Try our new research platform with insights from 80,000+ expert users

SentinelOne Singularity Complete vs SentinelOne Singularity Hologram comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Com...
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
198
Ranking in other categories
Endpoint Protection Platform (EPP) (3rd), Anti-Malware Tools (2nd), Endpoint Detection and Response (EDR) (2nd), Extended Detection and Response (XDR) (2nd)
SentinelOne Singularity Hol...
Average Rating
7.0
Reviews Sentiment
7.1
Number of Reviews
1
Ranking in other categories
Advanced Threat Protection (ATP) (27th), Threat Deception Platforms (4th)
 

Mindshare comparison

SentinelOne Singularity Complete and SentinelOne Singularity Hologram aren’t in the same category and serve different purposes. SentinelOne Singularity Complete is designed for Endpoint Detection and Response (EDR) and holds a mindshare of 5.8%, down 7.1% compared to last year.
SentinelOne Singularity Hologram, on the other hand, focuses on Advanced Threat Protection (ATP), holds 0.6% mindshare, up 0.4% since last year.
Endpoint Detection and Response (EDR)
Advanced Threat Protection (ATP)
 

Q&A Highlights

PK
Aug 18, 2023
 

Featured Reviews

Asim Naeem - PeerSpot reviewer
It integrates well with other platforms, is user-friendly, and is stable
SentinelOne Singularity Complete integrates with our other security solutions, correlating data from NDR, ADR, SIEM, and XDR tools. All this information is consolidated within SentinelOne, providing a centralized access point. SentinelOne Singularity Complete has helped us streamline our security operations by consolidating multiple solutions into a single platform. We are currently in the process of acquiring a threat intelligence platform to complete our security stack. We use Ranger to monitor our network and track connected devices. This is crucial because it helps us quickly identify unauthorized machines connected to our infrastructure, including personal devices. We have additional security measures in place, but Ranger provides an extra layer of protection. It also alerts us if the SentinelOne Singularity Complete agent is missing from any new or existing machines, allowing us to take appropriate action. SentinelOne Ranger's agentless and hardware-independent nature is crucial for our environment with 26,000 endpoints, as manual management of such a large number would be extremely challenging. Ranger uses a multi-layered approach to prevent vulnerable devices from being compromised. We employ scanners, network configurations, and a risk scanner to assess devices, endpoints, servers, and cloud infrastructures. Vulnerability reports and timelines for remediation are shared with device owners or custodians. This proactive strategy enables us to address vulnerabilities efficiently and secure our infrastructure. SentinelOne Singularity Complete has significantly enhanced our security posture. While no system is impenetrable, this solution has brought us closer to achieving a high level of protection, ensuring we maintain at least a 90 percent security level. Our team is dedicated to refining alerts and eliminating false positives from our solutions. Additionally, a team is responsible for identifying and excluding alerts from the solution. We can manually expedite this process by reviewing these elements and utilizing our security tools. We have been able to reduce the alert volume by 20 percent. Our 30-member Security Operations Center team has been able to redirect their focus to other tasks due to the time saved after implementing SentinelOne Singularity Complete. SentinelOne Singularity Complete has helped us improve our mean time to detect threats, which we accomplish using the Vigilance service for detection and response. SentinelOne Singularity Complete has helped us decrease our organizational risk. We utilize the Security Scorecard to manage our security posture, which has remained steady at 90 percent.
Graham Peck - PeerSpot reviewer
Lockdown devices and ports on endpoints so that you can stop propagation of any virus if it's detected but performance utilization can be better
It's scalable in the form of it now covers mobile devices as well as a number of other different types of devices, not just Windows. Also, there's no limit as to how many devices you can install it on. We plan to expand the number of devices/users as we get more people onboard or upgrade to more mobile devices; we will then increase the number of licenses for mobile devices. We've got 450 licenses, but we've got about 375 devices and users currently. I would rate the scalability a ten out of ten. There's not a product yet that I've found that I can't put it on, especially now that they've got the new release, which was the mobile agents.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It delivers the type of security which we were hoping for, since we have a lot of different endpoint users utilizing different types of software. We have people who only use Office software, like email, Word, and PDFs. Then, we have people who use some applications that other people wrote. We also write applications in-house using people who develop software. Therefore, we have some machines using very high-end developer software for mechanical development, electronic development, and software development. Those users are used to managing their PC on their own. The centralize platform allows us to differentiate between those three groups of people. We have overall control and can oversee the security levels at all the endpoints. They have not yet been blocked in any way when performing the functions"
"The most valuable feature is the quick response to attacks."
"The threat detection and prevention capabilities are valuable, providing development programming support that enables us to perform fair investigations."
"SentinelOne Singularity has hundreds of features. The most valuable feature of the solution is the ease of use and threat control."
"The most valuable aspect of SentinelOne Singularity Complete is the protection it provides."
"The most valuable features of SentinelOne Singularity Complete are machine learning because it saves us time, device control for data privacy, and the token."
"For me, the most valuable feature is the Deep Visibility. It gives you the ability to search all actions that were taken on a specific machine, like writing register keys, executing software, opening, reading, and writing files. All that stuff is available from the SentinelOne console. I'm able to see which software is permanent on a machine, and how that happened, whether by registry keys or writing it to a special folder on the machine."
"The product can scale as needed."
"The automated response capability in SentinelOne enhances security operations. It means I don't have to worry about having too many security people watching it because you can automate a lot of the tasks."
 

Cons

"There are features that I would like them to add. They have little to do with endpoint protection, but if they could add encryption and DLP on, it would make it even better."
"One area of SentinelOne that definitely has room for improvement is the reporting. The canned reports are clunky and we haven't been able to pull a lot of good information directly from them."
"Also, it didn't have much incident management built in."
"The maintenance window can be improved because once it happened that I had multiple laptops, and the maintenance window caused a lot of laptops to get stuck in the portal, blocking access."
"There is not much flexibility in terms of policy fine-tuning. We can turn it off or turn it on, but, there's nothing much else to do. Everything is predefined. It's good in a way, but you don't get much flexibility if you want to do something particular."
"The compatibility with new legacy systems should be enhanced as other EDR products support these systems, which Singularity does not."
"I would appreciate it if they would consider providing a comprehensive vulnerability assessment report that goes beyond just application vulnerabilities."
"If there is a vulnerability that we know about, I search for that vulnerability—for example, Adobe. There are different versions of Adobe, but I'm not able to compile them into one report. I have to create separate reports for those versions."
"The performance utilization on the device that it's monitoring. This aspect needs improvement."
 

Pricing and Cost Advice

"While the cost of SentinelOne Singularity Complete might seem high at first glance, it's important to consider the value it offers."
"I rate Singularity Complete a seven out of ten for affordability. It's more expensive than our previous solution, but it does its job well. At the same time, there is some room for improvement. Cheaper is always better."
"Just buy the Capture Client and buy the installer itself in a license of 100,000, or whatever is needed. You don't need to invest in any management tools because they are already installed, and maintenance from the client will keep everything up and running."
"The pricing was very similar in terms of its competitors, but I believe SentinelOne's capability and willingness to attract new business allowed us to save some extra money."
"The solution's pricing is not too bad for what it's offering, like the documentation that comes with it."
"The license is per user."
"The price is competitive, if you compare it with other solutions on the market."
"We pay $30,000 a year for 275 endpoints. We're growing, so I plan to buy another 75 endpoints. There is still a year and a half left in my three-year subscription, so I'm going to increase my endpoint count by 30 percent."
"I would rate the pricing a three out of ten; one is very expensive, and ten is an absolutely cheap product."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
860,168 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Manufacturing Company
8%
Financial Services Firm
7%
Government
6%
Computer Software Company
22%
Financial Services Firm
13%
Comms Service Provider
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. The ability to reverse damage caused by ransomware with minimal interruptions to...
Which is better - SentinelOne or Darktrace?
Which solution is better depends on which is more suitable specifically for your company. Darktrace, for example, is meant for smaller to medium-sized businesses. It is also a good option for organ...
Does SentinelOne have a Virtual Patching functionality?
Yes -- SentinelOne has a Virtual Patching functionality called Virtual Patching and Exploit Shield. This preventive security solution uses behavioral AI to identify and block zero-day attacks and v...
What is your experience regarding pricing and costs for SentinelOne Singularity Hologram?
It's obviously increased my cost when it comes to security management because I didn't have it before, and it isn't the cheapest one on the market. But at the same time, it has brought down my cybe...
What needs improvement with SentinelOne Singularity Hologram?
The performance utilization on the device that it's monitoring. This aspect needs improvement.
 

Also Known As

Sentinel Labs, SentinelOne Singularity
Attivo Networks
 

Overview

 

Sample Customers

Havas, Flex, Estee Lauder, McKesson, Norfolk Southern, JetBlue, Norwegian airlines, TGI Friday, AVX, Fim Bank
NSS Labs., Fierce IT security, FireEye
Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Detection and Response (EDR). Updated: January 2025.
860,168 professionals have used our research since 2012.