We compared CylancePROTECT and SentinelOne Singularity Complete based on our users reviews in five parameters. After reading the collected data, you can find our conclusion below:
Comparison Results: Based on user reviews, CylancePROTECT has advantages in terms of easy setup and control. It has a user-friendly interface, employs proactive AI monitoring, and has few false positives. However, it is criticized for its pricing, less user-friendly dashboard, and inadequate support and communication. On the other hand, SentinelOne Singularity Complete stands out in agent deployment, low resource usage, quick threat detection, and an intriguing interface. It also offers good value for the price, although improvements in administrative interface, stability, integration functionality, and reporting are suggested. Customer service and support for SentinelOne are generally positive, while the quality of support for CylancePROTECT is mixed.
"The price is low and quite competitive with others."
"It is very easy to set up. I would rate my experience with the initial setup a ten out of ten, with ten being very easy to set up."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"Fortinet is very user-friendly for customers."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"Ability to get forensics details and also memory exfiltration."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"I like the AI and mathematical components that they use."
"The solution is easy to deploy."
"I find the actual overall endpoint malware protection the most valuable feature of CylancePROTECT."
"The initial setup of CylancePROTECT is very easy."
"The solution is pretty easy to scale."
"Two or three years ago when the WannaCry virus struck, the people that were on Cylance were the ones that weren't affected."
"The most valuable features of CylancePROTECT are its powerful machine-learning capabilities and predictive intelligence."
"Blackberry Protect offers endpoint protection. It's easy to deploy. It's scalable and stable."
"The most valuable feature of Singularity Complete is the Ranger function."
"I have been a Mac guy for twenty years, and the feature parity and the capabilities of a Macintosh agent are unparalleled in the industry. It is the first anti-malware and antivirus that does not make you feel that you bought the wrong processor. It is really good and lightweight."
"The deep visibility is a valuable feature. I can use it during threats or alert signals that we get. I can also use it when we have alert signals from other security tools that we have."
"Their platform is really easy to work with."
"The solution is extremely stable."
"It delivers the type of security which we were hoping for, since we have a lot of different endpoint users utilizing different types of software. We have people who only use Office software, like email, Word, and PDFs. Then, we have people who use some applications that other people wrote. We also write applications in-house using people who develop software. Therefore, we have some machines using very high-end developer software for mechanical development, electronic development, and software development. Those users are used to managing their PC on their own. The centralize platform allows us to differentiate between those three groups of people. We have overall control and can oversee the security levels at all the endpoints. They have not yet been blocked in any way when performing the functions"
"The best thing is it has a secure shell command that you can use to get into any endpoint and do some jobs."
"Prevents ransomware getting through."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"The SIEM could be improved."
"The solution should address emerging threats like SQL injection."
"The only minor concern is occasional interference with desired programs."
"FortiEDR can be improved by providing more detailed reporting."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"We find the solution to be a bit expensive."
"It takes about two business days for initial support, which is too slow in urgent situations."
"We would like to see secure integration and multi-factor authentication to be able to access the administration dashboard."
"Having worked with SentinelOne, Cylance is good, however, it probably needs to add a feature similar to SentinelOne's rollback functionality. With this feature, if you get infected, with a click, you can go back to the pre-infection state. If Cylance could add this functionality to their offering as well, that would be ideal."
"CylancePROTECT could be improved in its technical support and communication."
"The OPTICS component could be made more user-friendly with respect to giving people more information."
"Reporting is an area with shortcomings in CylancePROTECT that needs to be improved."
"It's a good solution but some features just need to be updated."
"The stability could be improved."
"The solution’s technical support could be improved."
"We have had one or two occasions when we had to roll back off our Windows machine. Then, we had an issue with SentinelOne where we couldn't let the client make contact with the cloud service anymore. Therefore, the integration with the Windows Service Recovery could be improved in the future."
"They should train their own people so that they can train us better. The theory is good."
"We are not utilizing all the features available with SentinelOne Singularity Complete, including the built-in XDR and Ranger, due to the substantial associated costs."
"It would be good to see some small tools to test files or hashes that are a potential threat, I know there are already products offering this."
"Native integration with the mobile console is an area that can be improved."
"SentinelOne Singularity Complete should focus on analytical data. Backend aggregation can make things faster in the front end."
"The learning curve was a little steep."
"Singularity's reporting isn't that great. The dashboards could be more customizable. It could be better integrated with other tools. SIEM tools provide better feeds. Singularity is a separate product altogether. It does not give enough information to integrate with different solutions to correlate better."
More SentinelOne Singularity Complete Pricing and Cost Advice →
CylancePROTECT is ranked 23rd in Endpoint Protection Platform (EPP) with 41 reviews while SentinelOne Singularity Complete is ranked 2nd in Endpoint Protection Platform (EPP) with 177 reviews. CylancePROTECT is rated 8.0, while SentinelOne Singularity Complete is rated 8.8. The top reviewer of CylancePROTECT writes "Ensures advanced AI-driven threat detection to provide robust endpoint security, effectively preventing both known and unknown threats with minimal impact on system performance". On the other hand, the top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". CylancePROTECT is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Cortex XDR by Palo Alto Networks, Trellix Endpoint Security and Symantec Endpoint Security, whereas SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, Darktrace, CrowdStrike Falcon, ThreatLocker Protect and Check Point Harmony Endpoint. See our CylancePROTECT vs. SentinelOne Singularity Complete report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.