

Cynet and SentinelOne Singularity Identity compete in the cybersecurity industry, both providing comprehensive security solutions. Cynet appears to have the upper hand in pricing and cost-effectiveness, while SentinelOne Singularity Identity excels with its cloud-native approach and AI capabilities for dynamic threat detection and response.
Features: Cynet offers user behavior analysis, autonomous threat blocking, and managed detection and response services, with simple management and no need for third-party integrations. SentinelOne Singularity Identity provides dynamic threat detection, behavior analysis-based threat response, and AI capabilities to prevent zero-day threats, emphasizing a cloud-native architecture.
Room for Improvement: Cynet could improve mobile support, reporting capabilities, and reduce false positives. SentinelOne faces challenges with endpoint management, requires better feature integration, and needs to clarify its licensing policy, alongside a need for enhanced management console features and reporting.
Ease of Deployment and Customer Service: Cynet offers flexible deployment options in public, private, and hybrid clouds, with praised 24/7 customer support, though technical support could improve. SentinelOne focuses on public cloud and on-premises deployments, receiving mixed customer service reviews, particularly about response times.
Pricing and ROI: Cynet is recognized for competitive, flexible pricing and affordability, making it attractive to cost-conscious users, while SentinelOne's higher pricing is justified by its comprehensive features. Both solutions provide a good return on investment by enhancing security and preventing cyberattacks.
The return on investment with Cynet is pretty good, as it doesn't require a dedicated resource to manage, being highly automated.
Based on our needs, they schedule remote sessions and resolve the issues.
My experience with the technical support of Cynet is excellent; they are just one click away.
Their SOC side support, when a threat is detected, is excellent.
They have been responsive to our needs as integrators and those of the client.
The solution is highly scalable.
We can deploy Cynet for 50,000 users, and we have deployed it at that scale, with the capability to scale higher to 100,000 users without any challenges.
The solution is easy to scale.
Within six years of usage, we have not had any issues such as outages or downtime.
There should be more options than deploying solely through group policy, as the assumption that GPO is working isn’t always the case.
One area where Cynet needs improvement is tamper protection for Mac and Linux agents.
Having a DLP feature would also add value.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
Cynet does not ask for additional costs for add-on features.
I think the pricing of Cynet is fair and one of the better options in the market.
The price of Cynet is reasonable considering its features and support.
These features manage our infrastructure's cybersecurity effectively.
The SOAR function, deception, and forensics are very useful.
The most valuable feature is the UBA (User behavior analysis). It has integration with SIEM solutions, allowing us to share our logs to third-party SIEM servers.
With visibility into endpoint telemetry, SentinelOne does provide useful information to find threat actors and empowers those who are in the business of threat hunting.
| Product | Market Share (%) |
|---|---|
| Cynet | 7.7% |
| SentinelOne Singularity Identity | 6.4% |
| Other | 85.9% |

| Company Size | Count |
|---|---|
| Small Business | 29 |
| Midsize Enterprise | 7 |
| Large Enterprise | 12 |
| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
Cynet provides comprehensive endpoint protection and advanced threat detection, offering intuitive deployment and monitored support. It ensures real-time visibility and minimal management, enhancing security for diverse and remote teams.
Cynet integrates seamlessly with existing infrastructure, providing an efficient solution for endpoint protection, threat detection, and response. Its automation, scalability, and stability are key benefits. Users benefit from real-time network visibility, ransomware protection, and deception capabilities. Cynet serves as a robust alternative to CrowdStrike, offering a multifaceted approach to security operations, especially in environments needing continuous threat monitoring and zero-day threat management. Areas needing improvement include mobile device support, enhanced reporting, third-party integrations, and AI-based detection.
What are Cynet's most important features?In the financial sector, Cynet's ability to support efficient threat detection and endpoint protection is crucial. Healthcare industries leverage its data protection features for compliance and security. In manufacturing, real-time threat monitoring supports safeguarding intellectual property. Retail sectors benefit from its scalability and minimal management demands, helping secure diverse, distributed locations.
Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.
Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.
Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.
By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.
We monitor all Threat Deception Platforms reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.