We performed a comparison between CyberArk Endpoint Privilege Manager and SentinelOne Singularity Complete based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
"This is the number one product for privilege account security."
"The most valuable feature is that their database is completely encrypted and protected with multiple layers."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"Users can scale the solution."
"The solution's technical support is good."
"I like that you can remove the admin rights from the user's computer and have control over the environment. That means you can delete the local admins and grant them proper privileges with the console. So, they will get proper permissions for applications they need, but we don't have to do it. In the domain where we don't have control, the user can only do specified actions, but not all of them."
"What sets CyberArk apart is its continuous innovation, staying ahead of the competition."
"The solution offers very rich details surrounding threats or attacks."
"It seamlessly integrates with other solutions, providing a high level of compatibility and effectiveness."
"SentinelOne’s Rollback is its best feature."
"The Deep Visibility feature is the most useful part of the EDR platform. It gives us good insights into what is actually happening on the endpoints, e.g., when we have malicious or suspicious activity. We came from a legacy type AV previously, so we didn't have that level of visibility or understanding. For simplifying threat-hunting, it is extremely useful, where traditional techniques in threat hunting are quite laborious. We can put in indicators of compromise and it will sweep the environment for them, then they would give us a breakdown of what assets have been seen and where they have been seen, which is more of a forensics overview."
"The most useful feature of all is deep visibility."
"It provides network and asset visibility for us."
"The product can scale."
"The platform is user-friendly, easy to administer, and aligns well with GDPR requirements, which is crucial for us."
"CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."
"The tool should be more user-friendly."
"CyberArk is a pretty heavy solution."
"The solution is very expensive."
"Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."
"They need much better integration with Azure AD."
"Can be improved by allowing computers to be excluded from policies."
"The price of the solution should improve."
"With respect to product patches, it should have the ability to patch directly from SentinelOne, rather than be presented with a list and have to do it separately."
"Maybe they can develop some firewall aspects for it to better protect us."
"While SentinelOne Singularity Complete effectively visualizes security data across our solutions, requiring extensive manual effort for analysis limits its effectiveness. I would therefore rate it a seven out of ten."
"I'd like to see us be able to take action on one platform for items such as security variation, security orchestration, automation, and response (SOAR)."
"The overall integration functionality for this solution could be improved."
"The mobile agents need improvement, especially in their integration with the dashboard of the normal Windows Image-based agents."
"In terms of improvement, I would like to see better alerting to let us know if there is anything wrong with SentinelOne working on the endpoint of the computer."
"Some reports could be better."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
More SentinelOne Singularity Complete Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 28 reviews while SentinelOne Singularity Complete is ranked 2nd in Endpoint Detection and Response (EDR) with 177 reviews. CyberArk Endpoint Privilege Manager is rated 8.2, while SentinelOne Singularity Complete is rated 8.8. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and VMware Carbon Black Endpoint, whereas SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, Darktrace, CrowdStrike Falcon, ThreatLocker Protect and Datto Endpoint Detection and Response (EDR). See our CyberArk Endpoint Privilege Manager vs. SentinelOne Singularity Complete report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.