Netsurion vs SentinelOne Vigilance comparison

Cancel
You must select at least 2 products to compare!
Binary Defense Logo
1,532 views|179 comparisons
100% willing to recommend
Netsurion Logo
600 views|214 comparisons
92% willing to recommend
SentinelOne Logo
5,098 views|3,495 comparisons
93% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Netsurion and SentinelOne Vigilance based on real PeerSpot user reviews.

Find out in this report how the two Managed Detection and Response (MDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Netsurion vs. SentinelOne Vigilance Report (Updated: March 2024).
768,415 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The case interface is Binary Defense MDR's most valuable feature.""Among the valuable features are the agent, continuous reporting, and dashboard. It has all the features we need and we haven't had to customize it, other than turning on certain features that we wanted.""One of the main benefits of Binary Defense MDR is the ability to easily meet with their support team to discuss any issues we encounter.""The speed at which their services are reactive is valuable. Nowadays, when a threat hits an endpoint, you've got minutes, not hours or days. Their average response time is about four minutes on an alert. For anything that needs to be sent to us, it's about fourteen minutes, which is pretty good. They're the third SOC that I've used in fifteen years. By far, they are the quickest ones to act. When you're looking at prevention, that's a key factor.""The most valuable features are the SIEM and the ticketing function; the latter is very smooth and easy to read and understand. We don't have any issues looking at the ticketing information when we're trying to identify what's going on.""The most valuable part of Binary Defense is its team of cybersecurity analysts. Their analysts filter out the noise and only forward the critical threats that require a response instead of false positives.""The most valuable feature is reviewing tickets and the notes added by technicians.""Binary Defense has a human service department that provides live monitoring for our systems."

More Binary Defense MDR Pros →

"Their SOC team manages vulnerability management and IOC reviews. They stop bad processes when they happen. The best thing is their weekly reviews of what has been going on in the infrastructure as well as the things that they see and what we should look out for.""The real-time alerting for things such as people getting dropped into a VPN group or the domain admin group — things like that which really shouldn't happen without proper change management, but we all know the reality, they do from time to time — gives me real-time visibility into what's going on.""They have what they call Elasticsearch which is very quick, although that's only available for the last seven days' worth of data. It used to be that, if I wanted to do a search from three days ago, it might take me 10 to 15 minutes because it had to actually unzip some archive files. So I really like that feature. It's almost instantaneous for anything within the last seven days.""Netsurion has its own security operations center, where it tracks information that comes across our telemetry.""The network alert is the most valuable feature. That way, we in the IT department are aware of user lockout and invalid password attempts way before a user ever even calls in.""The most valuable feature is definitely real-time alerting, especially in situations where someone might attempt to exploit or hack into our network.""I like the UI, overall. I like the main page and there are aspects of the search page that I like. When you bring it up on the left-hand side of the page, as you look at the events, the ability to simply hit and click the plus/minus to pull events in and out of the overall view is well done and is very effective from a threat-hunting and an analysis perspective. I like the detail it shows.""I like EventTracker's dashboard. I see it every time I log in because it's the first thing you get to. We have our own widgets that we use. For the sake of transparency, there are a few widgets that we look at there and then we move out from there... Among the particularly helpful widgets, the not-reporting widget is a big one. The number-of-logs-processed is also a good one."

More Netsurion Pros →

"The most valuable feature of the solution is its performance, which is very important for us in our company.""I would rate SentinelOne's customer service and support a five out of five.""SentinelOne is a comprehensive solution for protecting SOAP-based web services and AWS-based cloud infrastructure.""SentinelOne Vigilance is an endpoint security tool with quarantining, dashboards showing us information, and many capabilities like manual and automatic quarantine of environmental issues.""The most valuable feature is that it works and isn't compromised. Other solutions I have used have all been compromised and SentinelOne is the only one that hasn't been compromised as far as I understand.""The most valuable feature is protection against ransomware and malware.""The SentinelOne Active EDR is the most valuable feature.""Stable solution for protecting, deploying, and managing endpoints, and comes with valuable features such as behavioral analytics and machine learning."

More SentinelOne Vigilance Pros →

Cons
"I don't find any downside to them, but if I have to put one, it would be consistent manpower or staffing. The only area where the solution can be improved is going to be with people. As they grow, they are struggling with the same thing that every other company is, which is getting talent and getting that talent to stay, but they've just revised their tiering system to go from a flat analyst and manager to a three-tier solution where it goes through two or three before it gets elevated. That seems to have worked out well, so if one level misses it, the next one picks it up, and it works out fine.""The current reporting system could benefit from improvement.""The most significant area for improvement is in support for non-English speakers; we're a global organization, so many of our users are not English speakers, which can make interacting with them a challenge. There's no Chinese language support, so we must rely on what we can do with the internet. We don't expect Binary Defense to build a language staff, but details can get lost in translation when we assume the whole world speaks English.""Binary Defense MDR could be even better with additional features, like automatic scans and file quarantine.""We found a couple of bugs in the user interface.""I would like to see more frequent check-ins with our security status.""If I were shopping for an MDR solution today, I would not only look for a company that has the ability to alert, detect, and remediate, but also the ability to integrate vulnerability management. That's a big thing that they're lacking today.""We found that an earlier version of the agent had high memory usage and that was a bit concerning, but we raised the concern with their support team and they immediately replied that they had noticed the same thing and had a candidate fix already available... it totally fixed the issue."

More Binary Defense MDR Cons →

"The biggest problem is that we have too many domain controllers. So, we have to keep all the clients and main system updated with the latest versions along with making sure all the firewalls are open.""The agents on the endpoints seem to fail quite a bit, requiring manual involvement from the local administrators. I would like to see their product be much more ad hoc and update automatically.""We get a report generated on a particular day of the week and we go through it, trying to mitigate problems and make sure we're seeing everything that's happening. It would be helpful if the SOC spent a little more time with us going through some of those reports.""Netsurion's SOC can be a bit too aggressive at times.""With version 8, there are quite a few things. The query tool was one of the big ones, and the query speed was one of the big ones, but they've made some great strides between versions 8 and 9. There were also issues in version 8 around the ability to get the data back out. It's one thing to collect data, but it's a whole other thing to be able to present it or run it in a timely manner. The old tool, depending on how far back I was looking, might even time out and I would have to run it again.""They have their programs and tools that you have to put into your own environment. We basically ingest all the log data and then push it out to them. I wish it was a little bit different than that where we just push directly towards them. I do not know if that is a function that they thought would be better in terms of security, but I wish that instead of doing that, it should go from the device to them and not from the device to another system and then out to them. There seem to be some drawbacks to doing that.""Everything that I've wanted has been added in. EDR was added, and MITRE was added. Those were two big ones that we didn't even have to push for.""The solution's dashboard is okay. The one thing that we ran into are issues when we upgraded to the newer version. It uses Elasticsearch for the different dashboard entries. So, we were running on spinning disks, and Elasticsearch didn't work that well. A number of the different dashboards, like my dashboard or different things like that, pull from Elasticsearch. Since Elasticsearch really wasn't working, we were having some issues with that, but we just migrated."

More Netsurion Cons →

"It is not easy to remove the customer without the dashboard.""My only complaint is that the knowledge base is not accessible to the customer.""SentinelOne Vigilance could improve if it provided us with more control over the dashboard.""My customers who use the tool mostly want a summary of the monitoring activities of the product in a report form...t can be useful for our customers to identify the threats and incidents encountered by the product.""When upgrades are required on the server, you need to almost remove SentinelOne Vigilance completely off the system. We put SentinelOne Vigilance on silence for the monitor mode, but we were having trouble upgrading the server. I had to remove SentinelOne Vigilance completely from the server, but that meant that all the previous logs of attacks I wanted to look at on the server were gone. This is one thing they need to improve, they need better compatibility with the Microsoft Windows service. I should not have to remove the agent completely to upgrade the service.""The process to replicate exclusions is not user-friendly.""The tool needs improvement in clear communication and detection.""It's too early to say what needs improvement."

More SentinelOne Vigilance Cons →

Pricing and Cost Advice
  • "The solution's price is spot on; if anything, it's slightly below the norm for most services. Compared to building the same team internally, it would cost more to create the same amount of capability than what we get from an external team. Price-wise, Binary Defense is in a great spot."
  • "From the initial cost that Binary Defense came in with, we pared it down quite a bit over the course of 30 or 60 days. My leadership would say that their cost was high, but realistically, they were in line with the market."
  • "The pricing is on target. Working with their sales team on pricing negotiations was a pleasant process. They were very respectful of the constraints we had and I feel that we're paying a fair price."
  • "It's valued at the right price. Even with the number of endpoints we have, we don't feel that it's a lot more than any competitor. In fact, it might be less expensive when you look at the fact that you're getting a full flex SOC out of it along with the tools."
  • "Binary Defense has changed its pricing model from being primarily based on the volume of data to one based on escalations and incidents they handle."
  • "Binary Defense MDR is priced competitively and may be slightly lower than CrowdStrike."
  • "After we acquired this platform, we met with a number of different vendors. Binary Defense came in with a proposal that was surprisingly affordable. In fact, we were able to recoup the cost of their services within a short period of time. This is because Binary Defense is able to provide the same level of security as a team of two or three in-house analysts but at a fraction of the cost. As a result, Binary Defense is saving us an estimated $250,000 to $300,000 per year."
  • "The pricing isn't that bad, it's very competitive. I don't feel that it's over-priced and I don't feel that it's under-priced."
  • More Binary Defense MDR Pricing and Cost Advice →

  • "The pricing and licensing seem very reasonable. The managed service part of it feels like it gives me the equivalent of a full-time engineer for a lot less money. So, I feel it's a good value."
  • "Licensing is very easy. Our CIO takes care of the billing, but in terms of price point, he hasn't complained, so it must be good."
  • "The solution is fairly expensive, but in my experience, all of the SIEM applications that I've evaluated or looked at cost about the same."
  • "The upfront costs have increased, and we have been locked into this contract. The cost of changing over from it is way too high."
  • "I don't know if the pricing is by the seat but we're paying about $20,000 to 25,000 a year. On top of that, we pay for the managed support services. That runs us about another $35,000 or $40,000 a year."
  • "When we first got the EventTracker product, we were using SIEM Simplified. At the time they didn't call it that, but it was more of a service thing. So, there was a bit more hand-holding and getting stuff set up, along with failure reports, that they did during the first one to two years. Then, we decided that the the additional money to have someone do these daily reports wasn't terribly useful, so we discontinued that service."
  • "EventTracker's subscription-based model is interesting as far as yearly license type stuff. It's nice because you know what it's going to be next year. We haven't really looked at any other solutions. The pricing at the time compared to the other solutions was a lot less. A couple of years ago, we actually looked at Splunk. The amount in Splunk's licensing model is based on 20 gigs a day, or something like that. Based on our number of logs and stuff that we were already generating, the costs would be substantially more for the amount of logs that we would be getting."
  • "In the security space, it's hard to quantify your return on investment. So, I don't. We spend about $40,000 a year and so. It's hard to say if the SIEM saved that much money."
  • More Netsurion Pricing and Cost Advice →

  • "The licensing cost depends on the number of connected devices and whether you purchase additional services."
  • "I give the cost a three out of ten."
  • "I rate the solution's pricing a five out of ten since it is a very highly-priced solution."
  • "I rate the product's pricing an eight out of ten since it is really expensive, but it is well worth what my company gets."
  • "The solution’s pricing is very reasonable."
  • "On a scale from one to ten, where one is cheap, and ten is expensive, I rate the solution's pricing an eight out of ten."
  • "SentinelOne Vigilance is priced in a normal range."
  • "The tool's pricing is slightly cheaper than other alternatives. It's not just about licensing costs; because we already have it implemented, we can save money on deployment and initial setup. Additionally, SentinelOne Vigilance is slightly cheaper in licensing, maybe around 10-15 percent cheaper."
  • More SentinelOne Vigilance Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Managed Detection and Response (MDR) solutions are best for your needs.
    768,415 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature is reviewing tickets and the notes added by technicians.
    Top Answer:Binary Defense is fairly priced. I would say that Binary Defense is flexible in negotiating and tailoring a solution… more »
    Top Answer:The only area I see for improvement with Binary Defense is their service portal. It could benefit from some… more »
    Top Answer:Their pricing is high. I don't know if it's a barrier. The quality speaks to the price. The price is the price. They… more »
    Top Answer:There is one area that needs improvement and that is with the agents and the server that's on-site. The system… more »
    Top Answer:The most valuable feature of the solution is its performance, which is very important for us in our company.
    Top Answer:My customers who use the tool mostly want a summary of the monitoring activities of the product in a report form, which… more »
    Comparisons
    Also Known As
    Binary Defense Vision, Binary Defense Managed Detection and Response, Binary Defense Managed Detection & Response
    Netsurion Managed Threat Protection, Netsurion EventTracker
    Learn More
    Overview

    Binary Defense provides a Managed Detection and Response service using an Open XDR strategy that detects and isolates threats early in the attack lifecycle. Expert security analysts in the Binary Defense Security Operations Center leverage an attacker’s mindset, monitoring your environments for security events 24x7x365 and acting as an extension of your security teams. When a security event occurs, Binary Defense analysts triage, disposition, and prioritize the event. Analysts conduct full kill chain analysis and supply tactical and strategic mitigation recommendations to your security team with the goal of increasing your organization’s security posture against the latest adversary threats.

    Visit us online at https://www.binarydefense.com

    Our open XDR platform unifies your existing security telemetry to deliver wider attack surface coverage and deeper threat analytics resulting in greater security visibility. Our SOC does the heavy lifting for you of proactive threat hunting, event correlation and analysis, and provides you with guided remediation. The result is a force multiplier that allows your IT team to be confident and in control again while also maximizing all of your cybersecurity investments.

    Reduce time to protection and minimize risk exposure with continuous threat monitoring and response from SentinelOne.

    Sample Customers
    Securitas USA, Black Hills Energy, Lincoln Electric,The J.M. Smuckers Company, New York Community Bank, State of Connecticut, NCR
    The Salvation Army, The FRESH Market, Pacific Western Bank, NASA, American Academy of Orthopaedic Surgeons (AAOS), and Talbot’s Stores
    Norwegian Airlines, TGI Fridays, AVX, FIMBank
    Top Industries
    REVIEWERS
    Manufacturing Company33%
    Wholesaler/Distributor8%
    Insurance Company8%
    Energy/Utilities Company8%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Healthcare Company8%
    Financial Services Firm8%
    Manufacturing Company7%
    REVIEWERS
    Financial Services Firm18%
    University9%
    Healthcare Company9%
    Energy/Utilities Company9%
    VISITORS READING REVIEWS
    Computer Software Company30%
    Manufacturing Company12%
    Government7%
    Financial Services Firm5%
    REVIEWERS
    Computer Software Company20%
    Healthcare Company10%
    Educational Organization10%
    Insurance Company10%
    VISITORS READING REVIEWS
    Educational Organization37%
    Computer Software Company13%
    Manufacturing Company5%
    Retailer4%
    Company Size
    REVIEWERS
    Small Business31%
    Midsize Enterprise31%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business36%
    Midsize Enterprise19%
    Large Enterprise45%
    REVIEWERS
    Small Business38%
    Midsize Enterprise33%
    Large Enterprise29%
    VISITORS READING REVIEWS
    Small Business39%
    Midsize Enterprise17%
    Large Enterprise44%
    REVIEWERS
    Small Business68%
    Midsize Enterprise5%
    Large Enterprise26%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise44%
    Large Enterprise30%
    Buyer's Guide
    Netsurion vs. SentinelOne Vigilance
    March 2024
    Find out what your peers are saying about Netsurion vs. SentinelOne Vigilance and other solutions. Updated: March 2024.
    768,415 professionals have used our research since 2012.

    Netsurion is ranked 13th in Managed Detection and Response (MDR) with 24 reviews while SentinelOne Vigilance is ranked 4th in Managed Detection and Response (MDR) with 18 reviews. Netsurion is rated 8.4, while SentinelOne Vigilance is rated 8.4. The top reviewer of Netsurion writes "The SOC center monitors, hunts, and notifies us of threats around the clock". On the other hand, the top reviewer of SentinelOne Vigilance writes "Very easy to use with multiple options for licensing and scaling". Netsurion is most compared with Arctic Wolf Managed Detection and Response, CyberHat CYREBRO and Wazuh, whereas SentinelOne Vigilance is most compared with Huntress, Blackpoint Cyber MDR, CrowdStrike Falcon Complete, Secureworks Taegis ManagedXDR and Sophos MDR. See our Netsurion vs. SentinelOne Vigilance report.

    See our list of best Managed Detection and Response (MDR) vendors.

    We monitor all Managed Detection and Response (MDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.