SentinelOne Vigilance and CrowdStrike Falcon Complete compete in the cybersecurity solutions category. SentinelOne Vigilance seems to have the upper hand with its strong recovery and reliability features, while CrowdStrike Falcon Complete shines in advanced intelligence and integration capabilities.
Features: SentinelOne Vigilance is known for its reliability, behavioral analytics, machine learning, and unique rollback feature for ransomware attacks on Windows with a 100% recovery promise. CrowdStrike Falcon Complete offers outstanding threat intelligence, AI functionality, and seamless integration with various tools, alongside strong real-time responses and low false positive detection rates.
Room for Improvement: SentinelOne Vigilance could enhance app compatibility with Microsoft Windows and better integrate with SIEM and SOAR solutions. It also requires improvements in predictive analytics, documentation, and support for mobile and Linux devices. CrowdStrike Falcon Complete needs enhancements in reporting, behavior detection, and performance optimization, as well as improved DLP, pricing, and offline capability.
Ease of Deployment and Customer Service: SentinelOne Vigilance offers diverse deployment options praised for stability but occasionally criticized for deployment challenges. Its customer support is reliable, though sometimes necessitating third-party assistance. CrowdStrike Falcon Complete is mainly deployed in public and hybrid clouds with straightforward setup, minimal technical support needs, and satisfactory customer service that can be improved.
Pricing and ROI: SentinelOne Vigilance is considered reasonably priced, offering savings on deployment and setup and positioned between next-gen and traditional solutions in cost. CrowdStrike Falcon Complete is acknowledged as more expensive, justified by its advanced features and security suite, with flexibility in licensing and feature management. Both solutions are viewed as valuable investments, offering positive ROI.
For the overall return on investment, both time and money, I would say it is a full 20.
The L1 engineer should be more technical to improve the support.
it could be quicker
I would rate the actual technical support from SentinelOne Vigilance a nine.
Once all objectives were met, the solution proved to be fully scalable.
I can deploy a number of clients without impact as long as there are a sufficient number of licenses.
It is easy to scale with the support of CrowdStrike.
The solution is stable, like Falcon, and does not cause any problems for the agent to work with minimal memory.
I find that it is very stable; however, there is always room for improvement.
I find it absolutely stable.
Areas that should be improved include noise reduction, prioritization, real-time delivery, and advanced threat coverage.
Patch management in vulnerabilities needs improvement.
For UI/UX, it is good, but I think they should keep up with the times.
Regarding disadvantages of SentinelOne Vigilance, there is no local hub server that I can use to download the updates and signatures only once.
From an enterprise level perspective, it should be reduced by approximately 20 to 25%.
The pricing, licensing, and setup costs in general are quite affordable.
We have achieved 100% success in detection with our clients and have no need for reclamation.
I find the automated response capabilities particularly helpful.
The solution offers seamless SOC extension, zero-day protection, advanced threat intelligence, and rapid incident containment.
I am actually able to synthesize machine learning with human experience to manage complex threats in IRs.
Product | Market Share (%) |
---|---|
CrowdStrike Falcon Complete MDR | 10.8% |
SentinelOne Vigilance | 6.0% |
Other | 83.2% |
Company Size | Count |
---|---|
Small Business | 35 |
Midsize Enterprise | 17 |
Large Enterprise | 30 |
Company Size | Count |
---|---|
Small Business | 15 |
Midsize Enterprise | 1 |
Large Enterprise | 6 |
CrowdStrike Falcon Complete MDR combines AI-driven detection, real-time threat insight, and robust endpoint protection to deliver a comprehensive managed detection response. It ensures rapid incident handling, integrates smoothly with multiple tools, and minimizes false positives while extending SOC capabilities.
CrowdStrike Falcon Complete MDR stands out with its AI-powered detection and efficient threat intelligence, offering a strong foundation for endpoint security. It features an intuitive dashboard, seamless integration with tools, and swift incident responses, all facilitated by its SOC extension. Users find value in its vulnerability management and lightweight deployment, which reduces false positives. This combines managed threat hunting with automated forensics, enhancing cybersecurity with proactive threat prevention and remediation. Suggested improvements include better reporting, SIEM integration, and performance enhancements to prevent slowdowns. Suggested better API documentation and expanded Linux support align with calls for improved offline intrusion detection and false positive management. Improved customization, integration with third-party tools, aesthetics, pricing, and training options are also desired.
What features make CrowdStrike Falcon Complete MDR valuable?In various industries, CrowdStrike Falcon Complete MDR is implemented to provide advanced endpoint protection for mobile and server security. Organizations leverage its threat intelligence, behavioral analysis, and vulnerability detection features to defend against ransomware, fileless attacks, and enable EDR functionalities. By facilitating threat hunting and incident response, they ensure continuous monitoring, often integrating with Microsoft Defender and other security measures for robust cybersecurity coverage and efficient patch management.
SentinelOne Vigilance provides reliable endpoint security with features like behavior analytics and ransomware protection, offering organizations capabilities such as third-party management and effective malware detection while maintaining low resource usage and kernel-independent operations.
SentinelOne Vigilance stands out by offering robust endpoint protection, utilizing machine learning and Storyline technology to enhance malware detection and prevention. Its rollback capabilities, impressive scalability, ease of use, and comprehensive analytics are consistently acknowledged. Monthly reports offer insightful analytics, and its 100% ransomware recovery commitment adds assurance. However, areas for improvement include better integration with Microsoft Windows, SIEM, and SOAR solutions, along with enhanced dashboard control and memory forensics.
What features make SentinelOne Vigilance effective?SentinelOne Vigilance is widely implemented within industries for endpoint protection and malware detection in environments like private clouds and on-premises, aiding ransomware prevention and integration with SOC teams. Businesses across sectors rely on it to protect infrastructure and manage endpoint activities effectively.
We monitor all Managed Detection and Response (MDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.