We performed a comparison between Trellix Endpoint Security and SentinelOne Singularity Complete based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Trellix Endpoint Security users like the ePolicy Orchestrator, the solution’s robust central management console. SentinelOne Singularity Complete is praised for its dependable threat prevention and ability to reverse ransomware file encryption. Trellix could improve by reducing resource usage, enhancing stability, and making the solution more user-friendly. SentinelOne could improve its automation, machine learning, and AI capabilities while improving reporting and integration.
Service and Support: Some users say Trellix support is helpful and responsive, while others believe there is room for improvement in communication and resolution times. Customers have been pleased with SentinelOne’s customer service. Reviews highlighted the support team’s responsiveness and efficiency.
Ease of Deployment: Setting up Trellix Endpoint Security is simple if the user has some expertise. Users find the initial setup for SentinelOne Singularity Complete to be quick and painless, with helpful support from the vendor team.
Pricing: Trellix Endpoint Security’s pricing is considered flexible, competitive, and about average compared to other solutions. Some reviewers thought SentinelOne Singularity Complete is reasonably priced and competitive, while others say it’s costlier than many alternatives.
ROI: Users reported saving time by implementing Trellix Endpoint Security. SentinelOne Singularity Complete yields an ROI by saving money and protecting against ransomware attacks. Other users noted its valuable dashboard data and low CapEx requirements.
Comparison Results: Based on user feedback, SentinelOne Singularity Complete is the preferred choice compared to Trellix Endpoint Security. Users find the setup process of SentinelOne to be simple and low-maintenance. The product's ability to detect and handle threats effectively is highly praised, along with its autonomous threat mitigation capabilities. The pricing is considered fair and competitive, and users believe the return on investment is substantial. Furthermore, customers appreciate the excellent customer service and support provided by SentinelOne, with the technical support team being particularly responsive and helpful.
"Microsoft 365 Defender is simple to upgrade."
"Another noteworthy feature that I find appealing in Microsoft Defender is the credit-backed simulation. This feature enables organizations to train their users on effectively responding to phishing emails through a simulated training environment."
"The most valuable aspect is undoubtedly the exploration capability"
"My clients like Defender's file integrity monitoring. They're monitoring Windows and Linux system files."
"Many people don't realize that Microsoft Azure, Exchange Online, and the security and compliance portal all sync together. For instance, within the Azure portal you can set security restrictions and policies to help secure your tenants... The good part of it is that these products have already been integrated. When you sign on as an admin you have global admin rights and that gives you access to all these features."
"Microsoft 365 Defender is a good solution and easy to use."
"The summarization of emails is a valuable feature."
"Email protection is the most valuable feature of Microsoft Defender XDR."
"I like Singularity's rollback features, threat-hunting, and Ranger Insights. The Ranger feature scans the network and provides visibility into all the unsecured assets."
"The most valuable feature is the quick response to attacks."
"When there is an incident, the solution's Storyline feature gives you a timeline, the whole story, what it began with, what it opened, et cetera. You have the whole picture in one minute. You don't need someone to analyze the system, to go into the logs. You get the entire picture in the dashboard. The Storyline feature has made our response time very fast because we don't need to rely on outside help."
"It has saved us from a couple of ransomware attacks already."
"I really like the storyline feature."
"The process visualization, automated response, and snapshotting are valuable. The integration and automation possibilities are also valuable."
"The ability to get queries by pressing the "tab" button is a plus for SentinelOne."
"The visibility component is the most valuable feature."
"The product is quite user-friendly."
"Trellix Security Endpoint can promptly isolate any host machines directly from the console. If alerts are received and isolation is necessary, it can be accomplished through the console. The console itself holds significant value, accessible through a browser and allowing remote actions via cloud login."
"It also allows multifunctionality within a single platform."
"It is a stable solution...The solution's technical support is good."
"The solution provides a data view of the Alpha systems with Trellix installs and makes small changes to the central management console. Nothing on the endpoints themselves works, but it focuses more on the management side."
"The endpoint security, antivirus and firewall are the most valuable features of Trellix Endpoint Security."
"Technical support is always available and very helpful."
"The thing that I like is that they have gathered almost all the products in one management server, the ePolicy Orchestrator."
"I personally have not seen much evidence of how Defender can enhance the story of zero trust for enterprises."
"The support could be more knowledgable to improve their offering."
"There is no common area where we can manage all the policies for the EDR, third-party solutions, devices, servers, Windows, Mac, etc., but it's on the road map, and we ware waiting for that feature."
"At times, when we have an incident email and we click on the link for that incident, it opens a pop-up, but there is nothing. It has happened a couple of times."
"The price should be adjustable by region."
"It would be beneficial to have a more seamless experience with everything consolidated in one place, particularly when dealing with aspects related to the Exchange console."
"The abundance of sub-dashboards and sub-areas within the main dashboard can be confusing, even if it all technically makes sense."
"There are a few technical issues with Defender XDR that can be improved. Sometimes, the endpoint devices are not reporting properly to the Defender 365 portal. When you're getting all the information from the Microsoft portal, the devices are sometimes not in sync. We have hundreds of endpoint devices, some needing to be onboarded again."
"One of the things they could do is extend the product range to include Android and iPhone so that you could have the app on your phone as well. There is probably something going on there with that, but that's something that they're lacking at the moment. For instance, if I was to have to recommend a client to protect their phone, I'd have to recommend Norton or something else. I don't have an answer within the SentinelOne solution."
"SentinelOne's performance and the accuracy of its incident filtering could be improved."
"It is difficult to manage users in SentinelOne."
"SentinelOne Singularity Complete takes up a lot of memory in Google Chrome, which sometimes causes it to lag, so this is an area for improvement. The solution could be improved by increasing its efficiency within the web browser."
"The UI appears to be flat, and I wish to have the ability to customize it with features and buttons that are tailored to our needs."
"I would like SentinelOne to add a threat-hunting report and more UEBA features. They could add more SIEM functionality. It would be nice to have the ability to easily drag all the logs from the agents, so there's no need for multiple agents installed on the endpoint."
"We have had one or two occasions when we had to roll back off our Windows machine. Then, we had an issue with SentinelOne where we couldn't let the client make contact with the cloud service anymore. Therefore, the integration with the Windows Service Recovery could be improved in the future."
"There is not much focus on the on-premise solution as the license cap is so huge for small and medium-sized institutions."
"I think it would be nice if Dynamic Application Control would come together with McAfee Endpoint Security."
"Currently, Trellix Endpoint Security can't find the running mutexes, while other open-source products can do it."
"The solution could provide open XDR in addition to EDR."
"We would like to see all the features available on cloud."
"We’re facing remote installation issues sometimes:"
"Its pricing needs to be improved."
"One of the drawbacks is that it is not 100% secure."
"Tech support is not as helpful as they were in the past."
More SentinelOne Singularity Complete Pricing and Cost Advice →
SentinelOne Singularity Complete is ranked 2nd in Endpoint Protection Platform (EPP) with 177 reviews while Trellix Endpoint Security is ranked 11th in Endpoint Protection Platform (EPP) with 96 reviews. SentinelOne Singularity Complete is rated 8.8, while Trellix Endpoint Security is rated 8.0. The top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". On the other hand, the top reviewer of Trellix Endpoint Security writes "Good user behavioral analysis and helpful patching but needs better support services". SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, Darktrace, CrowdStrike Falcon, ThreatLocker Protect and Datto Endpoint Detection and Response (EDR), whereas Trellix Endpoint Security is most compared with Microsoft Defender for Endpoint, Trellix Endpoint Security (ENS), CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and CylancePROTECT. See our SentinelOne Singularity Complete vs. Trellix Endpoint Security report.
See our list of best Endpoint Protection Platform (EPP) vendors and best Extended Detection and Response (XDR) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.