

Find out in this report how the two Security Information and Event Management (SIEM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
It does not require hefty security budgets and can be deployed for enterprise security effectively.
The impact of a ransomware attack typically encrypts all critical data and stops production.
Large enterprises that can afford it often choose SentinelOne for its ease of management compared to other platforms.
If I estimate how much time it has saved me, I would say it has saved almost 30 to 40 percent of time compared to other tools.
Support is prompt and helpful.
Most of the time when my team encounters issues, they receive responses within 24 hours.
I have not faced any difficulties with Elastic Security, as we have a pretty good support service from them.
A lot of people have to reach out to one sole person who has basically developed the system, creating a bottleneck for responses.
On a scale of one to ten, the technical support of SentinelOne would be rated as an 8.5.
I would evaluate their customer service and technical support as very good, five stars.
It allows us to think about specific use cases, such as gathering malicious IPs in a single view and analyzing threats based on geolocation.
Elastic Security is quite scalable.
I have not run into any issues regarding how scalable Singularity Platform is, so I do not see any limitations for scalability.
Scalability is not an issue for Singularity Platform because it is delivered as a SaaS service, so scalability is taken care of by SentinelOne.
I believe that the system is scalable but it all goes back to personnel behind the scenes and the availability of those people, plus the knowledge they hold in terms of being able to bring larger clients onboard.
In terms of stability, I would rate Elastic a solid eight out of ten.
If I have to rate the stability level of Singularity Platform from one to ten, I would say it would be a strong nine.
The automation helps a lot, and once implemented, we face no further issues regarding stability or scalability; everything works absolutely fine.
The product is pretty stable, and even if the agent is offline, it will handle the threats.
CrowdStrike and Defender have more established threat intelligence integration due to having a larger client base.
My security testing team continuously reports vulnerabilities, and we have to fix and update the versions frequently.
Machine learning algorithms become better with time; as they ingest a huge volume of data, they become better.
When I find a log suspicious, if it automatically points out that a particular point in the log at a specific timing or frame is looking malicious, it would be easier for me.
Correlation in general is done very well with the storyline because it is the platform's own field for correlating data.
If you are asking if this is fully customizable, I would say it is partially customizable, not fully customizable.
The pricing is reasonable, especially for Small Medium Enterprises (SMEs), making it a viable option for businesses building their security infrastructure.
This is beneficial for SMEs as they do not need extensive budgets for security solutions.
Elastic Security is considered cost-effective, especially at lower EPS levels.
My philosophy is you pay for what you get, so if you decide to cheapen out on the cost of your platform, you are not going to get what you want.
As a SIEM tool, if it were priced less, many more people could explore it.
While it offers very good features at the enterprise level, it comes at a premium price.
Elastic Security offers good insight regarding alerts, reports, and cases.
Elastic Security offers advanced features such as machine learning and integration with ChatGPT.
We require rapid processing speed for alerts and event data, and Elastic Security is very efficient at handling this level of data.
Real-time monitoring is very much available in Singularity Platform because once the agent is up to date, it protects critical assets across our network against malicious attacks.
Singularity Platform's functionality for ransomware rollback is quite useful because if you have a ransomware attack, most EDR solutions do not have the feature to do a rollback and bring the system to its earlier state, but that is one of the unique features that Singularity Platform has which can be a game changer for customers.
This allows executives to determine if they have to liquefy any of their assets at a certain point in time, providing a great view in terms of risk management and current available cash balances while also considering the strategic direction in the next year or two where they plan on going with their cash balances.
| Product | Mindshare (%) |
|---|---|
| Elastic Security | 3.7% |
| Singularity Platform | 0.4% |
| Other | 95.9% |


| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 11 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 2 |
| Large Enterprise | 1 |
Elastic Security combines the features of a security information and event management (SIEM) system with endpoint protection, allowing organizations to detect, investigate, and respond to threats in real time. This unified approach helps reduce complexity and improve the efficiency of security operations.
Additional offerings and benefits:
Finally, Elastic Security benefits from a global community of users who contribute to its threat intelligence, helping to enhance its detection capabilities. This collaborative approach ensures that the solution remains on the cutting edge of cybersecurity, with up-to-date information on the latest threats and vulnerabilities.
One intelligent platform. Unprecedented speed. Infinite scale. Singularity™ enables unfettered visibility, industry-leading detection, and autonomous response. Discover the power of AI-powered, enterprise-wide cybersecurity.
The world’s leading enterprises use the Singularity platform to prevent, detect, and respond to cyber attacks at machine-speed, greater scale, and higher accuracy across endpoint, cloud, and identity.
Maximize visibility across the entire enterprise. Defend your enterprise with unrivaled speed, coverage, and efficiency. Leverage AI to respond across the entire connected security ecosystem.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.