We performed a comparison between Elastic Security and SentinelOne Singularity Complete based on real PeerSpot user reviews.
Find out in this report how the two Extended Detection and Response (XDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We also use Microsoft Sentinel, Defender for Cloud, Defender for Identity, and Microsoft Defender for Cloud Apps. They are all integrated and it was very easy to integrate them. In my experience with the integrations, it was just a click of a button and things were integrated. It's just a button."
"I like how Microsoft XDR and the other Microsoft products are integrated into a single unified security stack covering identity access management, endpoint protection, email, cloud applications, etc."
"The EDR and the way it automatically responds to ransomware and other attacks are valuable features."
"The Endpoint Manager is incredible; it has a very straightforward interface and is exceedingly easy to use. Pulling out and deploying different tags or resources is a simple task across various departments with different levels of security. The notifications are also simple and satisfying; it's great to see the bubble informing us which devices are compliant and which are waiting to update."
"The integration with other Microsoft solutions is the most valuable feature."
"Microsoft 365 Defender is simple to upgrade."
"The ability to integrate and observe a more cohesive narrative across the products is crucial."
"I like the easy integration and advanced possibilities. We can implement it at customer sites in a few clicks, but we can also dive deep and drill down to extended features. There's a very good starting point to get into this product and all the features from Defender."
"It's not very complicated to install Elastic."
"The most valuable feature is the machine learning capability."
"The most valuable features of Elastic Security are it is open-source and provides a high level of security."
"Elastic Security is very customizable, and the dashboards are very easy to build."
"It is the best open-source product for people working in SO, managing and analyzing logs."
"Its flexibility is most valuable. We can have a number of scenarios, and we can get logs from anything. If we know how to use Logstash, we can tweak it in many ways. This makes the logging search on Elastic very easy."
"ELK documentation is very good, so never needed to contact technical support."
"What customers found most valuable in Elastic Security feature-wise is the search capability, in particular, the way of writing the search query and the speed of searching for results."
"It provides network and asset visibility for us."
"The fact that SentinelOne is actively looking for threats and runs them against the hash on the Internet to determine if they are malicious or not, is what takes it to the next level compared to other antivirus products."
"The solution is both stable and scalable."
"The tool's most valuable feature is EDR."
"The most valuable feature is the ability to drill down into individual sequences of processes."
"When there is an incident, the solution's Storyline feature gives you a timeline, the whole story, what it began with, what it opened, et cetera. You have the whole picture in one minute. You don't need someone to analyze the system, to go into the logs. You get the entire picture in the dashboard. The Storyline feature has made our response time very fast because we don't need to rely on outside help."
"The solution offers very rich details surrounding threats or attacks."
"The most valuable feature of SentinelOne is the good graph it provides. It has a specific page where it detects the recent attacks on other machines or the hackers, for example, group APT28 and all."
"The console is missing some features that would be helpful for a managed services provider, like device and user management."
"There could be a way to proactively monitor unusual activity ."
"In the beginning, it's difficult to navigate the system because it is quite large. Just trying to find your way and understand how the system works can be hard. After spending quite a lot of time searching it's a lot easier, but I wish it were a bit more user-friendly when you're trying to find things."
"The patching capability should be there. Patching is something that you cannot do even though you see the vulnerabilities present in your environment. For patching, you have to depend on another solution."
"At times, there may be delays in the execution of certain actions and their effects."
"There is no common area where we can manage all the policies for the EDR, third-party solutions, devices, servers, Windows, Mac, etc., but it's on the road map, and we ware waiting for that feature."
"It would be helpful if the solution could scan faster when it comes to scanning attachments to emails."
"Microsoft frequently changes the names of its products, sometimes even renaming entire portals or features."
"In terms of what could be improved with Elastic, in some use cases, especially on the advanced level, they are not ready made, so you'll have to write some scripts."
"This solution cannot do predictive maintenance, so we have to build our own modules for doing it."
"They don't provide user authentication and authorisation features (Shield) as a part of their open-source version."
"Elastic Security's maintenance is hard and its scalability is a challenge. There are complications in scaling and upgrading. The solution needs to also provide periodic upgrade checks."
"I would like the process of retrieving archived data and viewing it in Kibana to be simplified."
"Its documentation should be a bit better. I have to spend at least a couple of hours to find the solution for a simple thing. When we buy Elastic, training is not included for free with Elastic. We have to pay extra for the training. They should include training in the price."
"The solution does not have a UI and this is one of the reasons we are looking for another solution."
"There isn't really a very good user experience. You need a lot of training."
"The solution should include USB blocking for specific machines."
"There is room for improvement with the management interface. It could be more user friendly."
"It is difficult to manage users in SentinelOne."
"The anti-ransomware technology takes up a lot of disc space."
"I would like to see the reports from SentinelOne more customizable, as there are very few options."
"SentinelOne Singularity Complete should focus on analytical data. Backend aggregation can make things faster in the front end."
"The reporting needs improvement and I would like to see a more granular level of administrative privileges."
"With respect to product patches, it should have the ability to patch directly from SentinelOne, rather than be presented with a list and have to do it separately."
More SentinelOne Singularity Complete Pricing and Cost Advice →
Elastic Security is ranked 7th in Extended Detection and Response (XDR) with 58 reviews while SentinelOne Singularity Complete is ranked 2nd in Extended Detection and Response (XDR) with 176 reviews. Elastic Security is rated 7.6, while SentinelOne Singularity Complete is rated 8.8. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Fortinet FortiAnalyzer, whereas SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace, ThreatLocker Protect and Datto Endpoint Detection and Response (EDR). See our Elastic Security vs. SentinelOne Singularity Complete report.
See our list of best Extended Detection and Response (XDR) vendors and best Endpoint Detection and Response (EDR) vendors.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.