Claroty Platform vs SentinelOne Singularity Identity comparison

Cancel
You must select at least 2 products to compare!
Claroty Logo
91 views|97 comparisons
100% willing to recommend
SentinelOne Logo
214 views|147 comparisons
92% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Claroty Platform and SentinelOne Singularity Identity based on real PeerSpot user reviews.

Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management.
To learn more, read our detailed Vulnerability Management Report (Updated: March 2024).
768,924 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The product helps mitigate potential threats, especially if its users have signature rules. The product also provides alerts."

More Claroty Platform Pros →

"The most valuable feature of SentinelOne Singularity Identity is its ability to detect based on behavior rather than just static signatures.""The incident and threat logs are great.""The biggest value for us is getting a much better picture of what our risks are.""Having high visibility into all of our network concerns and a customizable UI are the most valuable features.""I like the detection and protection features. We don't need to do anything, and it will alert us when the mitigation is not successful. We only need to target those endpoints. Otherwise, we don't have to do anything about that.""One of the top things we're interested in is cloud protection.""The XDR capabilities are very good.""All the features within the XDR are valuable as a whole for our organization."

More SentinelOne Singularity Identity Pros →

Cons
"The product's integration capabilities are an area of concern where improvements are required."

More Claroty Platform Cons →

"SentinelOne Singularity Identity could be more user-friendly.""Sometimes I get kicked out of the console. I don't know why.""The policies could be more precise, and Singularity should use more templates like alternative solutions have. Endpoint management is poor. We cannot manage individual endpoints and must rely on policies, exclusions, or block lists to apply settings to a group instead of the individual agent. If I have to make settings for one computer, I need to create a group, apply the configuration, and move the agent there. It's challenging to manage endpoints that way.""I don't like SentinelOne's reporting tools. Their reports seem fine theoretically, but the issue is the sample size. For example, it will report that there were four incidents, and that equals 25 percent fewer incidents compared to the previous months. It would be a great improvement if I could expand the range to see reports for the last six months, but it's always one month. That would be an easy thing for them to resolve.""The solution's query resolution time could be reduced further, and a faster resolution could be provided.""A lot of those features came from an acquisition of a different company.""The UI can be more user-friendly.""We haven't received the expected support whenever we've had questions."

More SentinelOne Singularity Identity Cons →

Pricing and Cost Advice
Information Not Available
  • "The price is affordable."
  • "SentinelOne seemed to offer more while being priced lower than its competitors."
  • "The cost of SentinelOne Singularity Identity is better than CrowdStrike."
  • "The price of SentinelOne Singularity Identity is relatively high, but it offers numerous features and capabilities that make it well worth the investment."
  • "Ideally, I would like SentinelOne to lower their prices a little bit."
  • "The pricing is a bit high."
  • "Its price is a little bit high. It is a nice product, but it comes at a cost. Compared to other products, it is not cheap, but you sometimes have to pay for the value you get. It is not cheap, but it is worth it."
  • "SentinelOne Singularity Identity's pricing is cheaper than CrowdStrike and is really good."
  • More SentinelOne Singularity Identity Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    768,924 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Nozomi Networks and Claroty Platform are both leading operational technology (OT) security solutions offering a wide range of features, including asset discovery, risk assessment, and threat… more »
    Top Answer:The product helps mitigate potential threats, especially if its users have signature rules. The product also provides alerts.
    Top Answer:The product fulfills our company's needs. Currently, Claroty Platform focuses on industrial control systems and OT. If Claroty Platform expands to the IT network side, it will benefit Claroty and… more »
    Top Answer:Yes -- SentinelOne has a Virtual Patching functionality called Virtual Patching and Exploit Shield. This preventive security solution uses behavioral AI to identify and block zero-day attacks and… more »
    Top Answer:If a company is a Microsoft shop, it makes sense to stick with Microsoft tools. It doesn't have mature SIEM capabilities or root cause analysis. It does not have a seamless integrated log management… more »
    Ranking
    29th
    Views
    91
    Comparisons
    97
    Reviews
    1
    Average Words per Review
    816
    Rating
    8.0
    8th
    Views
    214
    Comparisons
    147
    Reviews
    14
    Average Words per Review
    1,156
    Rating
    8.6
    Comparisons
    Learn More
    SentinelOne
    Video Not Available
    Overview

    Claroty Secure Remote Access minimizes the risks remote users, including employees and 3rd parties, introduce to OT networks. It provides a single, manageable interface that all external users connect through, prior to performing software upgrades, periodic maintenance, and other support activities on assets within industrial control system networks.

    Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.

    Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.

    Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.

    By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.

    Sample Customers
    Rockwell Automation
    Information Not Available
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company14%
    Manufacturing Company13%
    Energy/Utilities Company12%
    Financial Services Firm5%
    REVIEWERS
    Manufacturing Company21%
    Healthcare Company14%
    Retailer7%
    Logistics Company7%
    VISITORS READING REVIEWS
    Financial Services Firm17%
    Computer Software Company14%
    Government9%
    Manufacturing Company9%
    Company Size
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise12%
    Large Enterprise68%
    REVIEWERS
    Small Business21%
    Midsize Enterprise21%
    Large Enterprise57%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise19%
    Large Enterprise59%
    Buyer's Guide
    Vulnerability Management
    March 2024
    Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management. Updated: March 2024.
    768,924 professionals have used our research since 2012.

    Claroty Platform is ranked 29th in Vulnerability Management with 1 review while SentinelOne Singularity Identity is ranked 8th in Vulnerability Management with 14 reviews. Claroty Platform is rated 8.0, while SentinelOne Singularity Identity is rated 8.6. The top reviewer of Claroty Platform writes "Provides good visibility of the devices in a user's environment". On the other hand, the top reviewer of SentinelOne Singularity Identity writes "It offers deep and continuous visibility into our attack surface". Claroty Platform is most compared with Nozomi Networks, Tenable OT Security, Dragos, Darktrace and Armis, whereas SentinelOne Singularity Identity is most compared with Microsoft Defender for Identity, Qualys VMDR, SailPoint IdentityIQ, Tenable Vulnerability Management and XM Cyber.

    See our list of best Vulnerability Management vendors.

    We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.