We performed a comparison between SentinelOne Singularity Complete and Uptycs based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Protection Platform (EPP)."The EDR and the way it automatically responds to ransomware and other attacks are valuable features."
"The most valuable features of Microsoft 365 Defender are the combination of all the capabilities and centralized management."
"We also use Microsoft Sentinel, Defender for Cloud, Defender for Identity, and Microsoft Defender for Cloud Apps. They are all integrated and it was very easy to integrate them. In my experience with the integrations, it was just a click of a button and things were integrated. It's just a button."
"The most valuable feature is the network security."
"The ability to integrate and observe a more cohesive narrative across the products is crucial."
"Defender XDR has a feature called the timeline that lets you track all activities. It helps a lot with investigations."
"The threat intelligence is excellent."
"Many people don't realize that Microsoft Azure, Exchange Online, and the security and compliance portal all sync together. For instance, within the Azure portal you can set security restrictions and policies to help secure your tenants... The good part of it is that these products have already been integrated. When you sign on as an admin you have global admin rights and that gives you access to all these features."
"The ability to quickly and easily identify threats on our machines is valuable. The fact that it protects the environment as a whole is also valuable. They have the ability to identify network nodes, and they have Ranger as a component of the solution that allows us to see the whole picture. We can see on what we have SentinelOne and on what we do not."
"I work in vulnerability management, and for me, at the moment, its automation is most valuable. For the SOC team, incident visibility would be most valuable, but for me, it is automation."
"It has the ability to rollback a ransomware infection instantly and with minimal disruption to the user & provides robust reporting."
"The most valuable feature is the machine learning capability, as opposed to the traditional rule-based antivirus."
"The most valuable feature is the ability to drill down into individual sequences of processes."
"Its ability to interact with other third-party tools has been great for us. It can work through APIs and partners and integrate well."
"I have found the most valuable feature to be the rapid threat detection."
"They provide a map, a process tree, and that is pretty good for analysis."
"They have multiple great features."
"At times, when we have an incident email and we click on the link for that incident, it opens a pop-up, but there is nothing. It has happened a couple of times."
"The management and automation of the cloud apps have room for improvement."
"There could be a way to proactively monitor unusual activity ."
"It would be highly beneficial if CoPilot could identify anomalies within the network and notify the IT team."
"The support team is not competent or responsive."
"My client would like the solution to be more customizable without using code. You can only build on the default console, but we're not allowed to change it."
"For some scenarios, it provides good visibility into threats, and for some scenarios, it doesn't. For example, sometimes the URLs within the emails have destinations, and you do get a screenshot and all further details, but it's not always the case. It would be good if they did a better job of enabling that for all the emails that they identified as malicious. When you get an email threat, you can go into the email and see more details, but the URL destination feature doesn't always show you a screenshot of the URL in that email. It also doesn't always give you the characteristics relating to that URL. It would be quite good if the information is complete where it says that we identified this URL, and this is what it looks like. There should be some threat intel about it. It should give you more details."
"When discussing the secure score, which includes overviews and recommended actions, some of these recommended actions are not applicable to us, particularly those related to Microsoft Internet Explorer, which we do not use in any of our environments."
"One area of SentinelOne that definitely has room for improvement is the reporting. The canned reports are clunky and we haven't been able to pull a lot of good information directly from them."
"One thing I don't like is the exportable report. They're they're not as useful as I'd hoped they would be."
"I'd like to see us be able to take action on one platform for items such as security variation, security orchestration, automation, and response (SOAR)."
"I would appreciate seeing the browser extension react more effectively to events, going beyond mere detection."
"The solution does not have an application security and control module."
"In automation, if we could schedule when we run the task and on which systems we want to run the task, it would improve automation."
"Deployment strategy for large organizations that do not use active directory (AD)."
"Security could always be better."
"We end up facing a lot of issues after upgrades."
More SentinelOne Singularity Complete Pricing and Cost Advice →
SentinelOne Singularity Complete is ranked 2nd in Endpoint Protection Platform (EPP) with 177 reviews while Uptycs is ranked 51st in Endpoint Protection Platform (EPP) with 1 review. SentinelOne Singularity Complete is rated 8.8, while Uptycs is rated 8.0. The top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". On the other hand, the top reviewer of Uptycs writes "Great features, good support, and lots of functionality". SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace, ThreatLocker Protect and Datto Endpoint Detection and Response (EDR), whereas Uptycs is most compared with CrowdStrike Falcon, Aqua Cloud Security Platform, Wiz, Orca Security and Lacework.
See our list of best Endpoint Protection Platform (EPP) vendors, best Endpoint Detection and Response (EDR) vendors, and best Extended Detection and Response (XDR) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.