No more typing reviews! Try our Samantha, our new voice AI agent.

IBM Guardium Vulnerability Assessment vs SentinelOne Singularity Identity comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

IBM Guardium Vulnerability ...
Ranking in Vulnerability Management
54th
Average Rating
6.0
Reviews Sentiment
8.1
Number of Reviews
4
Ranking in other categories
No ranking in other categories
SentinelOne Singularity Ide...
Ranking in Vulnerability Management
21st
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
22
Ranking in other categories
Advanced Threat Protection (ATP) (14th), Threat Deception Platforms (1st), Identity Threat Detection and Response (ITDR) (5th)
 

Mindshare comparison

As of May 2026, in the Vulnerability Management category, the mindshare of IBM Guardium Vulnerability Assessment is 0.7%, up from 0.4% compared to the previous year. The mindshare of SentinelOne Singularity Identity is 0.9%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Mindshare Distribution
ProductMindshare (%)
SentinelOne Singularity Identity0.9%
IBM Guardium Vulnerability Assessment0.7%
Other98.4%
Vulnerability Management
 

Featured Reviews

SL
Guardium Administrator at Interactive Group
Improvements sought in database optimization while benefiting from robust security monitoring
We use the analytical functionality of Guardium, but the analytical functionality is not so powerful or flexible because it does not include the application user ID. It only includes the database user ID. To identify risky users, it does not support end users, so IBM must incorporate this feature into the built-in analytical engine of the Guardium. There is only one problem I experienced while using Guardium: the internal database of the collector is MySQL, which is not so powerful or flexible. When you make a query in a MySQL database, it takes too much time to respond. IBM should replace this MySQL database with a more powerful internal database for the logging mechanism so that Guardium can collect logging data flexibly and ensure optimization. My overall experience with Guardium is good. The only problem is that IBM must replace the internal DB, MySQL, with a more powerful enterprise-level database because enterprises use it at an enterprise level, and MySQL does not support optimally.
Roftiel Constantine - PeerSpot reviewer
Global Chief Information Security Officer at Barry-Wehmiller
Provides proactive threat remediation, reduces alert volume, and enhances incident response capabilities
During our pre-purchase evaluation of SentinelOne's EDR capabilities three years ago, we were consistently impressed by the positive relationships customers reported having with SentinelOne's engineers, sales teams, and customer success managers. These strong relationships, evident in the customers' unsolicited feedback, highlighted the "soft skills" and intangible qualities that SentinelOne possessed. This positive customer experience has been mirrored in our own interactions with them. Their responsiveness to our needs, particularly when addressing a couple of challenges we faced, has been excellent. They proactively scheduled weekly meetings to demonstrate their commitment to resolving our issues, a customer-centric approach I admire. SentinelOne's dedication to customer service, including their rapid technology updates and responsiveness to our suggestions, has been crucial to our success in protecting our organization. Their ability to quickly incorporate our needs into new releases is truly impressive and sets them apart. Overall, I highly recommend SentinelOne based on our positive interactions across all levels of their organization.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The reporting features are good and there are many built-in reports that can be quickly configured."
"It helped with some of the regulatory requirements, and it also helped with some of the security analytics and analysis, making it worthwhile from that perspective."
"The best feature is that you can see the activity in your data environment and have the ability to get the vulnerability assessments done quickly with scores that can be compared."
"The Vulnerability Assessment feature is quite stable and helps identify numerous vulnerabilities in databases."
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"The most valuable feature is that it provides a simple English recommendation on actions that you need to take once a vulnerability is discovered."
"It helped with some of the regulatory requirements. It also helped with some of the security analytics and analysis. It was worthwhile from that perspective."
"Incident response is one of the key areas where the solution has been very useful. Whenever there is an incident, instead of being reactive, the government is now able to quickly gain the data that it needs to see what its end agency is also seeing and partner with them in real-time to look at the same data and to collaborate where needed, empowering the agency to be able to do their job."
"The biggest value for us is getting a much better picture of what our risks are."
"The protection provided by SentinelOne Singularity Identity is the most valuable feature."
"I like the detection and protection features. We don't need to do anything, and it will alert us when the mitigation is not successful. We only need to target those endpoints. Otherwise, we don't have to do anything about that."
"The threat detection capability is the most valuable feature."
"The AI-based detection, scanning, prevention and mitigation features are the most valuable features."
"The most valuable feature of SentinelOne Singularity Identity is its ability to detect based on behavior rather than just static signatures."
"Behind the scenes, SentinelOne has real people who evaluate problems and mark them as false positives. That's what I find most helpful."
 

Cons

"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"There is only one problem I experienced while using Guardium: the internal database of the collector is MySQL, which is not so powerful or flexible."
"The interface could be improved by having sub-groups of tests, ultimately making the process of collecting tests faster."
"It was not as easy to use. The user-friendliness of it was somewhat lower than what I was expecting. It was also lacking in terms of the ease of the setup. There should be an automatic agent for deployment."
"The only problem is that some of the reports come up with blanks and missing data."
"I wouldn't use it. That would be my advice to others looking into implementing IBM Guardium Vulnerability Assessment."
"Building policies is not that easy. There are some things that are turned off by default, for example, displaying values."
"To enhance our already strong partnership with SentinelOne, we should focus on improving collaboration."
"We've brought three critical items to their attention regarding vulnerability management."
"The first-level support has room for improvement."
"The root cause of automation could be better."
"We haven't received the expected support whenever we've had questions."
"I don't like SentinelOne's reporting tools. Their reports seem fine theoretically, but the issue is the sample size. For example, it will report that there were four incidents, and that equals 25 percent fewer incidents compared to the previous months. It would be a great improvement if I could expand the range to see reports for the last six months, but it's always one month. That would be an easy thing for them to resolve."
"Our engineers are dealing with issues to add exclusions to the antivirus for custom applications."
"The policies could be more precise, and Singularity should use more templates like alternative solutions have. Endpoint management is poor. We cannot manage individual endpoints and must rely on policies, exclusions, or block lists to apply settings to a group instead of the individual agent. If I have to make settings for one computer, I need to create a group, apply the configuration, and move the agent there. It's challenging to manage endpoints that way."
 

Pricing and Cost Advice

"One thing not advantageous for it was that it was a little bit more expensive. I would rate it one out of five in terms of pricing."
"Ideally, I would like SentinelOne to lower their prices a little bit."
"As a SentinelOne partner, we offer competitive pricing on comprehensive packages that include the SentinelOne license, our management services, and a proof-of-concept to ensure the technology meets your needs."
"Its price is a little bit high. It is a nice product, but it comes at a cost. Compared to other products, it is not cheap, but you sometimes have to pay for the value you get. It is not cheap, but it is worth it."
"The price is affordable."
"Compared to competitors, it's well-priced for the quality offered, and I don't see anyone surpassing them in that regard."
"The price of SentinelOne Singularity Identity is relatively high, but it offers numerous features and capabilities that make it well worth the investment."
"Their pricing has been fair, especially in the current market, and they haven't excessively increased prices at renewal times like many vendors do."
"The cost of SentinelOne Singularity Identity is better than CrowdStrike."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
30%
Government
6%
Healthcare Company
6%
Construction Company
6%
Manufacturing Company
8%
Computer Software Company
8%
Financial Services Firm
7%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise5
Large Enterprise13
 

Questions from the Community

What needs improvement with IBM Guardium Vulnerability Assessment?
We use the analytical functionality of Guardium, but the analytical functionality is not so powerful or flexible because it does not include the application user ID. It only includes the database u...
What is your primary use case for IBM Guardium Vulnerability Assessment?
We are still using IBM Guardium Vulnerability Assessment. We only use IBM Guardium Data Protection and monitoring, data protection and monitoring, classical Guardium. We only use classical Guardium...
What advice do you have for others considering IBM Guardium Vulnerability Assessment?
We do not use IBM Guardium Vulnerability Assessment for data encryption or any other tool for analytics, or identity and governance. We do not use any other solution except for protection and monit...
What is your experience regarding pricing and costs for SentinelOne Singularity Identity?
I have no visibility into pricing, setup costs, or licensing as the government handles these aspects directly with SentinelOne. We do the integrating, and they process the payments.
What needs improvement with SentinelOne Singularity Identity?
Regarding improvements, I believe that API integration in third-party applications could be better. The Singularity tool uses its own credential in the record features.
What is your primary use case for SentinelOne Singularity Identity?
One of the main use cases I describe is that we face lateral movement in our customer's server side. The customer is using 50 or more servers for the news channel, Daily Thanthi. Among those, one s...
 

Overview

Find out what your peers are saying about IBM Guardium Vulnerability Assessment vs. SentinelOne Singularity Identity and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.