We compared SentinelOne Singularity Complete and ThreatLocker Protect based on our user's reviews in several parameters.
Based on user reviews, SentinelOne Singularity Complete and ThreatLocker Protect both have strengths in advanced threat detection and customer support. However, while SentinelOne's focus is on comprehensive protection and ease of use, ThreatLocker excels in providing granular control and visibility over file activities. SentinelOne users appreciate the platform's AI technology and user-friendly interface, while ThreatLocker users value its seamless integration with existing systems and effectiveness in preventing unauthorized access. Overall, both products have received positive feedback from users, with SentinelOne standing out for its proactive security measures and ThreatLocker for its granular control features.
Features: SentinelOne Singularity Complete stands out with its comprehensive threat detection, advanced AI, intuitive interface, and swift response to emerging threats. In contrast, ThreatLocker Protect offers advanced threat detection, seamless integration, ease of use, reliable blocking, granular control, and visibility over file activities.
Pricing and ROI: SentinelOne Singularity Complete and ThreatLocker Protect differ in terms of setup cost. Users have expressed their perspectives on the pricing, setup cost, and licensing of both products. While customers have shared insights about the cost-effectiveness and ease of setting up ThreatLocker Protect, opinions on the setup cost of SentinelOne Singularity Complete are also available., The ROI for SentinelOne Singularity Complete is driven by its comprehensive protection, real-time threat detection, and proactive security measures, while ThreatLocker Protect offers significant value and returns by enhancing security, preventing threats, and minimizing potential damages.
Room for Improvement: Users have provided feedback on SentinelOne Singularity Complete that highlights the need for improvements in system performance, user interface, customization options, reporting capabilities, and integration with other security solutions. On the other hand, for ThreatLocker Protect, user feedback specifically focuses on identifying the product's drawbacks.
Deployment and customer support: The user reviews for SentinelOne Singularity Complete indicate that the timeframe for deployment and setup are generally the same and should be considered together. However, the user reviews for ThreatLocker Protect highlight the variability in the time required for deployment, setup, and implementation phases., Customer service for SentinelOne Singularity Complete has been positively praised for its prompt and helpful assistance, as well as reliable and efficient support staff. On the other hand, ThreatLocker Protect's customer service also receives high praise for its prompt and helpful assistance, knowledgeable and efficient support team, and commitment to customer satisfaction.
The summary above is based on 148 interviews we conducted recently with SentinelOne Singularity Complete and ThreatLocker Protect users. To access the review's full transcripts, download our report.
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"The setup is pretty simple."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"The solution was relatively easy to deploy."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"The most valuable feature of SentinelOne is the good graph it provides. It has a specific page where it detects the recent attacks on other machines or the hackers, for example, group APT28 and all."
"I have found the most valuable feature to be the rapid threat detection."
"Our clients have been able to survive a ransomware attack without even knowing that they had had files encrypted and automatically rolled back - even their Point of Sale (POS) system did not miss a beat and the business continued as normal without interruption."
"The most valuable feature varies from client to client but having absolute clarity of what happened and the autonomous actions of SentinelOne are what most people find the most assuring."
"The best thing is it has a secure shell command that you can use to get into any endpoint and do some jobs."
"Our impressions of the solution's ability to ingest and correlate across our security solutions is perfect."
"SentinelOne has improved the overall security posture of the firm without creating a lot of hassle for our end users. Everything is a bit more secure. We think Singularity Complete has helped us reduce our organizational risks."
"The most valuble feature of SentinelOne Singularity Complete is the recovery and zero-day detection."
"The sandbox functionality is fantastic."
"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
"Every single feature has been invaluable."
"The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself."
"While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist."
"The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"ZTNA can improve latency."
"We find the solution to be a bit expensive."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"I haven't seen the use of AI in the solution."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"The ability to have more direct purchasing for smaller groups and smaller businesses would be great."
"I would like to have a remote desktop feature added so we can remotely access our endpoints."
"Singularity Complete needs to improve its ability to granularly select and extract the executable files that I want to run."
"The ease of use can be better in Deep Visibility. It is not always the easiest. If I have not been in there in the Deep Visibility module for a long time, I do not always find it that easy to use. I tend to go and have to consult the help quite often if I have not been in there a long time."
"The only concern we have is that there are a few features that were not readily available."
"It primarily operates on local machines, monitoring processes, and not always providing detailed insights, relying on external information to determine the nature of a file."
"The false positive rate has room for improvement."
"We have had cases where Singularity Complete has caused applications to malfunction."
"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats."
"More visibility in the built-ins would be nice."
"From a reporting perspective, enhancing the ability to customize reports would be beneficial."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"There are some times when applications get submitted, the hashes don't really line up."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"ThreatLocker Allowlisting needs to improve its user interface and overall workflow."
More SentinelOne Singularity Complete Pricing and Cost Advice →
SentinelOne Singularity Complete is ranked 2nd in Endpoint Protection Platform (EPP) with 177 reviews while ThreatLocker Protect is ranked 26th in Endpoint Protection Platform (EPP) with 13 reviews. SentinelOne Singularity Complete is rated 8.8, while ThreatLocker Protect is rated 9.2. The top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". On the other hand, the top reviewer of ThreatLocker Protect writes "Integration is simple, deployment is straightforward, and extensive well-written documentation is available online". SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace, Datto Endpoint Detection and Response (EDR) and Wazuh, whereas ThreatLocker Protect is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Huntress, GravityZone Business Security and Fortinet FortiClient. See our SentinelOne Singularity Complete vs. ThreatLocker Protect report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.