We compared SentinelOne Singularity Complete and ThreatLocker Protect based on our user's reviews in several parameters.
Based on user reviews, SentinelOne Singularity Complete and ThreatLocker Protect both have strengths in advanced threat detection and customer support. However, while SentinelOne's focus is on comprehensive protection and ease of use, ThreatLocker excels in providing granular control and visibility over file activities. SentinelOne users appreciate the platform's AI technology and user-friendly interface, while ThreatLocker users value its seamless integration with existing systems and effectiveness in preventing unauthorized access. Overall, both products have received positive feedback from users, with SentinelOne standing out for its proactive security measures and ThreatLocker for its granular control features.
Features: SentinelOne Singularity Complete stands out with its comprehensive threat detection, advanced AI, intuitive interface, and swift response to emerging threats. In contrast, ThreatLocker Protect offers advanced threat detection, seamless integration, ease of use, reliable blocking, granular control, and visibility over file activities.
Pricing and ROI: SentinelOne Singularity Complete and ThreatLocker Protect differ in terms of setup cost. Users have expressed their perspectives on the pricing, setup cost, and licensing of both products. While customers have shared insights about the cost-effectiveness and ease of setting up ThreatLocker Protect, opinions on the setup cost of SentinelOne Singularity Complete are also available., The ROI for SentinelOne Singularity Complete is driven by its comprehensive protection, real-time threat detection, and proactive security measures, while ThreatLocker Protect offers significant value and returns by enhancing security, preventing threats, and minimizing potential damages.
Room for Improvement: Users have provided feedback on SentinelOne Singularity Complete that highlights the need for improvements in system performance, user interface, customization options, reporting capabilities, and integration with other security solutions. On the other hand, for ThreatLocker Protect, user feedback specifically focuses on identifying the product's drawbacks.
Deployment and customer support: The user reviews for SentinelOne Singularity Complete indicate that the timeframe for deployment and setup are generally the same and should be considered together. However, the user reviews for ThreatLocker Protect highlight the variability in the time required for deployment, setup, and implementation phases., Customer service for SentinelOne Singularity Complete has been positively praised for its prompt and helpful assistance, as well as reliable and efficient support staff. On the other hand, ThreatLocker Protect's customer service also receives high praise for its prompt and helpful assistance, knowledgeable and efficient support team, and commitment to customer satisfaction.
The summary above is based on 148 interviews we conducted recently with SentinelOne Singularity Complete and ThreatLocker Protect users. To access the review's full transcripts, download our report.
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"The most valuable feature is the quick response to attacks."
"SentinelOne's auto-rollback feature is the most valuable."
"The user interface, ease of maintenance, and the efficient way to identify the root cause of an incident to see all the factors that contributed to it are the most valuable features."
"The EDR functionality of the platform is what we use the most. That was the primary reason why we got SentinelOne. That is what we use the most in terms of functionality."
"The most valuable features are threat hunting, the ability to disconnect or disable a machine's network connection in real time, and the ability to restore the connection once the issue is resolved quickly."
"The visibility component is the most valuable feature."
"The best thing is it has a secure shell command that you can use to get into any endpoint and do some jobs."
"We find the solution to be scalable."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."
"Every single feature has been invaluable."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
"The sandbox functionality is fantastic."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist."
"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"We've encountered challenges during API deployment, occasionally resulting in unstable environments."
"The support needs improvement."
"The SIEM could be improved."
"We find the solution to be a bit expensive."
"We'd like to see more one-to-one product presentations for the distribution channels."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"This solution would be more attractive to customers if the price were lower."
"I really haven't done enough to really see any improvements."
"I would like SentinelOne to add a threat-hunting report and more UEBA features. They could add more SIEM functionality. It would be nice to have the ability to easily drag all the logs from the agents, so there's no need for multiple agents installed on the endpoint."
"SentinelOne is causing a problem with the data service that causes one of our applications to crash randomly. We're still looking for a permanent fix, but we have implemented a temporary workaround that excludes that application from the scan."
"One disadvantage of SentinelOne Singularity Complete is that the agent doesn't auto-update, and my company found it more complicated than usual to get the agent updated and keep it updated."
"Having an additional logic layer could improve the solution, mainly because I run multiple systems with different layers. For example, if I'm running a very important server with this agent, and that server gets infected, I may not necessarily be sure that I want to shut it down right away. Maybe I want to isolate some of the connectivity but not do the entire security remediation automatedly or curtail network access type of activity."
"The documentation provided for implementation is not adequate and has caused us challenges."
"The ease of use can be better in Deep Visibility. It is not always the easiest. If I have not been in there in the Deep Visibility module for a long time, I do not always find it that easy to use. I tend to go and have to consult the help quite often if I have not been in there a long time."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"There are some times when applications get submitted, the hashes don't really line up."
"We identified several areas that we would like to see improved."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"ThreatLocker could offer more flexible training, like online or offline classes after hours. The fact that they even provide weekly training makes it seem silly to suggest, but some people can't do it during the day, so they want to train after work. They could also start a podcast about issues they see frequently and what requires attention. A podcast would be helpful to keep us all apprised about what's going on and/or offline training for those people who can't train during the week."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"Adding applications to the allowlist can sometimes feel overwhelming."
"From a reporting perspective, enhancing the ability to customize reports would be beneficial."
More SentinelOne Singularity Complete Pricing and Cost Advice →
SentinelOne Singularity Complete is ranked 2nd in Endpoint Protection Platform (EPP) with 176 reviews while ThreatLocker Protect is ranked 22nd in Endpoint Protection Platform (EPP) with 13 reviews. SentinelOne Singularity Complete is rated 8.8, while ThreatLocker Protect is rated 9.2. The top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace, Datto Endpoint Detection and Response (EDR) and ESET Endpoint Protection Platform, whereas ThreatLocker Protect is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, GravityZone Business Security, Huntress and Fortinet FortiClient. See our SentinelOne Singularity Complete vs. ThreatLocker Protect report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.