We compared SentinelOne Singularity Complete and VMware Carbon Black Endpoint based on our users reviews in five parameters. After reading the collected data, you can find our conclusion below:
Comparison Results: Based on the reviews, SentinelOne Singularity Complete is praised for its easy setup process and user-friendly features, including agent deployment and AI capabilities. In contrast, VMware Carbon Black Endpoint may require more knowledge and experience. Carbon Black's MDR capability stands out among its features. Both products have areas for improvement, with SentinelOne needing enhancements in user-friendliness and stability, and Carbon Black requiring better node management and troubleshooting capabilities. Pricing for SentinelOne is considered reasonable, while Carbon Black is seen as more expensive. Customer support for both products receives mixed reviews.
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"Fortinet is very user-friendly for customers."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"The most valuable feature is the analysis, because of the beta structure."
"It is stable and scalable."
"The GUI is really easy to use."
"The most valuable feature is the automatic remediation."
"The most valuable feature of SentinelOne is the EDR functionality. We are protected against threats, such as ransomware."
"It protects your machine, and it does an excellent job using AI to determine an attack and stop the attack. Its most powerful feature is prevention, and it can unwind ransomware activity as well. So, it is a really useful product in that sense."
"The Ranger feature is valuable."
"Its capacity to prevent new threats."
"The solution is extremely stable."
"I was extremely happy with their technical staff. The solution's tech support is top-notch. They have some really good engineers on their team."
"The solution is extremely scalable."
"The product is pretty strong in terms of security and their features are very good in that respect."
"The product's most valuable feature is its ability to be fully integrated with the VMware environment."
"Carbon Black Defense has a higher detection ratio because it's cloud-based and it also does a lookup to virus total."
"It gives you all of the information in a short and sweet fashion."
"Provides visibility into the chain of attack and threats that use valid operating system processes to execute attacks."
"I found it very valuable as a whole. It is good at detecting anything and has kept us very safe. It is also very easy to use."
"For Carbon Black Endpoint, the possibility of integration with different other software's log servers is the important thing. Having just one point of view is more interesting so you don't need to go to different places to see all the information."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"The solution is not user-friendly."
"I haven't seen the use of AI in the solution."
"We'd like to see more one-to-one product presentations for the distribution channels."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"Making the portal mobile friendly would be helpful when I am out of office."
"Intelligence aspects need improvement"
"We find the solution to be a bit expensive."
"An area for improvement in SentinelOne is the search feature. You can't go beyond twenty thousand events, which ruins the task because it isn't enough when you're doing your investigation."
"It seems like they are doing a lot with their automatic updates. They can maybe slow down the actual release cycle to make it easier to deploy the most recent and then do it using the live update. They can continue to work on that because trying to get agent changes through change management platforms and get approvals and testing can be quite difficult."
"I would like to see category-based web filtering."
"The UI appears to be flat, and I wish to have the ability to customize it with features and buttons that are tailored to our needs."
"It is an expensive product."
"There are features that I would like them to add. They have little to do with endpoint protection, but if they could add encryption and DLP on, it would make it even better."
"SentinelOne should include Ranger Pro out of the box with Singularity Complete."
"The mobile agents need improvement, especially in their integration with the dashboard of the normal Windows Image-based agents."
"This solution works well but needs lots of tuning and optimization."
"The tech support communicates, but it's just not with movement."
"Based on all the security roles and the release privilege, it could take time for an application to be whitelisted and approved for use."
"In the next release, it would help if we can get better control over containers."
"It would be nice to have additional forensic tools that you can build into the back end."
"The node management could be much better. The one thing that they cannot do very easily is change the tenant from a backend."
"In our company, we also wanted to have network detection, like a host-based IDS on VMware Carbon Black Endpoint, but we did not get it."
"There are many different controls that are needed to be put into place for upgrading that makes it difficult. Having to re-engineer your IT infrastructure to match their software, as opposed to having it integrate and work independently causes difficulties. When there is an update to any software everyone has to be involved."
More SentinelOne Singularity Complete Pricing and Cost Advice →
SentinelOne Singularity Complete is ranked 2nd in Endpoint Protection Platform (EPP) with 177 reviews while VMware Carbon Black Endpoint is ranked 17th in Endpoint Protection Platform (EPP) with 63 reviews. SentinelOne Singularity Complete is rated 8.8, while VMware Carbon Black Endpoint is rated 7.8. The top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". On the other hand, the top reviewer of VMware Carbon Black Endpoint writes "Centralization via the cloud allows us to protect and control people working from home". SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, Darktrace, CrowdStrike Falcon, ThreatLocker Protect and Cortex XDR by Palo Alto Networks, whereas VMware Carbon Black Endpoint is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, Trend Micro Deep Security, Symantec Endpoint Security and Cisco Secure Endpoint. See our SentinelOne Singularity Complete vs. VMware Carbon Black Endpoint report.
See our list of best Endpoint Protection Platform (EPP) vendors and best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Crowdstrike USPs compared to CB and SentinelOne:
1. Very powerful Machine Learning AV
2. Device Control
3. Vulanrablity Assessment ( Sentinel One have the partial capability )
4. AWS Partner Competency
5. Leaders and having a high rating in all major Analyst reviews
6. Automated Threat Intelligence
7. Customer satisfaction and retention
Do evaluate www.cynet.com and you will find that Cynet is way ahead in the way it does Continuous Breach protection and monitoring.
IMO, it depends on whether you have abilities to validate and/or correlate telemetries - these guys brings out quite a lot of telemetry alerts for you to work on...
Are you researching to buy or to resell?
SentinelOne has not been breached
SentinelOne is hands down my recommended solution.
SentinelOne has not been breached and offers upto $1,000,000 warranty if it cannot roll back a ransomware attack.
Please contact me at CyberSec@global.co.za for more information, a demonstration, or a quote.
Your reputation and your company's cyber security is in your hands - make an informed decision
They address slighty differing customer profiles, Crowdstrike has deep integrations to Okta, Sailpoint and others, where as SentinelOne has AI automation that outstrips the general use case associated to most threat detection elements.