

SentinelOne Singularity Complete and Trellix Endpoint Detection and Response (EDR) both compete in the advanced cybersecurity solutions category. SentinelOne Singularity Complete stands out in pricing and support, while Trellix EDR is notable for its features, making it worth the price.
Features: SentinelOne Singularity Complete provides automated threat detection, response, and remediation. Users praise its real-time visibility and proactive threat hunting. Trellix EDR offers robust threat intelligence and in-depth forensic capabilities, making it highly effective for in-depth threat analysis. Trellix EDR is more feature-rich according to user feedback.
Room For Improvement: Users of SentinelOne Singularity Complete suggest enhancements in reporting capabilities and integration with other security tools. For Trellix EDR, users recommend improvements in scalability and resource efficiency. SentinelOne needs better reporting tools, while Trellix requires better performance optimization.
Ease of Deployment and Customer Service: SentinelOne Singularity Complete is known for its straightforward deployment process and responsive customer service. Trellix EDR, while effective, is noted to have a more complex deployment process and slower customer support response times. SentinelOne is easier to deploy and offers better customer service.
Pricing and ROI: SentinelOne Singularity Complete is appreciated for its competitive pricing and high ROI. Users report that the cost is justified by the robust protection it offers. Trellix EDR, despite higher setup costs, is seen as delivering significant ROI due to its extensive features and capabilities. SentinelOne offers better pricing, but Trellix provides higher ROI through its feature set.
SentinelOne Singularity Complete has helped reduce my organization's mean time to detect by fifty percent.
Since then, I have not faced any intrusions, which is one reason I chose SentinelOne over ESET.
We have not faced any attacks since we implemented it.
They do a great job of figuring out the problem and pointing you to generic documentation or working with you to fine-tune a solution.
We are using the automated email process for support, and they respond within an hour or two hours sometimes.
A chat service would be beneficial.
I have contracted support and also have an operating control so I can get various types of support.
It's all auto-scale and auto-categorized, configuring automatically.
The tool's built-in automation for deploying the agents works well for large infrastructures like mine.
SentinelOne Singularity Complete is very scalable.
It has caused problems with interoperability between third-party tools, which could lead to entire servers crashing or specific tools failing.
This indicates room for improvement in stability when interacting with other solutions.
Initially, there were issues, particularly on the management side, but now the console is much more stable.
The only thing that prevented the attack from succeeding was a free version of Malwarebytes.
Providing a single pane of visibility for the end user would be beneficial.
It's challenging to prevent a user from manipulating their privileges or someone else's of others, and it's difficult to control what users can access at the organizational level.
I am seeing, for workflows, some sort of ethical hacking to test our environment.
If you want protection, you have to pay the price.
There are other products that are less expensive, but I tell my clients that in security, they cannot cut corners or look for the cheapest solution.
Reputation and quality are important, but especially in today’s economy, price is a significant factor.
I have an advanced app providing visibility of all my endpoints, which was not the case before.
SentinelOne has a feature to decommission automatically, which has been fantastic.
There's also automation that gives my team free time, preventing them from having to look for every alert.
I have spent efforts on training our managers and others - what can software do if the knowledge base is low?
| Product | Market Share (%) |
|---|---|
| SentinelOne Singularity Complete | 5.3% |
| Trellix Endpoint Detection and Response (EDR) | 1.2% |
| Other | 93.5% |


| Company Size | Count |
|---|---|
| Small Business | 87 |
| Midsize Enterprise | 44 |
| Large Enterprise | 77 |
| Company Size | Count |
|---|---|
| Small Business | 12 |
| Midsize Enterprise | 3 |
| Large Enterprise | 10 |
SentinelOne Singularity Complete delivers advanced endpoint protection leveraging AI-driven threat detection and behavior analysis for efficient malware and ransomware response. Its standout features enhance security insights and ensure comprehensive endpoint management.
SentinelOne Singularity Complete provides robust ransomware recovery through unique rollback capabilities and seamless integration with various security solutions. Its machine learning enhances endpoint protection, minimizing false positives and automating responses. While praised for real-time threat monitoring, incident management, and asset management, it faces challenges in managing the console, customizing UI, and maintaining policy flexibility. Some users report difficulties with deployment and integration with existing systems, and enhanced reporting, alert management, and documentation are desired. Its appeal extends to deploying across multiple operating systems, offering comprehensive security coverage and facilitating cybersecurity compliance.
What standout features does SentinelOne Singularity Complete offer?Industries implement SentinelOne Singularity Complete for its AI capabilities in advanced endpoint protection, particularly against malware and ransomware. It's utilized across diverse operating systems, aiding in real-time threat monitoring and facilitating compliance. Organizations use it for vulnerability assessments and asset management, ensuring optimal protection in complex IT environments.
Reduce the time to detect and respond to threats. Trellix EDR helps security analysts quickly prioritize threats and minimize potential disruption.
Guided investigation automatically asks and answers questions while gathering, summarizing, and visualizing evidence from multiple sources—reducing the need for more SOC resources.
Cloud-based deployment and analytics enables your skilled security analysts to focus on strategic defense, instead of tool maintenance. Benefit from implementing the right solution for you.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.