Qualys VMDR vs SentinelOne Singularity Identity comparison

Cancel
You must select at least 2 products to compare!
Qualys Logo
6,806 views|5,195 comparisons
93% willing to recommend
SentinelOne Logo
220 views|154 comparisons
92% willing to recommend
Comparison Buyer's Guide
Executive Summary
Updated on Sep 20, 2023

We compared Qualys VMDR and SentinelOne Singularity Identity based on our users reviews in six parameters. After reading the collected data, you can find our conclusion below:

  • Ease of Deployment

    The setup process for Qualys VMDR was reported to be quick and simple, with users stating that it took approximately 5 to 10 minutes. However, there were some difficulties related to integration and data privacy. In contrast, the setup for SentinelOne Singularity Identity presented challenges, including problems with agent deployment and infrastructure structuring. Additionally, some users encountered difficulties in finding a suitable vendor. Nevertheless, there were positive experiences with the setup, particularly when deploying to servers initially.

  • Features

    Qualys VMDR is highly appreciated for its effective prioritization system, ongoing monitoring, adaptable dashboard, and extensive vulnerability overview. On the other hand, SentinelOne Singularity Identity receives praise for its exceptional detection and protection capabilities, AI-driven detection, and extensive visibility.

  • Pricing

    The cost of setting up Qualys VMDR can be expensive, particularly for smaller customers. On the other hand, some users find SentinelOne Singularity Identity to be relatively costly. However, SentinelOne provides additional features at a more affordable price, making it a more attractive choice. The opinions on pricing and licensing for both products are varied.

  • ROI

    Qualys VMDR is effective in identifying vulnerabilities and minimizing risks, leading to a favorable return on investment. On the other hand, SentinelOne Singularity Identity offers exceptional protection and assurance, resulting in a positive ROI.

  • Service and Support

    The customer service for Qualys VMDR has received both positive and negative feedback. Some customers appreciate the accessibility and helpfulness of the global team, while others feel that response times could be improved and support personnel could be more skilled. On the other hand, the customer service for SentinelOne Singularity Identity has been praised by customers. They rate it as good and responsive, although there is room for improvement in the first-level support. Higher levels of support have been described as great, ultimately leading to a satisfactory outcome for customers.

Comparison Results

Based on the reviews, Qualys VMDR is praised for its easy setup process and effective prioritization mechanism and technical support. However, it is suggested that improvements are needed in user experience, integration, and pricing. On the other hand, SentinelOne Singularity Identity is valued for its detection and protection features and strong support, despite facing challenges during the initial setup. Opinions on pricing and licensing are mixed, but it is considered to offer superior protection. In summary, Qualys VMDR focuses more on vulnerability management, while SentinelOne Singularity Identity places emphasis on detection and protection.

To learn more, read our detailed Risk-Based Vulnerability Management Report (Updated: April 2024).
770,141 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Detects new hosts along with vulnerabilities.""The reporting functionality is great.""The Vulnerability Management and Patch Management features are the most valuable features of this solution.""It is quite easy to implement.""The features that are most valuable are the identification, scan features, and the identification of vulnerabilities.""This is one of the best products I have worked with so far. I like the power of Qualys, and it's a better solution because you can scan a compact file, a BIT file, or batch files. The product already knows what's happening inside, and you don't need to expand the package. Tenable will do the same thing, but you need to have a package issuance claim. With Qualys, we can immediately understand the file, even a compact file. If there's some kind of discovery or incident, you will know what happened in the environment.""The most valuable features are vulnerability detection and the scanning capability to enable identification of vulnerabilities across our network.""Qualys VM's best features are vulnerability management and customizable scoring."

More Qualys VMDR Pros →

"Having high visibility into all of our network concerns and a customizable UI are the most valuable features.""The AI-based detection, scanning, prevention and mitigation features are the most valuable features.""Behind the scenes, SentinelOne has real people who evaluate problems and mark them as false positives. That's what I find most helpful.""The XDR capabilities are very good.""The protection provided by SentinelOne Singularity Identity is the most valuable feature.""SentinelOne Singularity Identity is very lightweight as an agent or software.""The threat detection capability is the most valuable feature.""The most valuable feature of SentinelOne Singularity Identity is its ability to detect based on behavior rather than just static signatures."

More SentinelOne Singularity Identity Pros →

Cons
"The reporting and the GUI need improvements.""Sometimes we face a problem with accessing the tool and not getting an expected result. From a technology point of view, they need to look into this.""I would like to see this solution simplified to work more easily in a multi-cloud environment.""Qualys does have an on-prem solution, but it is very expensive.""Sometimes the scanning can get overwhelmed and start to drag when a lot of users are trying to scan at once.""Qualys currently does not have any features for scanning SCADA, IoT, and Industrial Control Systems.""There seems to be a lack of easy onboarding into Qualys.""Qualys VM's vulnerability scan could be improved, especially the number of CVE numbers it can manage at a time."

More Qualys VMDR Cons →

"SentinelOne Singularity Identity could be more user-friendly.""The resolution turnaround from SentinelOne Singularity Identity's support should be improved.""A lot of those features came from an acquisition of a different company.""Our engineers are dealing with issues to add exclusions to the antivirus for custom applications.""We haven't received the expected support whenever we've had questions.""The root cause of automation could be better.""The primary reason for this discontent is that we frequently encounter performance issues with our servers.""Our company has different locations, such as Sunbury, Oklahoma, and Alabama. I have my devices by location, and I have not found a way to choose all the endpoints and then push the update automatically. I have been doing it one by one."

More SentinelOne Singularity Identity Cons →

Pricing and Cost Advice
  • "Usually every implementation is different and the quote is in function of number of assets."
  • "When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself."
  • "It is more expensive than other products on the market."
  • "They have recently changed the pricing model, which is now better than it was before."
  • "It is different for every company, but for us, it's every three years."
  • "Qualys is cheaper and more affordable than other solutions."
  • "The pricing and licensing for Qualys could be improved."
  • "The license is on a yearly basis."
  • More Qualys VMDR Pricing and Cost Advice →

  • "The price is affordable."
  • "SentinelOne seemed to offer more while being priced lower than its competitors."
  • "The cost of SentinelOne Singularity Identity is better than CrowdStrike."
  • "The price of SentinelOne Singularity Identity is relatively high, but it offers numerous features and capabilities that make it well worth the investment."
  • "Ideally, I would like SentinelOne to lower their prices a little bit."
  • "The pricing is a bit high."
  • "Its price is a little bit high. It is a nice product, but it comes at a cost. Compared to other products, it is not cheap, but you sometimes have to pay for the value you get. It is not cheap, but it is worth it."
  • "SentinelOne Singularity Identity's pricing is cheaper than CrowdStrike and is really good."
  • More SentinelOne Singularity Identity Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Risk-Based Vulnerability Management solutions are best for your needs.
    770,141 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Qualys VM is used for vulnerability scans for the internet and applications using application exchange. There are many applications. We also use the solution for asset management per team, and the… more »
    Top Answer:The process of defining and discovering scans is organized efficiently.
    Top Answer:The product is more expensive than that of any other vendor.
    Top Answer:Yes -- SentinelOne has a Virtual Patching functionality called Virtual Patching and Exploit Shield. This preventive security solution uses behavioral AI to identify and block zero-day attacks and… more »
    Top Answer:If a company is a Microsoft shop, it makes sense to stick with Microsoft tools. It doesn't have mature SIEM capabilities or root cause analysis. It does not have a seamless integrated log management… more »
    Ranking
    Views
    6,806
    Comparisons
    5,195
    Reviews
    27
    Average Words per Review
    426
    Rating
    8.0
    9th
    Views
    220
    Comparisons
    154
    Reviews
    14
    Average Words per Review
    1,156
    Rating
    8.6
    Comparisons
    Also Known As
    Qualys VM, QualysGuard VM, Qualys Asset Inventory, Qualys Container Security, Qualys Virtual Scanner Appliance
    Learn More
    SentinelOne
    Video Not Available
    Overview

    Vulnerability Management, Detection, and Response (VMDR) is a cornerstone product of the Qualys TruRisk Platform and a global leader in the enterprise-grade vulnerability management (VM) vendor space. With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure their actual risk exposure over time. 

    Qualys VMDR offers an all-inclusive risk-based vulnerability management solution to prioritize vulnerabilities and assets based on risk and business criticality. VMDR seamlessly integrates with configuration management databases (CMDB), Qualys Patch Management, Custom Assessment and Remediation (CAR), Qualys TotalCloud and other Qualys and non-Qualys solutions to facilitate vulnerability detection and remediation across the entire enterprise.

    With VMDR, users are empowered with actionable risk insights that translate vulnerabilities and exploits into optimized remediation actions based on business impact. Qualys customers can now aggregate and orchestrate data from the Qualys Threat Library, 25+ threat intelligence feeds, and third-party security and IT solutions, empowering organizations to measure, communicate, and eliminate risk across on-premises, hybrid, and cloud environments.

    Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.

    Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.

    Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.

    By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.

    Sample Customers
    Agrokor Group, American Specialty Health, American State Bank, Arval, Life:), Axway, Bank of the West, Blueport Commerce, BSkyB, Brinks, CaixaBank, Cartagena, Catholic Health System, CEC Bank, Cegedim, CIGNA, Clickability, Colby-Sawyer College, Commercial Bank of Dubai, University of Utah, eBay Inc., ING Singapore, National Theatre, OTP Bank, Sodexo, WebEx
    Information Not Available
    Top Industries
    REVIEWERS
    Financial Services Firm17%
    Comms Service Provider15%
    Manufacturing Company15%
    Transportation Company11%
    VISITORS READING REVIEWS
    Educational Organization32%
    Computer Software Company11%
    Financial Services Firm11%
    Manufacturing Company6%
    REVIEWERS
    Manufacturing Company21%
    Healthcare Company14%
    Retailer7%
    Logistics Company7%
    VISITORS READING REVIEWS
    Financial Services Firm16%
    Computer Software Company14%
    Manufacturing Company10%
    Government8%
    Company Size
    REVIEWERS
    Small Business19%
    Midsize Enterprise12%
    Large Enterprise69%
    VISITORS READING REVIEWS
    Small Business15%
    Midsize Enterprise41%
    Large Enterprise44%
    REVIEWERS
    Small Business20%
    Midsize Enterprise27%
    Large Enterprise53%
    VISITORS READING REVIEWS
    Small Business23%
    Midsize Enterprise19%
    Large Enterprise58%
    Buyer's Guide
    Risk-Based Vulnerability Management
    April 2024
    Find out what your peers are saying about Tenable, Qualys, Rapid7 and others in Risk-Based Vulnerability Management. Updated: April 2024.
    770,141 professionals have used our research since 2012.

    Qualys VMDR is ranked 3rd in Risk-Based Vulnerability Management with 77 reviews while SentinelOne Singularity Identity is ranked 9th in Vulnerability Management with 14 reviews. Qualys VMDR is rated 8.2, while SentinelOne Singularity Identity is rated 8.6. The top reviewer of Qualys VMDR writes "Good visibility but expensive and needs better support". On the other hand, the top reviewer of SentinelOne Singularity Identity writes "It offers deep and continuous visibility into our attack surface". Qualys VMDR is most compared with Tenable Nessus, Tenable Security Center, Rapid7 InsightVM, Microsoft Defender Vulnerability Management and Tenable Vulnerability Management, whereas SentinelOne Singularity Identity is most compared with Microsoft Defender for Identity, Tenable Vulnerability Management, SailPoint IdentityIQ, Microsoft Defender for Office 365 and Claroty Platform.

    We monitor all Risk-Based Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.