We performed a comparison between CrowdStrike Falcon Complete and SentinelOne Vigilance based on real PeerSpot user reviews.
Find out in this report how the two Managed Detection and Response (MDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable part of Binary Defense is its team of cybersecurity analysts. Their analysts filter out the noise and only forward the critical threats that require a response instead of false positives."
"One of the main benefits of Binary Defense MDR is the ability to easily meet with their support team to discuss any issues we encounter."
"The speed at which their services are reactive is valuable. Nowadays, when a threat hits an endpoint, you've got minutes, not hours or days. Their average response time is about four minutes on an alert. For anything that needs to be sent to us, it's about fourteen minutes, which is pretty good. They're the third SOC that I've used in fifteen years. By far, they are the quickest ones to act. When you're looking at prevention, that's a key factor."
"The case interface is Binary Defense MDR's most valuable feature."
"Binary Defense's most valuable feature is the 24/7 monitoring and threat hunting. Their team checks the latest breaches and how they're done."
"The biggest aspect for us is that they are able to conform to our environment and utilize our tools. That way, we still maintain ownership of all the data and access to the applications, and we never lose control of the ability to run the solution ourselves if we need to."
"With Binary Defense, we don't just get an alert, but also a detailed rundown of why they're alerting us on it. They tell us what was executed, or the username, script, or IP. That way, we're not wasting time investigating."
"The most valuable feature is reviewing tickets and the notes added by technicians."
"I would recommend Falcon Complete for anyone looking for a cheaper alternative that's almost the same quality as Cortex."
"The solution is quite flexible."
"It's a stable application. It is one of the most stable out of all the other market applications, especially if you're talking about within the EDR platform."
"Falcon Complete's best features are its detailed reporting and user-friendliness."
"Falcon Complete's best feature is detection. The interface is also user-friendly."
"The overwatch module is the most valuable feature of CrowdStrike Falcon."
"The system is valuable as it is a fully managed endpoint protection service designed to stop breaches, detect threats, and respond to incidents effectively."
"The most valuable feature is AML-based threat detection."
"The most valuable feature is protection against ransomware and malware."
"The most valuable feature of the solution is its performance, which is very important for us in our company."
"SentinelOne is a comprehensive solution for protecting SOAP-based web services and AWS-based cloud infrastructure."
"SentinelOne Vigilance is a very stable solution."
"The product is stable."
"SentinelOne Vigilance has very good detection."
"Stable solution for protecting, deploying, and managing endpoints, and comes with valuable features such as behavioral analytics and machine learning."
"The most valuable feature is that it works and isn't compromised. Other solutions I have used have all been compromised and SentinelOne is the only one that hasn't been compromised as far as I understand."
"The current reporting system could benefit from improvement."
"I don't find any downside to them, but if I have to put one, it would be consistent manpower or staffing. The only area where the solution can be improved is going to be with people. As they grow, they are struggling with the same thing that every other company is, which is getting talent and getting that talent to stay, but they've just revised their tiering system to go from a flat analyst and manager to a three-tier solution where it goes through two or three before it gets elevated. That seems to have worked out well, so if one level misses it, the next one picks it up, and it works out fine."
"Binary Defense MDR could be even better with additional features, like automatic scans and file quarantine."
"If I were shopping for an MDR solution today, I would not only look for a company that has the ability to alert, detect, and remediate, but also the ability to integrate vulnerability management. That's a big thing that they're lacking today."
"We found a couple of bugs in the user interface."
"It's hard to think of anything that they need to improve on, but just to point out something, I would like to see them provide advanced XDR."
"It's sometimes difficult to know when to engage Binary Defense or TrustedSec, their sister company. TrustedSec is more focused on offensive security, as opposed to the defensive security that the MDR solution provides. It would be awesome if there were a better bridge between that relationship for when we need to get more proactive services or when we need to do a penetration test."
"The only area I see for improvement with Binary Defense is their service portal. It could benefit from some enhancements."
"CrowdStrike Falcon Complete could improve by having advanced features, such as SOC, and HDR. There would have been a lot of processes involved."
"Its support should be improved. The product is amazing, but the problem is that their support team is overconfident about the product. If something happens, they don't listen. They keep arguing with the customer. It should have more reporting. Reports are not that customizable. We need customizable reports for our customers, but they not there in CrowdStrike as well as SentinelOne."
"The logging features aren't robust and the information isn't kept long enough."
"The performance slows down by between 10% and 40%, depending on what type of work the machine is doing."
"What could be improved in CrowdStrike Falcon Complete is the threat hunting feature and the insights it provides, in particular, the variable analysis feature. Protection against zero-day threats and sandboxing could also be improved in CrowdStrike Falcon Complete. If you compare it with other solutions, it can go head-to-head, but the features I mentioned still need improvement."
"Its reporting feature could be user-friendly."
"The customization could be tweaked. We can do a bunch of custom dashboards. However, the one thing that I'm not a fan of is when you go to do an investigation, the way that the processes are laid out on the screen is very bland looking. While the information is there, it could be laid out better."
"It would be good if they fleshed it out a bit more, possibly with additional areas such as security awareness training. They could build that in. They're leveraging the same endpoint base that they have the security software on, but then they could offer a centralized portal or hub whereby someone like me could leverage it to track and put out security awareness training for people on all the common topics. I could have a centralized hub for everyone's results from that training and for the evidence that training occurred. It would be relatively straightforward, but it would add a lot for people in the compliance area. It would be a great expansion."
"SentinelOne Vigilance could improve if it provided us with more control over the dashboard."
"When upgrades are required on the server, you need to almost remove SentinelOne Vigilance completely off the system. We put SentinelOne Vigilance on silence for the monitor mode, but we were having trouble upgrading the server. I had to remove SentinelOne Vigilance completely from the server, but that meant that all the previous logs of attacks I wanted to look at on the server were gone. This is one thing they need to improve, they need better compatibility with the Microsoft Windows service. I should not have to remove the agent completely to upgrade the service."
"Sometimes, SentinelOne Vigilance also detects false positives, which are not true. In such cases, we need to make changes in the policies on the dashboard accordingly."
"Occasionally during an update, customers may temporarily be without protection until the upgrade is complete."
"It is not easy to remove the customer without the dashboard."
"The process to replicate exclusions is not user-friendly."
"It's too early to say what needs improvement."
"I have found issues with the solution’s stability and implementation. The solution has performance issues. I would like the solution to launch the rollback plan for ransomware on Linux and Mac. It should be something similar to the support that Windows gets."
CrowdStrike Falcon Complete is ranked 1st in Managed Detection and Response (MDR) with 74 reviews while SentinelOne Vigilance is ranked 3rd in Managed Detection and Response (MDR) with 17 reviews. CrowdStrike Falcon Complete is rated 8.6, while SentinelOne Vigilance is rated 8.4. The top reviewer of CrowdStrike Falcon Complete writes "Great next-generation antivirus with breach warranty and good intrusion protection". On the other hand, the top reviewer of SentinelOne Vigilance writes "Very easy to use with multiple options for licensing and scaling". CrowdStrike Falcon Complete is most compared with Arctic Wolf Managed Detection and Response, Blackpoint Cyber MDR, Secureworks Taegis ManagedXDR, Sophos MDR and Huntress, whereas SentinelOne Vigilance is most compared with Huntress, Blackpoint Cyber MDR, Secureworks Taegis ManagedXDR, Sophos MDR and Arctic Wolf Managed Detection and Response. See our CrowdStrike Falcon Complete vs. SentinelOne Vigilance report.
See our list of best Managed Detection and Response (MDR) vendors.
We monitor all Managed Detection and Response (MDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.