We performed a comparison between CyberArk Endpoint Privilege Manager and SentinelOne Singularity Complete based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Users can scale the solution."
"The solution allows me to give access and privileges to each user individually"
"This is the number one product for privilege account security."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"The most valuable feature of the solution is its performance."
"I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good."
"The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
"You can use it to strip users of their local admin rights and, at the same time, elevate applications for them."
"SentinelOne has helped us to improve our security by fine-tuning our current use cases and creating new ones."
"We are able to write some custom rules on SentinelOne."
"The process visualization, automated response, and snapshotting are valuable. The integration and automation possibilities are also valuable."
"They provide a map, a process tree, and that is pretty good for analysis."
"The detection rate for Sentinel One has been excellent and we have been able to resolve many potential threats with zero client impact. The ability to deploy via our RMM allows us to quickly secure new clients and provides peace of mind."
"The visibility component is the most valuable feature."
"It's a plug-and-play solution that works well with other out of box integrations that we have."
"The 365 management and analytics from the cloud is another great feature."
"One area that has room for improvement is in managing the credentials for network devices."
"The product's threat protection and defense capabilities need enhancement."
"The price of the product is an area of concern where improvements are required. The product's price should be made more flexible."
"Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."
"We have had some major issues with the tool, but we have worked with the R&D teams and we have worked with support. There is room for improvement, especially on response times. But they're working on it and they're doing the best they can."
"CyberArk Endpoint Privilege Manager is not suitable for the current situation because when you compare it to OTP, OTP is the strongest password solution. You can use it as a one-time password, but you have to log into the password manager itself and if you don't change your password, it will be the weakest link in the security. In OTP, you don't have that weakest link."
"CyberArk has some performance issues. For example, servers could not handle the solution when we first took CyberArk Endpoint Privilege Manager."
"It cannot be on-prem. It is only cloud-based. Sometimes, that's a restriction in terms of usage."
"I rate Singularity Complete a seven out of ten for affordability. It's more expensive than our previous solution, but it does its job well. At the same time, there is some room for improvement. Cheaper is always better."
"It would help if they could get all the relevant threat information, the related events, in one place. Currently, we need to go to a number of places and do research. If they could have it all in one place, that would help investigations."
"They can just continue adding more integrations with these big brands and software security products."
"We have had cases where Singularity Complete has caused applications to malfunction."
"We'd like to have a network map or scan to cover network security."
"I encountered issues running Singularity Complete alongside other machine-learning tools."
"It would be good to see some small tools to test files or hashes that are a potential threat, I know there are already products offering this."
"The previous vendor had a lot more features and capabilities under the license. For example, I lost DLP as Sentinel One does not have DLP."
More CyberArk Endpoint Privilege Manager Pricing and Cost Advice →
More SentinelOne Singularity Complete Pricing and Cost Advice →
CyberArk Endpoint Privilege Manager is ranked 6th in Privileged Access Management (PAM) with 27 reviews while SentinelOne Singularity Complete is ranked 2nd in Endpoint Detection and Response (EDR) with 176 reviews. CyberArk Endpoint Privilege Manager is rated 8.0, while SentinelOne Singularity Complete is rated 8.8. The top reviewer of CyberArk Endpoint Privilege Manager writes "Offers integrated solutions and expands its capabilities through strategic acquisitions". On the other hand, the top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". CyberArk Endpoint Privilege Manager is most compared with Microsoft Defender for Endpoint, BeyondTrust Endpoint Privilege Management, CrowdStrike Falcon, CyberArk Privileged Access Manager and Cortex XDR by Palo Alto Networks, whereas SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace, ThreatLocker Protect and Datto Endpoint Detection and Response (EDR). See our CyberArk Endpoint Privilege Manager vs. SentinelOne Singularity Complete report.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.