We performed a comparison between SentinelOne Singularity Complete and Seqrite Endpoint Security based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Protection Platform (EPP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is very easy to set up. I would rate my experience with the initial setup a ten out of ten, with ten being very easy to set up."
"It is stable and scalable."
"Fortinet is very user-friendly for customers."
"This is stable and scalable."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"The solution was relatively easy to deploy."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"It is easy to collect and retain logs with SentinelOne."
"The solution's in-place upgrades have been very helpful."
"The deep visibility is really important for us. With it, we can really look deep into some of the incidents."
"They provide a map, a process tree, and that is pretty good for analysis."
"The detection rate for Sentinel One has been excellent and we have been able to resolve many potential threats with zero client impact. The ability to deploy via our RMM allows us to quickly secure new clients and provides peace of mind."
"Our impressions of the solution's ability to ingest and correlate across our security solutions is perfect."
"The most valuable feature of SentinelOne is the good graph it provides. It has a specific page where it detects the recent attacks on other machines or the hackers, for example, group APT28 and all."
"The most valuable aspects of SentinelOne Singularity Complete are the ease of deployment with the Sentinel Agent and the enhanced visibility with Skylight, which provides correlation of logs and all endpoint data in a centralized location."
"There are many features available in this solution, such as asset management."
"The setup process was easy for our remote clients and us as well."
"The most valuable features of the solution are DLP, XDR, and EDR functionalities."
"The solution effectively detects malicious files and blocks sign-ins."
"The update process and policy control are good."
"In case it works, we are looking to use features like USB blocking, file upload alerts, and other antivirus features as well, but this software has to work first."
"The solution's current features include antivirus, web filtering, file activity monitoring, PAM, firewall, IDS/IPS, and DLP. Though I'm not familiar with the whole solution, it is good."
"We found the DLP to be innovative and useful."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"We've encountered challenges during API deployment, occasionally resulting in unstable environments."
"Intelligence aspects need improvement"
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"Making the portal mobile friendly would be helpful when I am out of office."
"The solution is not user-friendly."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"It has all the features that other leading products in the market provide. They should keep enhancing it based on the challenges in the market. I am fine with its detection capability, but they can work more on deep inspection."
"There is room for improvement with the management interface. It could be more user friendly."
"Communication and documentation could be improved."
"They need to improve how we install the software."
"SentinelOne's customer service has room for improvement."
"The learning curve was a little steep."
"I rate Singularity Cloud Workload Security's stability a four out of ten."
"Security could always be better."
"The solution could integrate with other products to provide a comprehensive protection strategy."
"The pricing could be a bit lower."
"Endpoint Security would be improved by adding DLP."
"We would like the solution to have integration with other security solutions so that we can have a single base for monitoring all the security incidents and concerns."
"When we fire any employee connected remotely over the internet, we need a security feature that blocks the system and the device."
"User management could be improved."
"In the next version, they should improve the areas of utility and centralized control."
"The support offered by the tool is an area of concern where improvements are required."
More SentinelOne Singularity Complete Pricing and Cost Advice →
SentinelOne Singularity Complete is ranked 2nd in Endpoint Protection Platform (EPP) with 177 reviews while Seqrite Endpoint Security is ranked 24th in Endpoint Protection Platform (EPP) with 21 reviews. SentinelOne Singularity Complete is rated 8.8, while Seqrite Endpoint Security is rated 7.4. The top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". On the other hand, the top reviewer of Seqrite Endpoint Security writes "Effectively detects malicious files and blocks sign-ins but needs integrations". SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace, ThreatLocker Protect and Wazuh, whereas Seqrite Endpoint Security is most compared with CrowdStrike Falcon, Kaspersky Endpoint Security for Business, Intercept X Endpoint, Trend Vision One Endpoint Security and Trellix Endpoint Security. See our SentinelOne Singularity Complete vs. Seqrite Endpoint Security report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.