The solution is agent-based, so it's on service, and it's a cloud solution.
We are using its API capabilities for our server for protecting us from cyber security threats and attacks.
The solution is agent-based, so it's on service, and it's a cloud solution.
We are using its API capabilities for our server for protecting us from cyber security threats and attacks.
Earlier, we used some internal protections. However, we moved to HD information for the cyber security portion. It's helped us to mitigate security attacks and provide solid defense.
We like the file-less monitoring and filtering are great in the context of security.
The setup is very straightforward.
It is stable.
The product can scale if the licensing is correct.
SentinelOne has some inputs, some traditional NPRs, or models like IPS and IDS. We can configure individual rules for particular machines. In a sense, control is not from the console.
There should be more integration models with different security operations tools or soft tools. It could provide a single pane for integration with the firewall, or a soft solution should be there.
I'd been using the solution for eight months.
It's a stable, reliable product. there are no bugs or glitches. It doesn't crash or freeze.
The product can scale. However, it depends on the license.
We have 500 users on the solution right now.
Right now, we don't have plans to increase usage as we already have some buffer limit there.
While I haven't directly contacted support, I have used their documentation surrounding KPIs and have found them helpful.
Positive
Earlier, we were using Symantec and the One Protection Suite.
The solution is easy to set up. It's not an overly complex process. We had no issues at all.
One system engineer which has some knowledge of network security can handle the implementation.
We handled the deployment in-house.
SentinelOne has a very good XDR product, and it can also integrate with different security components. It's a single pane of glass for cyber security posture management. The ROI is good.
The licensing is handled by another team. I can't speak to the exact cost of the product.
We also looked at CrowdStrike before choosing this product.
Someone interested in the product should first do POC, and depending upon their OIS environment, they should consider this first before going for any XD solution.
I'd rate the solution eight out of ten.
We primarily use the solution at our endpoints. We use it for security.
It's catching a lot of malicious and suspicious threats. That's good for us.
We are able to write some custom rules on SentinelOne.
The setup is simple.
Right now, the solution meets our needs. We do not need anything added to it.
Maybe they can develop some firewall aspects for it to better protect us. If they did that, we can write a lot of rules for the firewall and custom rules.
I've been using the solution for about two years.
The solution is stable and reliable. It catches a lot of malicious and suspicious threats. There are no bugs or glitches and it doesn't crash or freeze.
The solution scales well and can work across platforms. We can use it with MacOS, Linux, and Windows Servers. You can use it with everything.
We have 600 people on the solution right now. It is used throughout the company.
We may increase usage in our company.
Technical support is great. They are very responsive. For example, today, if I open a ticket, they will likely give me an answer in 24 hours.
Positive
I used FireEye and Symantec. However, SentinelOne is better than them. It's more flexible and catches more threats.
We found the initial setup to be very simple. You just click through, and you're up and running.
I'd rate it five out of five in terms of ease of deployment.
We're deploying it every month. SentinelOne sends updates every month and we action them.
Licensing is paid on a yearly basis. I can't speak to the exact pricing.
I'm not sure which version number we are currently on.
If a company has a lot of people and needs to protect its many endpoints, this is a great option.
I'd rate the solution eight out of ten.
We are using it for endpoint security. It acts as an antivirus as well as is useful for endpoint detection. We are using the same product for both use cases.
SentinelOne is very lightweight. It doesn’t consume much memory of endpoints. Endpoints don't hang, and machine performance doesn’t get impacted. Their technical support is also very nice.
It has all the features that other leading products in the market provide. They should keep enhancing it based on the challenges in the market. I am fine with its detection capability, but they can work more on deep inspection.
I have been using this solution for around two years.
It is stable. I would rate it a four out of five in terms of stability.
It is scalable. I would rate it a four out of five in terms of scalability. We have more than 1,200 users who are using this solution.
Their technical support is very nice. I would rate them a five out of five.
Positive
It is very easy to implement or install. I would rate it a five out of five in terms of the ease of setup. It does require maintenance by someone.
Its cost is yearly. It is not much costlier than other leading products available in the market. I would rate it a four out of five in terms of pricing.
We were looking for an antivirus and EDR solution. We evaluated some of the products, and finally, we decided to go for SentinelOne EDR. CrowdStrike was one of the solutions we evaluated. SentinelOne was lightweight, but CrowdStrike had a more secure door.
I would rate it a nine out of ten.
The most important feature is the roll-back feature because when any system is corrupted, we can easily restore it within a few seconds. Also, if an end-user is not connected to your network, they can communicate with the central manager. We can be notified of any end-user activity with a central dashboard. The solution is also a very lightweight agent model compared to other solutions like Sophos, Carbon Black and the app action from X-microsite product. SentinelOne does not use the RAM SCP installation for the agent, and the user interface is also straightforward.
The setup process could be improved, and it would be good if artificial intelligence were added as an additional feature in the next release.
We used SentinelOne at my previous company before I left eight months ago, and it was deployed on cloud base.
It is a stable solution.
It is a scalable solution, and we have about 800 users using SentinelOne. We only need one person for maintenance, and they can offer maintenance in person and remotely via email and SMS.
I rate the technical support a ten out of ten. The support is very easy if you connect with global support. A company focused on non-technical issues can't easily adopt the solution. You have a support team from the layman language.
The initial setup was a bit complex but very simple if you set up a single order.
I rate the price of SentinelOne a ten out of ten, meaning it is the best price in the market. This is because SentinelOne has a nominal cost. For example, if CrowdStrike costs $1000, SentinelOne provides the same features for about $7 to $8.
I rate this solution a ten out of ten. I have around 10 to 15 years of experience in security and have used products like Sophos, Micro and CrowdStrike. CrowdStrike and SentinelOne are the best, but SentinelOne is preferred because of its great features and nominal cost.
We use it as an Enterprise EDR solution for threat detection, anti-malware, and security investigations.
SentinelOne Singularity Complete has greatly enhanced our security posture. We feel that our endpoints are more secure. We are in the know of what is happening within our company from a security perspective. We are confident in the ability to detect untrue positives. It has also helped us in achieving industry certifications such as SOC 2.
SentinelOne Singularity Complete has absolutely helped reduce our organization's mean time to detect. There has also been an impact on our mean time to respond. With the integrations that we have set up with Splunk and other products, we are able to respond to incidents as soon as they alert us.
We have a couple of integrations with it. They are alright. I am not blown away by its integration capability.
SentinelOne Singularity Complete has not helped reduce alerts. If anything, we create more alerts with it. We are able to fine-tune the product to reduce noise and alerts, but without it, we would not have any alerts. It is the piece of software that provides that alerting capability for us.
SentinelOne Singularity Complete has not helped free up staff. In a way, it creates work for us, but that is the purpose of the product.
The deep visibility and the ability to perform security investigations and assess our endpoint security posture are the most valuable features.
There should be Terraform support for console administration. Dynamic tagging would be also useful.
The auto-upgrade capability should be improved.
I have been using SentinelOne Singularity Complete for two years at this company. My company has been using it longer than that.
Its stability is pretty good. I like the stability of their agent.
It is extremely scalable.
Their technical support is pretty good. I would rate them an eight out of ten.
Positive
I was not here when they bought this solution, but I know why we bought the tool. We replaced another EDR solution, and then we used it as our enterprise EDR solution for ransomware prevention, threat hunting, and security investigations. We were using CrowdStrike previously. SentinelOne Singularity Complete also saved us money. It is very competitive compared to CrowdStrike.
I have used a couple of EDR solutions. SentinelOne Singularity Complete is less mature than CrowdStrike, but it is definitely one of the top players in the industry.
SentinelOne Singularity Complete has not helped reduce our organizational risk. It is about the same as CrowdStrike in this aspect.
We have it on our laptops and the cloud, so our setup is hybrid. I am in charge of deployment, and it is as simple or complex as any other solution.
It requires maintenance on our end.
We have a team, but I do most of the work. I am in charge of it.
It is hard to define the ROI. It does not save us money, but it prevents security breaches. In the grand scheme of things, it is definitely worth investing in.
Its pricing is competitive.
It has competitive pricing and great support. It is a complete solution.
As a strategic security partner, they collaborate with us quite a bit on our overall posture. They constantly have webinars and education sessions for us to deepen our security knowledge and how to use their product. They have assisted us on various PoCs for different offerings that they have and different services they offer. They help us to understand how each of those components integrates into our overall security posture. We did a PoC of the Ranger functionality.
I would rate SentinelOne Singularity Complete a seven out of ten.
We use SentinelOne to collect logs and data. We will connect it to other tools and places in the future.
It is easy to collect and retain logs with SentinelOne. When you need to compare information, the data is available. It also has the possibility to configure information. It integrates well with all the other solutions we use.
The only concern we have is that there are a few features that were not readily available. We use a lot of application files that didn't have a connection.
We would also like to see integration with other tools that have to collect the logs.
Although Microsoft claims the use of building artificial intelligence to correlate events, we have actually had a couple of events that should have logs but did not. The solution is not at the same level in terms of building artificial intelligence.
SentinelOne can do a better job of not only creating corrective action based on the correlation. For example, someone was trying to repeatedly change their password. What they didn't realize was that they weren't connected correctly.
I have been using SentinelOne for six months.
SentinelOne is a stable product.
Scalability is based on the measure. There is no limitation regarding scalability if you pay for the upgrades.
Technical support is good. When you need help from Microsoft, there is a long list of resources to help understand the issues.
Positive
The initial setup is straightforward as we have contracts with Microsoft Office Supplies, commodities, defender, and Active Directory.
I would rate the ease of initial setup of SentinelOne a five out of five. It is easy.
Our company used a third party that provided the utility.
This solution is less expensive than its competitors. You might need to buy additional space depending on how much they are willing to provide. I would rate the pricing a five out of five.
We selected SentinelOne because it was less expensive than the competitors. We also saw the speed of evolution with Microsoft, so it can be involved theoretically when compared to Splunk.
We also chose SentinelOne because of the balance between features. It is stable and has enough choices. Being with Microsoft, we felt confident that the solution would evolve.
If you are considering SentinelOne, you should consider the cost of storage. Otherwise, the product is easy to deploy. You either need to have your own security operating center or hire someone that will use Sentinel or the secondary service. For you to consume the data, you may have had an internal security center or Sentinel.
With SentinelOne you have to invest extra cost. You have to always think of how much it will cost you to delay a response by a couple of days. If the incident is going to cost two days of revenue for the organization, that is much more than the cost of the solution.
I would rate SentinelOne an eight out of ten because of the price point and the features you get.
We use SentinelOne mainly for lateral movement, ransomware, anti-malware, AI engine, and forensics.
The most valuable features of SentinelOne are the lateral movement and the use of the Active Directory.
SentinelOne can improve by having better integration with Active Directory.
SentinelOne can be deployed on-premise and in the cloud.
I have been using SentinelOne for approximately two years.
SentinelOne is stable. However, the only issue I had was with legacy system, such as older kernels. The newer systems are more stable.
The scalability of SentinelOne is good, but my biggest concern is they need to find some way to automatically install their agents to specifically Microsoft Windows devices because not every IT infrastructure has SECM of others that automatically deploy it. It would be helpful during the migration of new customers.
We have approximately 4,000 systems using the solution and plan on adding another 400.
I haven't had the opportunity to interact with SentinelOne support.
I have previously used Microsoft Windows Defender.
The initial setup of SentinelOne is very easy. You only need to turn it on and it starts working with a couple of clicks. The ease of implementation is SentinelOne strongest feature.
We have three people deploying SentinelOne. As part of the team deploying the agent, there are multiple teams involved, and each one can deploy an agent when they have their own time.
SentinelOne can cost approximately $70 per device.
The advice I would give others that are thinking of implementing SentinelOne is if they have any other solutions, I would highly recommend them to start using it, especially if they have Active Directory. It's very good at picking up weird anomalies.
I rate SentinelOne an eight out of ten.
There are four use cases:
There are different versions. The SaaS portal has a different version. The agents for each operating system have a different version. For the SaaS platform, we are on the current release. For the agents, we are one behind the current GA release.
We have another tool for network analysis. Last night, it detected some suspicious network activity for a machine that was making an outbound action to a spacious external entity. So, it raised an alert. Other than being a network tool, it couldn't provide any information as to why it suddenly started doing this. As far as response and running through our playbook, the first steps were for the SOC to go and reach out to our engineering teams to see if any users caused what happened. That took them almost until the end of the day. Finally, they came back, and said, "There is nothing that we can see." Then, I went into SentinelOne, spending about 15 minutes, and was able to determine exactly:
We were able to determine it was a process that one of our engineers had set up and forgot about. It took us almost an entire day for the SOC to get a response from a person on that. Whereas, we were able to get that information directly from SentinelOne in less than 15 minutes.
SentinelOne's automation has increased analyst productivity. It can automate actions on a threat, such as, kill/quarantine, remediate, and then roll back. All those automation processes have significantly helped us in making our SOC more effective.
All the features are valuable. Their core product, EDR, is pretty good. We utilize the entire functionality of the feature set that they have to offer with their core product. For EDR, we are using all their agents: the Static AI and Behavioral AI technologies as well as their container visibility engine.
We use SentinelOne’s Storyline feature to observe all OS processes quite routinely. When we want to know a bit more details about any threats or want to investigate any suspicious event types, that is when we use the Storyline quite a bit. Its ability to automatically connect the dots when it comes to incident detection is useful. It significantly simplifies the investigation and research related to threats.
Today, we automatically use Storyline’s distributed, autonomous intelligence for providing instantaneous protection against advanced attacks for threat detection. The AI components help tremendously. You can see how the exploits, if any, match to the MITRE ATT&CK framework, then what actions were taken by the AI engine during the detection process or even post detection actions. This is good information that helps us understand a little about the threat and its suspicious activities.
We use the solution’s one-click remediation for reversing unauthorized changes. In most of the groups, we have it automatically doing remediation. We seldom do manual remediation.
There is an area of improvement is agent health monitoring, which would give us the ability to cap and manage resources used by the SentinelOne agent. We had issues with this in our environment. We reached out to SentinelOne about it, and they were very prompt in adding it into their roadmap. A couple of months ago, they came back to us and got our feedback on what we thought about their plan of implementing the agent health monitoring system would look like, and it looks pretty good. So, they are planning to release that functionality sometime during the Summer. I have been amazed with their turnaround time for getting concepts turned into reality.
We have been using SentinelOne since early 2020.
It has been very stable. There have been no issues so far.
One person is needed for maintenance (me).
It is scalable with the caveat that we have had some challenges within our infrastructure for 20 agents across Linux servers. Beyond that, scalability is not an issue.
8,000 to 9,000 people are using the solution across our entire organization.
We are using SentinelOne as our de facto endpoint protection software. As a result, it is a requirement for every machine in our infrastructure, except for the devices that do not support their agents. So, as our infrastructure continues to grow or shrink, the users of SentinelOne will either increase or decrease, depending on the state of our infrastructure at that specific point in time.
The technical support is good and very responsive. 99.99 percent of the time, they have been able to provide satisfactory responses. Whenever we have asked them to join a call that requires their assistance on a priority basis, they have been able to join the call and provide assistance. Whenever they felt that they do not have enough information, they were upfront about it, but they realistically cannot do anything about it because there is a limitation on either SentinelOne agent software or deeper logs would need to be captured in order to provide more information. There has been no situation where support provided an unsatisfactory response.
We were previously using Sophos. The primary reason that we switched was Sophos did not provide us the extended capabilities we needed to support our infrastructure, both on-prem and on the cloud. Sophos did not support any of the Kubernetes cluster environmental containers systems on the cloud. It did not have the advanced AI engines that SentinelOne does. Overall, Sophos was very bulky, needing a lot of resources and a number of processes. In contrast, SentinelOne was thinner, very lightweight, and more effective.
The deployment and rollout of SentinelOne are pretty simple. In our environment, we deployed the agents, then we had to remove them from some of the machines because the agent was impacting the performance of those machines. At that time, we found out it wasn't the SentinelOne agent rather an underlying issue on our own system or even the environment that it was in. We had to take SentinelOne out to troubleshoot the root cause, which delayed us a bit in rolling it out to our other infrastructure. That was completely fine. Looking at it from a global and world perspective, the rollout was very simple.
About 6,000 to 7,000 endpoints took us six to seven months to deploy. Linux took a bit longer to deploy because the tools are not as good for deployment as what is available for Windows and Macs. Using a script, we were able to take care of that. However, we could only do that during maintenance windows, otherwise we couldn't deploy the agents without an approval change.
We did the implementation ourselves. We have several teams responsible for each area:
This provided resource continuity. In case one resource would be unavailable for any reason, then the other resource would be able to continue. Essentially, the deployment needed three people, but we had six for continuity.
We saw a return of investment during the first year. We far exceeded our ROI expectations, meeting our ROI expectations within the first year.
The Storyline feature has significantly affected our incident response time. Originally, what would take us hours, now it takes us several minutes.
From an overall perspective, it has reduced our mean time to repair in some cases to less than seconds to a maximum of an hour. Before, it would take days.
The licensing is comparable to other solutions in the market. The pricing is competitive.
We subscribe to the Managed Detection and Response (MDR) service called Vigilance, which is like an extension of our SOC. Vigilance's services help us with mitigating and responding to any suspicious, malicious threats that SentinelOne detects. Vigilance takes care of those.
We also pay for the support. The endpoint license and support are part of the base package, but we bought the extended package of Vigilance Managed Detection and Response (MDR) services.
Sophos was eliminated very early on in the PoC process. Then, we looked at:
Out of these solutions, we selected SentinelOne. Their ability to respond quickly in terms of feature functionality was the biggest pro as well as their fee for agents in the cloud. The other solutions' interpretation of a cloud solution did not match with our expectations. From an overall perspective, we found SentinelOne's methodology, its effectiveness, its lightweight agents and their capabilities far exceeded other solutions that we evaluated.
SentinelOne had the highest detection rates and the ability to roll back certain ransomware, where other solutions were not even close to doing that.
It is a very good tool that is easy to deploy and manage. The administration over it is little to none. However, depending on the environment and whoever is trying to deploy the agents, they should test it with the vendor environment before they go and deploy it to production. The reason why is because SentinelOne has the ability to be tuned for optimization. So, it is better to understand what these optimizations would be before deploying them to production. That way, they will be more effective, and it will be easier to get buy-in from the DevOps team and the infrastructure team managing the servers, thus simplifying the process all around. Making the agents and configurations optimized for specific environments is key.
The Storyline feature has affected our SOC productivity. Though, we have yet to fully use the Storyline feature in a SOC. We are using it on a case-by-case basis. However, as we continue to deploy agents throughout our infrastructure and train our SOC to use the tool more effectively, that is when we will start using the Storyline feature a bit more. Currently, this is on our roadmap.
I am very familiar with the Ranger functionality, but we haven't implemented it yet for our environment. Ranger does not require any new agents nor hardware. That is a good feature and functionality, which is helpful. It can also create live, global asset inventories, which will be helpful for us. Unfortunately, we have not yet had an opportunity to roll that out and capture enough information from our infrastructure to be able to maximize the effectiveness of that functionality. We are still trying to get SentinelOne core services fully deployed in our environment.
Now that we have SentinelOne, we cannot go without it.
Compared to other solutions in the market, I would rate it as 10 out of 10.
On behalf of the entire SentinelOne team, thank you for your extensive and thoughtful review, RS. It is rewarding to hear how customers derive value from our endpoint protection and EDR, whether for user endpoint, Linux VMs, or Kubernetes-managed container clusters. Cheers.
It does what it is meant to do - Protects the end point 100% - Never been breached.