We compared SentinelOne Singularity Complete and Microsoft Defender for Endpoint based on our users' reviews across various parameters. After reading all of the collected data, you can find our conclusion below.
SentinelOne Singularity Complete offers a quick and smooth setup. The solution is praised for advanced threat detection, real-time monitoring, and comprehensive reporting, but users note room for improvement in UI, customization, and customer support. Users find Microsoft Defender's customer service excellent, with positive outcomes from utilizing the software, but suggest enhancements in system performance, UI, and threat detection capabilities. SentinelOne emphasizes protection and ease of use and Microsoft Defender highlights efficient threat prevention and seamless integration with Microsoft products.
Features: SentinelOne Singularity Complete excels in advanced threat detection, real-time monitoring, easy deployment, and comprehensive reporting. Microsoft Defender for Endpoint offers robust security measures, efficient threat detection, seamless integration, a user-friendly interface, and effective management tools.
Pricing and ROI: SentinelOne Singularity Complete users find its setup cost to be reasonable, with flexible licensing options for scalability. Microsoft Defender for Endpoint also offers competitive pricing and a straightforward setup process, making licensing hassle-free according to users. SentinelOne Singularity Complete offers higher ROI with comprehensive protection and ease of use, noted for better security measures. Microsoft Defender for Endpoint receives positive feedback but falls short in efficiency.
Room for Improvement: SentinelOne Singularity Complete could be improved with a more intuitive user interface, customizable options, enhanced reporting features, and better customer support. Microsoft Defender for Endpoint needs enhancements in system performance, UI, and threat detection for better scanning and threat removal.
Deployment and customer support: Users praise SentinelOne Singularity Complete for its quick and smooth setup. Microsoft Defender for Endpoint has varied implementation times, ranging from three months to a week, highlighting potential extensive time requirements., SentinelOne Singularity Complete offers efficient, responsive, and knowledgeable customer service, providing quick response times and helpful guidance. Microsoft Defender for Endpoint also receives high praise for prompt and effective assistance, with knowledgeable and responsive support.
The summary above is based on 534 interviews we conducted recently with SentinelOne Singularity Complete and Microsoft Defender for Endpoint users. To access the review's full transcripts, download our report.
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"I get alerts when scripts are detected in the environment."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"The setup is pretty simple."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"Ability to get forensics details and also memory exfiltration."
"NGAV and EDR features are outstanding."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"It is quite stable. We have not had any cases, i.e., viruses, that would require a reboot, etc. We have never had a situation where we needed to reinstall the tools as a result of the Defender application or a feature being corrupt."
"The best part is that it is built into Windows, whether it is a server base or a desktop base, which gives more control over the operating system. Because Defender, the operating system, and the Office solution are by Microsoft, everything is working like hand-in-glove. Its administrative overhead is less because a desktop user has already got some experience of how to handle a Microsoft Defender notification or administer it."
"The solution's latest features for threat analysis are updated to provide us with future protection against the latest threats worldwide."
"What I found most valuable in Microsoft Defender for Endpoint is that it's out-of-the-box, which brings more value to the customer. The technical support for the product is also one of the best parts, because it's good, in terms of the product knowledge of the technical engineers."
"It integrates very well with all Windows workstations or other Microsoft Endpoint products. It also works quite well. So far, I have not had any issue that hasn't been sorted out. It doesn't use too many resources, so you don't have to install different things."
"The solution's threat protection is mostly AI and machine-learning based. That is the most important feature of the product. It also offers centralized management so I can remotely manage devices."
"The protection that it provides is quite good."
"A few years ago, when I was using a different product, I was affected by a virus that destroyed everything. Since using Microsoft Defender, I have not had this kind of problem."
"It uses AI technology so it can find known and unknown threats. It is stable and provides one of the best technical support."
"The protection SentinelOne Singularity Complete provides to our endpoint devices in terms of cybersecurity is valuable."
"The customer support for this solution is good."
"The portal is the most valuable feature because it provides us with a single pane of glass view and is highly intuitive."
"The platform is user-friendly, easy to administer, and aligns well with GDPR requirements, which is crucial for us."
"The ability to quickly and easily identify threats on our machines is valuable. The fact that it protects the environment as a whole is also valuable. They have the ability to identify network nodes, and they have Ranger as a component of the solution that allows us to see the whole picture. We can see on what we have SentinelOne and on what we do not."
"The most valuable feature of SentinelOne is the good graph it provides. It has a specific page where it detects the recent attacks on other machines or the hackers, for example, group APT28 and all."
"The most valuable feature is the quick response to attacks."
"Detections could be improved."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"Updates are not coming out of preview quickly enough and it is holding back on the development of the product."
"Phishing and Malware detection could be better."
"Sometimes, there are different skews. In a basic skew, they should have basic log analysis without the need to integrate with any third-party or SIEM solutions, like Sentinel. This would make it so much easier for users who don't have log collection or log analysis."
"I have accounts for administrators and corporate employees, but I also have accounts for students. I can't split these types of accounts. I need a separate configuration for both... I need to research how I can get alerts for only the administrative machines."
"Microsoft Windows Defender doesn't have a game mode."
"It makes your Surface devices hot. It is resource-intensive. It strains your CPU, not more than other file scanners around, but it also does a lot more. When you are transmitting files or data, it is continuously scanning the traffic and analyzing it bit by bit to see what's going on, and that, of course, is costly in terms of CPU. It is CPU intensive, and if you are on battery, it drains your battery fast. That's the only drawback that it has."
"Its user interface (UI) can be improved. Currently, in the console, you have to dig down for certain things. They've got many different layers to get to things instead of having it all on the surface. You have to go three folds lower to get to specific functionality or click a particular option. It would be good if we can manage the console through menus and instead of three clicks, we can do things in one click. They need to change the UI and work on it in terms of a better user experience."
"Other vendors provide a lot of customization when it comes to integration, which every big organization requires. No big organization depends on one particular tool. Defender lacks that at this point."
"The performance could be better. Singularity lags a bit, and it's a resource-hungry application, so it takes a while to load."
"I would appreciate seeing the browser extension react more effectively to events, going beyond mere detection."
"One area of SentinelOne that definitely has room for improvement is the reporting. The canned reports are clunky and we haven't been able to pull a lot of good information directly from them."
"The UI appears to be flat, and I wish to have the ability to customize it with features and buttons that are tailored to our needs."
"The reporting needs improvement and I would like to see a more granular level of administrative privileges."
"The way Singularity Complete handles blocking external mass storage is annoying because it is so difficult to unblock single endpoints."
"We have had one or two occasions when we had to roll back off our Windows machine. Then, we had an issue with SentinelOne where we couldn't let the client make contact with the cloud service anymore. Therefore, the integration with the Windows Service Recovery could be improved in the future."
"Communication and documentation could be improved."
More Microsoft Defender for Endpoint Pricing and Cost Advice →
More SentinelOne Singularity Complete Pricing and Cost Advice →
Microsoft Defender for Endpoint is ranked 1st in Endpoint Detection and Response (EDR) with 182 reviews while SentinelOne Singularity Complete is ranked 2nd in Endpoint Detection and Response (EDR) with 177 reviews. Microsoft Defender for Endpoint is rated 8.0, while SentinelOne Singularity Complete is rated 8.8. The top reviewer of Microsoft Defender for Endpoint writes "Eliminates the need to look at multiple dashboards by automatically providing one XDR dashboard to show the security score of each subscription". On the other hand, the top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". Microsoft Defender for Endpoint is most compared with Symantec Endpoint Security, Intercept X Endpoint, Cortex XDR by Palo Alto Networks, Trellix Endpoint Security and Fortinet FortiClient, whereas SentinelOne Singularity Complete is most compared with Darktrace, CrowdStrike Falcon, ThreatLocker Protect, Datto Endpoint Detection and Response (EDR) and Check Point Harmony Endpoint. See our Microsoft Defender for Endpoint vs. SentinelOne Singularity Complete report.
See our list of best Endpoint Detection and Response (EDR) vendors, best Endpoint Protection Platform (EPP) vendors, and best Anti-Malware Tools vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.