policies and ease of policy management from the console could be made better, while my experience from a feature standpoint has been good overall. Regarding summary reports provided from SentinelOne Singularity MDR, I find the reporting structure could be much better in terms of granularity. Additionally, for C-suite executives, there can be more non-technical content that provides a bird's eye view of organizational risk posture, rather than just detailed technical analyses. This high-level perspective on the organization's risk would be highly beneficial at the management level.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of their service is their tuning... If we were getting 1,000 alerts a day without them, they tune it until they know what to do for 999 of them, and one will make it through to us per day. That tuning is the most valuable part of their solution."
"There is a team of people who monitor our traffic and processes 24/7, so if anything raises a flag or alert, it will escalate back to me right away. That's the most incredible part: Humans working behind the scenes 24/7 to monitor our networks."
"I also use their mobile app. It's very easy to use and very convenient to be able to respond to alerts wherever you are. I love the app. You can respond and communicate, per ticket, with their SOC in near real-time. The response is very quick."
"Outside of using the platform to manage alerts, the feature of the service that we get the most value from is being able to reach out to them and say, "Hey, we might go buy a SIEM," for example. They give us their overview of what's out there, what they've dealt with, what they integrate with, and what that looks like. That's been pretty powerful over the years for us."
"From where we were prior to going into them, the service has increased our analysts’ efficiency to the point that they can focus on other areas of the business. It gives me the ability to allow analysts to do Level 3 and 4 work and stay out of the weeds of the alerts, where you tend to get alert fatigue. The service takes care of much of the Tier 1 and Tier 2 triage. It is more effective than what we had been used to, because it allows the filtering of Level 1 and Level 2 type alerts to be taken care of. This leaves less for us to handle, which is a good thing."
"My impression of the transparency of the data is that it has good detail. It allows you to see how many events have come in, how many of those events have made it down to their analysts to review, and then however many from their analysts to be able to close out, have been able to been escalated to us. It's a good metric that we can share with my management. They see the value of what the SOC is bringing on top of what my team is already doing."
"Their Zero Trust Analytics Platform (ZTAP) engine, which is kind of their correlation engine, is by far and away one of the best in the business. We can filter and utilize different lists to build out different alerts, such as, what to alert on and when not to alert. This engine helps reduce our number of alerts and false positives."
"The main difference between the other options and this one is the quality of the personnel within the SOC. It's their knowledge and depth and the way they handle customers."
"The main benefits that clients receive from SentinelOne Singularity MDR, from an operational perspective, include ease of deployment, where the installation process across various operating systems and different hardware configurations goes smoothly with minimal impact on end users."
"The impact of the threat hunting capabilities on detecting known and emerging threats in real-time is notable, and with the AI, it helps for real-time threat hunting."
 

Cons

"There is room for improvement with the new UI, and that's about it. I would like to see a more intuitive design."
"They could dig a little bit deeper into the Splunk alerts when they feel like they need to be escalated to us. For example, if a locked account shows up, they could do a little extra digging to verify that the locked account was due to a bad password on the local system. They could just do a little extra digging within the Splunk environment instead of pushing it onto us to go do that extra little digging."
"It has frustrated us that they don't have a native Slack integration, because most things do now. That's something we've asked for, for years, and it just doesn't really seem like it's a priority."
"The biggest room for improvement is not necessarily in their service or offering, but in the products that they support. I would like them to further their knowledge and ability to integrate with those tools. They have base integrations with everything, and we haven't come across anything. They should just continue to build on that API interface between their applications and other third-party consoles."
"The UI has become slower but it's not something I would call them out on."
"The updated UI is actually pretty bad. Regarding the intuitiveness, it is fairly easy to use, but the responsiveness, on a scale of one to 10, is a one. It's really poor performance."
"The only thing I can think of that I would like to see, and I'm sure they could work this into a service pretty easily, is not only alerts on issues that are affecting my company, but some threat intelligence of a general nature on what's out there in the environment. That might be a nice add-in."
"They just did a user interface overhaul to the website portal that you use for troubleshooting tickets. The old one was fine. The new one is not intuitive..."
"The integration with Microsoft 365 for SentinelOne Singularity MDR isn't quite as effective as with Field Effect."
"I would like to improve the dashboard in SentinelOne Singularity MDR, as it could be much better, along with the reporting structure."
 

Pricing and Cost Advice

"Overall, for what I'm paying for it, and the benefit I'm getting out of it, it is right where it needs to be, if not a little bit in my favor. For what it costs me to actually have this service, I could afford one internal person to do that job, but now I have a team of 10 or more who are doing that job, and they don't sleep because they work shifts."
"I've told CRITICALSTART that I think the managed service they provide is cheaper than it should be. It's a really good deal."
"The pricing of other services was so insane that they weren't even an option."
"As far as the expense goes, it's very competitive pricing and the services you get are almost like you have a person on your team."
"There are contractual penalties if their SLAs are not met. This commitment was very important in our decision to go with this service, because not having downtime is extremely important to us. The providers has not missed an SLA in the 18 months that I have worked with them."
"The pricing has always been competitive. They have always been good to us. They will make it a fight. They don't try to hide anything; it's always been fully transparent and well-worth what we pay for it."
"It costs a lot for what we felt comfortable to spend."
Information not available
report
Use our free recommendation engine to learn which Managed Detection and Response (MDR) solutions are best for your needs.
857,162 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Real Estate/Law Firm
12%
Healthcare Company
12%
Financial Services Firm
11%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What needs improvement with SentinelOne Singularity MDR?
I would like to improve the dashboard in SentinelOne Singularity MDR, as it could be much better, along with the reporting structure. The granularity of policies and ease of policy management from ...
What is your primary use case for SentinelOne Singularity MDR?
We have been using SentinelOne Singularity MDR for threat hunting and correlation, particularly when we identify if some kind of IOCs has been detected or if processes are found malicious. We then ...
What advice do you have for others considering SentinelOne Singularity MDR?
We currently work with multiple vendors since I work for a cybersecurity solution company, and in the EDR space, we are engaged with CrowdStrike and SentinelOne Singularity MDR. We work with Sentin...
 

Also Known As

Critical Start, CriticalStart
No data available
 

Overview

Find out what your peers are saying about CrowdStrike, Huntress, Field Effect and others in Managed Detection and Response (MDR). Updated: May 2025.
857,162 professionals have used our research since 2012.