We performed a comparison between Microsoft Defender Vulnerability Management and SentinelOne Singularity Identity based on real PeerSpot user reviews.
Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution helps identify threats and vulnerabilities."
"The product's stability is very high...The scalability of the product is amazing."
"One valuable feature is the Microsoft Security Scorecard."
"The product’s most valuable features are compliance, recommendations, and inventories."
"The solution is up-to-date and helps prevent zero-day attacks."
"SentinelOne Singularity Identity is very lightweight as an agent or software."
"I like the detection and protection features. We don't need to do anything, and it will alert us when the mitigation is not successful. We only need to target those endpoints. Otherwise, we don't have to do anything about that."
"The threat detection capability is the most valuable feature."
"The XDR capabilities are very good."
"One of the top things we're interested in is cloud protection."
"The most valuable feature of SentinelOne Singularity Identity is its ability to detect based on behavior rather than just static signatures."
"The biggest value for us is getting a much better picture of what our risks are."
"Having high visibility into all of our network concerns and a customizable UI are the most valuable features."
"The general support could be improved."
"The setup phase of the product is not that easy and needs a person to have a certain level of expertise."
"Integration can be improved."
"The technical support takes too much time to resolve tickets."
"It is challenging to extract and customize reports from the system."
"The resolution turnaround from SentinelOne Singularity Identity's support should be improved."
"A lot of those features came from an acquisition of a different company."
"The policies could be more precise, and Singularity should use more templates like alternative solutions have. Endpoint management is poor. We cannot manage individual endpoints and must rely on policies, exclusions, or block lists to apply settings to a group instead of the individual agent. If I have to make settings for one computer, I need to create a group, apply the configuration, and move the agent there. It's challenging to manage endpoints that way."
"Sometimes I get kicked out of the console. I don't know why."
"The primary reason for this discontent is that we frequently encounter performance issues with our servers."
"We haven't received the expected support whenever we've had questions."
"The first-level support has room for improvement."
"The solution's query resolution time could be reduced further, and a faster resolution could be provided."
More Microsoft Defender Vulnerability Management Pricing and Cost Advice →
More SentinelOne Singularity Identity Pricing and Cost Advice →
Microsoft Defender Vulnerability Management is ranked 23rd in Vulnerability Management with 5 reviews while SentinelOne Singularity Identity is ranked 9th in Vulnerability Management with 14 reviews. Microsoft Defender Vulnerability Management is rated 8.2, while SentinelOne Singularity Identity is rated 8.6. The top reviewer of Microsoft Defender Vulnerability Management writes "The vulnerability assessment is very accurate because it runs directly into the vulnerability database". On the other hand, the top reviewer of SentinelOne Singularity Identity writes "It offers deep and continuous visibility into our attack surface". Microsoft Defender Vulnerability Management is most compared with Qualys VMDR, Tenable Nessus, Rapid7 InsightVM, Tenable Vulnerability Management and Microsoft Sentinel, whereas SentinelOne Singularity Identity is most compared with Microsoft Defender for Identity, Qualys VMDR, Tenable Vulnerability Management, Microsoft Defender for Office 365 and SailPoint IdentityIQ. See our Microsoft Defender Vulnerability Management vs. SentinelOne Singularity Identity report.
See our list of best Vulnerability Management vendors and best Advanced Threat Protection (ATP) vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.