We performed a comparison between Elastic Security and SentinelOne Singularity Complete based on real PeerSpot user reviews.
Find out in this report how the two Extended Detection and Response (XDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I like 365 Defender's advanced threat hunting. The dashboard is user-friendly with templates for site policies, etc. The most important use case is evaluating the risk links and applications."
"The EDR and the way it automatically responds to ransomware and other attacks are valuable features."
"Advanced hunting is good. I like that. We can drill down to lots of details."
"Many people don't realize that Microsoft Azure, Exchange Online, and the security and compliance portal all sync together. For instance, within the Azure portal you can set security restrictions and policies to help secure your tenants... The good part of it is that these products have already been integrated. When you sign on as an admin you have global admin rights and that gives you access to all these features."
"The unified view of the threat landscape on a central dashboard is the most valuable feature."
"The product is very easy to use."
"Microsoft XDR's system of analysis and investigation is super convenient for our customers. It integrates with other Microsoft solutions like Defender for 365 to protect email traffic from malicious external web links and phishing."
"It has great stability."
"The solution is quite stable. The performance has been good."
"Stability-wise, I rate the solution a ten out of ten."
"The scalability is good. It can be scaled easily in the production environment."
"The cost is reasonable. It's not overly pricey."
"The most valuable feature for me is Discover."
"The most valuable feature is the scalability. We are in Indonesia, more engineers understand Elastic Security here. So it is easier to scale and also develop. In features, the discovery to query all the logs is very important to us. It is very easy, especially with the query function and the feature to generate alerts and create tools. Sometimes we use the alert security dashboard to monitor our clients."
"The most valuable features are the speed, detail, and visualization. It has the latest standards."
"The solution has a good community surrounding it for lots of helpful documentation for troubleshooting purposes."
"The GUI is really easy to use."
"SentinelOne gives us visibility into various high-level vulnerabilities on every gateway on the network. It helps us prevent vulnerable devices from being compromised. We primarily use Singularity for its EDR functions. We're happy with that."
"What I like best about SentinelOne Singularity Complete is its web-based admin interface, which allows me to go into the platform, look at the entire organization, particularly all of the sentinels or endpoints, and manage everything from there."
"The threat detection and prevention capabilities are valuable, providing development programming support that enables us to perform fair investigations."
"The most valuable feature of SentinelOne is the good graph it provides. It has a specific page where it detects the recent attacks on other machines or the hackers, for example, group APT28 and all."
"SentinelOne’s Rollback is its best feature."
"For me, the most valuable feature is the Deep Visibility. It gives you the ability to search all actions that were taken on a specific machine, like writing register keys, executing software, opening, reading, and writing files. All that stuff is available from the SentinelOne console. I'm able to see which software is permanent on a machine, and how that happened, whether by registry keys or writing it to a special folder on the machine."
"The single pane of glass is probably the most valuable. That is a big one. We could see everything from one view."
"The support team is not competent or responsive."
"There could be a way to proactively monitor unusual activity ."
"Generally, antivirus products provide a central control to manage every device in terms of who is installing it or who is trying to disable it, but Microsoft doesn't have such a control center for the antivirus product it provides."
"The dashboard should be easier to use. There is also improvement needed in the reporting when it comes to exporting or scheduling reports."
"I personally have not seen much evidence of how Defender can enhance the story of zero trust for enterprises."
"There is no common area where we can manage all the policies for the EDR, third-party solutions, devices, servers, Windows, Mac, etc., but it's on the road map, and we ware waiting for that feature."
"Microsoft tends to provide too many features, which makes the solution prone to bugs."
"The design of the user interface could use some work. Sometimes it's hard to find the exact information you need."
"Elastic has one problem. In the past, Elastic Security was free. Now, they currently only offer the basic license or a certain period of time."
"Elastic Security can be a bit difficult to use if a person only has experience in SMBs with tools like Zoho. The product can also be difficult for those who have never dealt with query language."
"In terms of what could be improved with Elastic, in some use cases, especially on the advanced level, they are not ready made, so you'll have to write some scripts."
"It's a little bit of a learning curve to understand the logic of searching for things and trying to find what you're looking for in Elastic Security."
"There isn't really a very good user experience. You need a lot of training."
"They don't provide user authentication and authorisation features (Shield) as a part of their open-source version."
"The price of this product could be improved, especially the additional costs. I would also like to see better-quality graphics."
"If you compare this with CrowdStrike or Carbon Black, they can improve."
"Native integration with the mobile console is an area that can be improved."
"One thing I don't like is the exportable report. They're they're not as useful as I'd hoped they would be."
"I would like to have the same features such as ransomware that are available on the cloud version of SentinelOne also made available for the on-prem version because a lot of people in our region are not ready for cloud solutions."
"The MDM functionality and maturity still need improvement."
"The ability to have more direct purchasing for smaller groups and smaller businesses would be great."
"We often experience interruptions to our investigations in SentinelOne Singularity Complete."
"SentinelOne's performance and the accuracy of its incident filtering could be improved."
"It primarily operates on local machines, monitoring processes, and not always providing detailed insights, relying on external information to determine the nature of a file."
More SentinelOne Singularity Complete Pricing and Cost Advice →
Elastic Security is ranked 7th in Extended Detection and Response (XDR) with 58 reviews while SentinelOne Singularity Complete is ranked 1st in Extended Detection and Response (XDR) with 176 reviews. Elastic Security is rated 7.6, while SentinelOne Singularity Complete is rated 8.8. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and syslog-ng, whereas SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace, ThreatLocker Protect and Datto Endpoint Detection and Response (EDR). See our Elastic Security vs. SentinelOne Singularity Complete report.
See our list of best Extended Detection and Response (XDR) vendors and best Endpoint Detection and Response (EDR) vendors.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.