It runs continuously and uses AI to look for any suspicious activity. If it does determine that there is a virus or something going on that shouldn't be happening, it not only stops the process but also completely logs the whole function. It tells you in a map version how the attack happened and how it was stopped. It is brilliant. In the past, for example, if I had the same problem in Webroot, I would've had to submit the case to Webroot for viewing so that they could, as a human, literally determine what the cause was, but by that time, it is way too late, whereas, this is the real-time protection.
Senior IT Consultant at Jeneri IT
Does an excellent job of using AI to determine and stop an attack, and the peace of mind it gives is significant
Pros and Cons
- "It protects your machine, and it does an excellent job using AI to determine an attack and stop the attack. Its most powerful feature is prevention, and it can unwind ransomware activity as well. So, it is a really useful product in that sense."
- "While the cost of SentinelOne is higher than Webroot, the reality is that the peace of mind and the knowledge that you are probably not going to get a complete attack, simply because SentinelOne stepped in and stopped it, is worth every penny."
- "One of the things they could do is extend the product range to include Android and iPhone so that you could have the app on your phone as well. There is probably something going on there with that, but that's something that they're lacking at the moment. For instance, if I was to have to recommend a client to protect their phone, I'd have to recommend Norton or something else. I don't have an answer within the SentinelOne solution."
- "One of the things they could do is extend the product range to include Android and iPhone so that you could have the app on your phone as well."
How has it helped my organization?
What is most valuable?
It protects your machine, and it does an excellent job using AI to determine an attack and stop the attack. Its most powerful feature is prevention, and it can unwind ransomware activity as well. So, it is a really useful product in that sense.
There is the ability to SSH into a machine even if the machine has been disconnected from the network. When a real hazard happens, SentinelOne disconnects it from the internet so that no more transactions can occur, but I still have access to the machine. One of the bigger benefits is that no harm could be done because there is no communication with the internet, but I still have the ability to go in, restart a machine, do some investigations, and make some things happen.
What needs improvement?
One of the things they could do is extend the product range to include Android and iPhone so that you could have the app on your phone as well. There is probably something going on there with that, but that's something that they're lacking at the moment. For instance, if I was to have to recommend a client to protect their phone, I'd have to recommend Norton or something else. I don't have an answer within the SentinelOne solution.
For how long have I used the solution?
I have been using this solution for close to three years.
Buyer's Guide
SentinelOne Singularity Endpoint
March 2026
Learn what your peers think about SentinelOne Singularity Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
886,174 professionals have used our research since 2012.
What do I think about the stability of the solution?
It is perfect. I've seen very few problems related to the app. It is not using too much of the PC's power. It does not make PCs slower. So, I find it the best of both worlds. You reduce the impact of the product on the user, but at the same time, thoroughly protect the user, no matter what he does.
What do I think about the scalability of the solution?
You can certainly have thousands of SentinelOne users. We have 250 users. In terms of our plans to increase its usage, I provide IT as a service. So, as I add clients, I always add licenses for those clients.
How are customer service and support?
Their support is very good. I would rate them a five out of five.
How was the initial setup?
It was straightforward. It probably took me a week to get 250 machines converted.
What about the implementation team?
It can be done in-house very easily. You probably need one staff member that knows how to implement it, and after that, it pretty much runs itself. It requires very little maintenance.
What's my experience with pricing, setup cost, and licensing?
It is not sold as a consumer product. It is only sold based on the number of licenses. So, as an MSP, you're probably going to pay about three and a half dollars per license, per month to have SentinelOne.
What other advice do I have?
I would advise others to go for it. It is great. As an MSP, the peace of mind it gives me is really significant. While the cost of SentinelOne is higher than Webroot, the reality is that the peace of mind and the knowledge that you are probably not going to get a complete attack, simply because SentinelOne stepped in and stopped it, is worth every penny.
I would rate it a ten out of ten. It is absolutely fantastic.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director of Technology and Digital Transformation at Banco Fibra
Collects logs and data and integrates well with other solutions
Pros and Cons
- "It is easy to collect and retain logs with SentinelOne."
- "It is easy to collect and retain logs with SentinelOne."
- "The only concern we have is that there are a few features that were not readily available."
- "The only concern we have is that there are a few features that were not readily available."
What is our primary use case?
We use SentinelOne to collect logs and data. We will connect it to other tools and places in the future.
What is most valuable?
It is easy to collect and retain logs with SentinelOne. When you need to compare information, the data is available. It also has the possibility to configure information. It integrates well with all the other solutions we use.
What needs improvement?
The only concern we have is that there are a few features that were not readily available. We use a lot of application files that didn't have a connection.
We would also like to see integration with other tools that have to collect the logs.
Although Microsoft claims the use of building artificial intelligence to correlate events, we have actually had a couple of events that should have logs but did not. The solution is not at the same level in terms of building artificial intelligence.
SentinelOne can do a better job of not only creating corrective action based on the correlation. For example, someone was trying to repeatedly change their password. What they didn't realize was that they weren't connected correctly.
For how long have I used the solution?
I have been using SentinelOne for six months.
What do I think about the stability of the solution?
SentinelOne is a stable product.
What do I think about the scalability of the solution?
Scalability is based on the measure. There is no limitation regarding scalability if you pay for the upgrades.
How are customer service and support?
Technical support is good. When you need help from Microsoft, there is a long list of resources to help understand the issues.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is straightforward as we have contracts with Microsoft Office Supplies, commodities, defender, and Active Directory.
I would rate the ease of initial setup of SentinelOne a five out of five. It is easy.
What about the implementation team?
Our company used a third party that provided the utility.
What's my experience with pricing, setup cost, and licensing?
This solution is less expensive than its competitors. You might need to buy additional space depending on how much they are willing to provide. I would rate the pricing a five out of five.
Which other solutions did I evaluate?
We selected SentinelOne because it was less expensive than the competitors. We also saw the speed of evolution with Microsoft, so it can be involved theoretically when compared to Splunk.
We also chose SentinelOne because of the balance between features. It is stable and has enough choices. Being with Microsoft, we felt confident that the solution would evolve.
What other advice do I have?
If you are considering SentinelOne, you should consider the cost of storage. Otherwise, the product is easy to deploy. You either need to have your own security operating center or hire someone that will use Sentinel or the secondary service. For you to consume the data, you may have had an internal security center or Sentinel.
With SentinelOne you have to invest extra cost. You have to always think of how much it will cost you to delay a response by a couple of days. If the incident is going to cost two days of revenue for the organization, that is much more than the cost of the solution.
I would rate SentinelOne an eight out of ten because of the price point and the features you get.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
SentinelOne Singularity Endpoint
March 2026
Learn what your peers think about SentinelOne Singularity Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
886,174 professionals have used our research since 2012.
Security Head at a financial services firm with 11-50 employees
Excellent for detection and device blocking and offer good network control
Pros and Cons
- "The solution is both stable and scalable."
- "We are very satisfied with the product overall."
- "The delay in updating inventory is ten minutes. If it can be improved, it will help a lot."
- "The inventory is a good feature. However, it's not up to date."
What is our primary use case?
We use the solution for anti-malware, policy enforcement, and blocking USBs, for example. It's used for detection in general, and for protection and threat blocking.
What is most valuable?
The solution is very straightforward to set up.
The features are great. It is excellent for detection and device blocking.
The network control has been useful, as well as the firewall control.
The solution is both stable and scalable.
What needs improvement?
The inventory is a good feature. However, it's not up to date. The delay in updating inventory is ten minutes. If it can be improved, it will help a lot.
For the general IT management, there is a need to correlate the software version from inventory with the CVE information. For example, we have the CVE, however, it doesn't take into account the current version. We need it to stay up to date with the latest version.
For how long have I used the solution?
I've used the solution for less than one year.
What do I think about the stability of the solution?
The solution is quite stable. It's reliable. There are no bugs or glitches.
What do I think about the scalability of the solution?
The product can scale very well.
We have less than 50 people on the solution currently. We are using it in a smaller environment.
We do have plans to increase usage in the future. We are, in fact, still deploying it. So the department is not finished yet.
How are customer service and support?
We get technical support from the vendor.
Which solution did I use previously and why did I switch?
I've also used Microsoft Defender.
How was the initial setup?
It offers an easy implementation process. It's not overly complex or difficult. Setting everything up on the cloud is simple. The deployment was done in a matter of days. In the end, it took less than a week. We had two people handle the deployment process.
What about the implementation team?
We did have some outside assistance. They helped with half of the process.
What was our ROI?
We found the ROI to be quite high. However, it would vary, depending on the contract. It's a good investment. I'd give it a five out of five.
What's my experience with pricing, setup cost, and licensing?
I cannot speak to the exact pricing. That said, it's very reasonable. I'd rate it five out of five in terms of affordability. There are cheaper options; however, it is quite affordable. We pay a yearly licensing fee.
What other advice do I have?
We are a customer and end-user. We deal with a SentinelOne partner.
I can't speak to which version we are using.
Whether or not the solution would work for an organization depends on the environment and other factors. That said, we are very satisfied with the product overall.
I'd rate the solution ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud Engineer at a comms service provider with 1,001-5,000 employees
Quick deployment, beneficial lateral movement, and integrates well with Active Directory
Pros and Cons
- "The most valuable features of SentinelOne are the lateral movement and the use of the Active Directory."
- "The initial setup of SentinelOne is very easy. You only need to turn it on and it starts working with a couple of clicks."
- "SentinelOne can improve by having better integration with Active Directory."
- "SentinelOne can improve by having better integration with Active Directory."
What is our primary use case?
We use SentinelOne mainly for lateral movement, ransomware, anti-malware, AI engine, and forensics.
What is most valuable?
The most valuable features of SentinelOne are the lateral movement and the use of the Active Directory.
What needs improvement?
SentinelOne can improve by having better integration with Active Directory.
For how long have I used the solution?
SentinelOne can be deployed on-premise and in the cloud.
I have been using SentinelOne for approximately two years.
What do I think about the stability of the solution?
SentinelOne is stable. However, the only issue I had was with legacy system, such as older kernels. The newer systems are more stable.
What do I think about the scalability of the solution?
The scalability of SentinelOne is good, but my biggest concern is they need to find some way to automatically install their agents to specifically Microsoft Windows devices because not every IT infrastructure has SECM of others that automatically deploy it. It would be helpful during the migration of new customers.
We have approximately 4,000 systems using the solution and plan on adding another 400.
How are customer service and support?
I haven't had the opportunity to interact with SentinelOne support.
Which solution did I use previously and why did I switch?
I have previously used Microsoft Windows Defender.
How was the initial setup?
The initial setup of SentinelOne is very easy. You only need to turn it on and it starts working with a couple of clicks. The ease of implementation is SentinelOne strongest feature.
What about the implementation team?
We have three people deploying SentinelOne. As part of the team deploying the agent, there are multiple teams involved, and each one can deploy an agent when they have their own time.
What's my experience with pricing, setup cost, and licensing?
SentinelOne can cost approximately $70 per device.
What other advice do I have?
The advice I would give others that are thinking of implementing SentinelOne is if they have any other solutions, I would highly recommend them to start using it, especially if they have Active Directory. It's very good at picking up weird anomalies.
I rate SentinelOne an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CEO at ERG Solutions
Simple to install and manage, providing aggressive defense at a competitive price
Pros and Cons
- "SentinelOne is very simple to install and very simple to manage. It's very aggressive, so it does protection well, and it seems to be stopping attacks that other solutions cannot."
- "SentinelOne is very simple to install and very simple to manage, it is very aggressive so it does protection well, and it seems to be stopping attacks that other solutions cannot."
- "The ability to integrate this product with an antivirus solution would be welcome. Even consolidation with more security products, like Umbrella networking abilities etc. to provide more on this platform, that would be great."
- "The ability to integrate this product with an antivirus solution would be welcome."
What is our primary use case?
We primarily use the solution for endpoint protection.
What is most valuable?
SentinelOne is very simple to install and very simple to manage. It's very aggressive, so it does protection well, and it seems to be stopping attacks that other solutions cannot.
What needs improvement?
The ability to integrate this product with an antivirus solution would be welcome. Even consolidation with more security products, like Umbrella networking abilities etc. to provide more on this platform, that would be great.
For how long have I used the solution?
We have been implementing this product for our customers for a few months now.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
We have implemented this product for companies ranging from 10 to 200 endpoints, with many hundreds of users and it has been fine with this volume.
How are customer service and support?
We get support from our local reseller in Israel and their support has been fine.
Which solution did I use previously and why did I switch?
We trialed an ESET product, but it didn't provide us with the solution we needed.
How was the initial setup?
The implementation time depends on the size of the network but it's usually very short, no more than a day or two.
What's my experience with pricing, setup cost, and licensing?
The pricing of the solution seems reasonable, we got a discount but it still seems reasonable. The licensing cost is $3 to $4 per endpoint and can be paid monthly or yearly, with the price changing according to commitment.
What other advice do I have?
I would rate this solution a nine out of ten.
I would say it is important to understand all the settings to deliver exactly what the customer requires.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Technologies Manager at VAS Bilisim Teknolojileri A.S
Reliable, easy to set up and easy to use
Pros and Cons
- "The product can scale as needed."
- "It's an easy tool and it offers a different experience."
- "Security could always be better."
- "Security could always be better."
What is our primary use case?
We primarily use the solution for security purposes.
What is most valuable?
It's an easy tool and it offers a different experience. It is a new generation product.
The initial setup was easy.
It's stable and reliable.
The product can scale as needed.
What needs improvement?
While I'm sure improvements are necessary, there isn't one specific area I've found to be lacking.
Security could always be better. It always needs to be adjusted to keep up with what's happening.
For how long have I used the solution?
I've been using the solution for two years.
What do I think about the stability of the solution?
We haven't had any issues with stability. It's reliable. there are no bugs or glitches and it doesn't crash or freeze.
What do I think about the scalability of the solution?
It's scalable. We are using management software on the cloud. Therefore, if we want to install 1,000 agents, it doesn't impact our business now. We can scale and it's got a central implementation method for agents.
How are customer service and support?
Technical support has been very good and we are quite pleased with them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We actually use regular antivirus solutions as well, such as Sophos and McAfee.
How was the initial setup?
It's a simple, straightforward setup. It is not overly complex or difficult.
We have a small IT team and have found that we just need to have one person managing the product.
What about the implementation team?
We deployed it using an outside resource.
What's my experience with pricing, setup cost, and licensing?
I cannot speak to the exact cost. Our managers buy the licenses. That said, it is my understanding that we are using the subscription model and pay for it yearly. I'm not sure if there are any other ancillary fees beyond that.
What other advice do I have?
I'm a customer and end-user.
I'm not sure which version of the solution I'm using.
I'd rate the solution eight out of ten. It's a good overall product.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Team Lead at Alepo
It scans quickly and doesn't use a lot of system resources
Pros and Cons
- "I like that SentinelOne doesn't use a lot of system resources or make the system slow. It also performs a full scan quickly—within two hours. It has an easy-to-use end-user GUI."
- "Since we implemented the solution, we haven't seen any big cyberattacks get through, which has happened before."
- "We'd like SentinelOne to upgrade automatically. It doesn't automatically update the agent if some system has an older version of the SentinelOne. It has to be triggered from the console."
- "We'd like SentinelOne to upgrade automatically. It doesn't automatically update the agent if some system has an older version of the SentinelOne."
What is our primary use case?
Sentinel One protects our endpoints from malware, viruses, trojans, and other cyber attacks. We outsource the management of Sentinel One to another organization. They monitor for infections at any endpoint on the console and work to determine if it's a false positive or an actual attack.
Most of the time, Sentinel One can automatically identify an attack, and it quarantines the process to block the attack. If Sentinel One can't make that determination on its own, the third-party team will further investigate the suspicious traffic.
How has it helped my organization?
SentinelOne is doing its job and protecting our endpoints from various cyberattacks. Since we implemented the solution, we haven't seen any big cyberattacks get through, which has happened before. Any malware and threats we've seen in the past have been resolved by SentinelOne.
What is most valuable?
I like that SentinelOne doesn't use a lot of system resources or make the system slow. It also performs a full scan quickly—within two hours. It has an easy-to-use end-user GUI.
What needs improvement?
We want more communication about features that we request and when they will be added to the product. For example, they can tell us what is being done about it. part, if that can be shared for the new features.
We've requested that SentinelOne's agent provide more reporting on the endpoint's OS, system host, modem, and serial number. It's not able to determine this now. If the SentinelOne team can provide us with some updates about whether they're working on it, that would be useful.Also, we'd like SentinelOne to upgrade automatically. It doesn't automatically update the agent if some system has an older version of the SentinelOne. It has to be triggered from the console.
For how long have I used the solution?
We have been using SentinelOne for a year now.
What do I think about the stability of the solution?
We've had SentinelOne for a year and haven't faced any major issues, so I would say it is reliable.
What do I think about the scalability of the solution?
SentinelOne is scalable, but we need to purchase additional licenses. We have purchased two licenses for 300 endpoints. The license not only applies to the users but also to some of the servers. We have SentinelOne installed on some of our critical servers. It can be scaled to whatever size we want if we purchase enough licenses.
How are customer service and support?
We haven't contacted SentinelOne support directly. When we need help, we reach out to our service provider. SentinelOne deals with threats when it detects them. If not, the service provider will analyze them. We haven't had issues with them so far. Their service is satisfactory and cost-effective.
Which solution did I use previously and why did I switch?
This is the first time we have used endpoint security. We were using an antivirus solution before this. I would say Sentinel One is doing the job perfectly.
How was the initial setup?
Setting up SentinelOne is a pretty straightforward process. We have around 300 systems in our environment. Working with our security service provider and four other colleagues, we completed the deployment 10 to 15. It's worth noting that we were handling our daily tasks, so we weren't working on this the entire time.
After deployment, we have to scan the endpoint for maintenance and upgrade. We also need to regularly update the endpoint agents from the console. Our security service provider primarily handles upgrades to the console itself.
What about the implementation team?
We have outsourced this whole thing to a security service provider. They provide complete security services for SentinelOne. They worked with our in-house IT team, and I took the lead. Once I learned the process from them, I could deploy it on a few systems, and they did the rest.
What's my experience with pricing, setup cost, and licensing?
SentinelOne isn't cheap, but it's less expensive than CrowdStrike It's priced competitively. There are no add-ons. We have a Singularity Complete license, which includes everything we need for endpoint protection.
Which other solutions did I evaluate?
We compared a few endpoint security solutions, including CrowdStrike before introducing SentinelOne to our organization
What other advice do I have?
I rate SentinelOne eight out of 10. It's a good endpoint security tool, and I wouldn't hesitate to recommend it to others.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Security & Privacy Manager at a retailer with 10,001+ employees
By using the Deep Visibility feature, we found some previously unknown persistent threats
Pros and Cons
- "The Deep Visibility feature is the most useful part of the EDR platform. It gives us good insights into what is actually happening on the endpoints, e.g., when we have malicious or suspicious activity. We came from a legacy type AV previously, so we didn't have that level of visibility or understanding. For simplifying threat-hunting, it is extremely useful, where traditional techniques in threat hunting are quite laborious. We can put in indicators of compromise and it will sweep the environment for them, then they would give us a breakdown of what assets have been seen and where they have been seen, which is more of a forensics overview."
- "We saw a return of investment within the first month."
- "The role-based access is in dire need of improvement. We actually discussed this on a roadmap call and were informed that it was coming, but then it was delayed. It limits the roles that you can have in the platform, and we require several custom roles. We work with a lot of third-parties whom we rely on for some of our IT services. Part of those are an external SOC function where they are over-provisioned in the solution because there isn't anything relevant for the level of work that they do."
- "The role-based access is in dire need of improvement."
What is our primary use case?
Our use cases are for client and server visibility in our enterprise and operational technology environments, as EPP and EDR solutions.
How has it helped my organization?
Traditionally, we have had an open policy on endpoints in terms of what has actually been installed. We don't really centrally manage the application. So, we have had a sort of dirty environment. Now that we have SentinelOne with its advanced capabilities, this has enabled us to detect and categorize unwanted applications. It has given us a good foothold into the area of inventory management on endpoints when it comes to our applications as well.
One of the main selling points of SentinelOne is its one-click, automatic remediation and rollback for restoring an endpoint. It is extremely effective. Everything is reduced, like cost and manpower, by having these capabilities available to us.
What is most valuable?
The Deep Visibility feature is the most useful part of the EDR platform. It gives us good insights into what is actually happening on the endpoints, e.g., when we have malicious or suspicious activity. We came from a legacy type AV previously, so we didn't have that level of visibility or understanding. For simplifying threat-hunting, it is extremely useful, where traditional techniques in threat hunting are quite laborious. We can put in indicators of compromise and it will sweep the environment for them, then they would give us a breakdown of what assets have been seen and where they have been seen, which is more of a forensics overview.
From a forensics point of view, we can see exactly what is going on with the endpoint when we have threats in progress. It also gives us the ability to react in real-time, if it has not been handled by the AI. We have set the policy to protect against unknown threats, but only alert on suspicious ones.
The Behavioral AI feature is excellent. It is one of the reasons why we selected SentinelOne. We needed a solution that was quite autonomous in its approach to dealing with threats when presented, which it has handled very well. It has allowed us to put resources into other areas, so we don't need to have someone sitting in front of a bunch of screens looking at this information.
The Behavioral AI recognizes novel and fileless attacks, responding in real-time. We have been able to detect several attacks of this nature where our previous solution was completely blind to them. This has allowed us to close gaps in other areas of our environment that we weren't previously aware had some deficiencies.
The Storyline technology is part of our response matrix, where you can see when the threat was initially detected and what processes were touched, tempered, or modified during the course of the threat. The Storyline technology's ability to auto-correlate attack events and map them to MITRE ATT&CK tactics and technique is very effective. By getting that visibility on how the attack is progressing, we can get a good idea of the objective. When we have the reference back to the framework, that is good additional threat intelligence for us.
Storyline automatically assembles a PID tree for us. It gives us a good framing of the information from a visibility standpoint, so it is not all text-based. We can get a visualization of how the threat or suspicious activity manifested itself.
The abilities of Storyline have enabled our incident response to be a lot more agile. We are able to react with a lot greater speed because we have all the information front and center.
The solution’s distributed intelligence at the endpoint is extremely effective. We have a lot of guys who are road warriors. Having that intelligence on the network to make decisions autonomously is highly valuable for us.
What needs improvement?
The role-based access is in dire need of improvement. We actually discussed this on a roadmap call and were informed that it was coming, but then it was delayed. It limits the roles that you can have in the platform, and we require several custom roles. We work with a lot of third-parties whom we rely on for some of our IT services. Part of those are an external SOC function where they are over-provisioned in the solution because there isn't anything relevant for the level of work that they do.
For how long have I used the solution?
We have used it for around 10 to 11 months.
What do I think about the stability of the solution?
In the 11 months that we have had it, we have only had one problem. That was related back to a bug on the endpoint agent. So. it is very stable when I compare it to other platforms that I have used, like McAfee, Symantec, and Cylance.
Being a SaaS service, they take care of all the maintenance on the back-end. The only thing that we have to do is lifecycle the agents when there is a new version or fixes. So, it is very minimal.
What do I think about the scalability of the solution?
It is highly scalable. It is just a case of purchasing more licensing and deploying agents.
We have three global admins, myself included, with about 10 other administrators. Primarily, the way that we are structured is we have a client team and a server team. So, we have resources from each geographical region who have access to the solution to police their own environment on a geographical basis. So, we have three global admins, then everybody else just has a sort of SoC-based level functionality, which goes back to the custom role issue because this is too much access.
How are customer service and technical support?
The technical support is very good. My only criticism is they are not very transparent when they are giving you a resolution to a problem. We have had several cases where we have had a problem that we have been given the fix for it. However, when we asked for background information on the actual problem, just to get some more clarity, it is very difficult to get that. I don't know if it's relative to protecting the information regarding the platform or a liability thing where they don't want to give out too much information. But, in my experience, most vendors when you have a problem, they are quite open in explaining what the cause of the issue was. I find SentinelOne is a bit more standoffish. We have gotten the information in the end, but it is not an easy process.
When responding to fixing a problem, they are excellent. It is any of the background information that we are after (around a particular problem) that we find it difficult to get the right information.
Which solution did I use previously and why did I switch?
We were previously using Trend Micro Deep Security. The primary reason why we switched was that it is rubbish. It is a legacy-based AV. We had a lot of problems functionality-wise. It was missing a lot of things, e.g., no EDR, no NextGen capabilities, and it had interoperability problems with our Windows platform deployments. So, there was just this big, long list of historical problems.
We specifically selected SentinelOne for its rollback feature for ransomware. When we started looking into securing a new endpoint solution about 24 months ago, there was a big uptick in ransomware attacks in the territory where I am based. This was one of the leading criteria for selecting it.
How was the initial setup?
The initial setup is extremely straightforward. The nature of the platform has been very simplistic when it comes to configuring the structure for our assets and policies. Several other platforms that I have worked with are quite complex in their nature, taking a lot of time. We were up and running within a day on the initial part of our rollout. For the whole organization, it took us about 30 days to roll out completely in five different countries across roughly 20,000 endpoints.
Behavioral AI works both with or without a network connection. We tested it several times during procurement. It can work autonomously from the network. One of our selection criteria was that we needed it to be autonomous because we have air gapped environments. Therefore, we can connect, install, or disconnect, knowing that we have an adequate level of protection. This mitigates certain risks from our organization. It also gives us good assurance that we have protection.
We had a loose implementation strategy. It was based on geography and the size of the business premises in each country. We started with our administration office, but most of our environment is operational technology, e.g., factories and manufacturing plants.
What about the implementation team?
We did the deployment ourselves, but we had representation from the vendor in the form of their security engineer (SE). We did the work, but he gave us input and advisories during the course of the deployment.
Three of us from the business and one person from Sentinel (their SE) were involved in the deployment of SentinelOne.
What was our ROI?
We saw a return of investment within the first month.
On several occasions, we found some persistent threats that we wouldn't have known were there by using the Deep Visibility feature.
The solution has reduced incident response time by easily 70 percent.
The solution has reduced mean time to repair by probably 40 to 50 percent. This has been a game changer for us.
Analyst productivity has increased by about 50 percent.
What's my experience with pricing, setup cost, and licensing?
We are on a subscription model by choice. Therefore, we are paying a premium for the flexibility. We would have huge cost savings if we committed to a three-year buy-in. So, it's more expensive than the other solutions that we were looking at, but we have the flexibility of a subscription model. I think the pricing is fair. For example, if we had a three-year tie-in SentinelOne versus Cylance or one of the others, there is not that much difference in pricing. There might be a few euro or dollars here and there, but it's negligible.
Which other solutions did I evaluate?
We evaluated:
- Microsoft Defender for Endpoint
- Cisco AMP for Endpoints
- CylancePROTECT
- Apex One, which is Trend Micro's NextGen platform.
The main differentiator between SentinelOne has been ease of use, configuration, and performance. It outperformed every single one of the other solutions by a large margin in our testing. We had a standardized approach in tests, which was uniform across the platforms. Also, there is a lot of functionality built into SentinelOne, where other vendors offered the additional functionality as paid add-ons from their basic platforms.
During our evaluation process, SentinelOne detected quite a lot of things that other solutions missed, e.g., generic malware detection. We had a test bed of 15,000 samples, and about 150 were left for SentinelOne. What was left was actually mobile device malware, so Android and iOS specific, fileless attacks, and MITRE ATT&CKs. SentinelOne performed a lot stronger than others. Cylance came second to SentinelOne, even though they were 20 percent more effective in speed and detection. The gulf was so huge compared to other solutions.
SentinelOne's EDR is a lot more comprehensive than what is offered by Cylance. They are just two different beasts. SentinelOne is a lot more user-friendly with a lot less impactful on resources. While I saw a lot of statistics from Cylance about how light it is, in reality, I don't think it is as good as the marketing. What I saw from SentinelOne is the claims that they put on paper were backed up by the product. The overall package from SentinelOne was a lot more attractive in terms of manageability, usability, and feature set; it was just a more well-rounded package.
What other advice do I have?
Give SentinelOne a chance. Traditionally, a lot of companies look at the big brand vendors and SentinelOne is making quite a good name for itself. I have actually recommended them to several other companies where I have contacts. Several of those have picked up the solution to have a look at it.
You need to know your environment and make sure it is clean and controlled. If it's clean and you have control, then you will have no problems with this product. If your environment isn't hygienic, then you will run into issues. We have had some issues, but that's nothing to do with the product. We have never been really good at securing what is installed on the endpoint, so we get a lot of false positives. Give it a chance, as it's a good platform.
I would give the platform and company, with the support, a strong eight or nine out of 10.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Download our free SentinelOne Singularity Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Endpoint Detection and Response (EDR) Security Information and Event Management (SIEM) Endpoint Protection Platform (EPP) Anti-Malware Tools Extended Detection and Response (XDR) AI-Powered Cybersecurity Platforms AI ObservabilityPopular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Cortex XDR by Palo Alto Networks
Splunk Enterprise Security
IBM Security QRadar
Fortinet FortiEDR
Huntress Managed EDR
HP Wolf Security
Elastic Security
Microsoft Defender XDR
Trellix Endpoint Security Platform
WatchGuard Firebox
Buyer's Guide
Download our free SentinelOne Singularity Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between Carbon Black CB Defense, CrowdStrike, and SentinelOne?
- Which is better - SentinelOne or Darktrace?
- What do you recommend to choose when replacing Symantec EDR: SentinelOne or CrowdStirke Falcon?
- Cortex XDR by Palo Alto vs. Sentinel One
- Which solution do you prefer: CrowdStrike Falcon or SentinelOne Singularity Complete?
- Does SentinelOne have a Virtual Patching functionality?
- What is the biggest difference between EPP and EDR products?
- What is the difference between EDR and traditional antivirus?
- What is your recommendation for a 5-star EDR with low resource consumption for a financial services company?
- Which is the best EDR for a logistics company with 500-1000 employees?


















Thank you for your patience. I'm happy to report that today we released fully custom RBAC roles as generally available. Again, thank you for your feedback and continued patronage. If ever I may be of service, I am not difficult to find online.