SentinelOne Singularity Identity vs Tenable Vulnerability Management comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between SentinelOne Singularity Identity and Tenable Vulnerability Management based on real PeerSpot user reviews.

Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed SentinelOne Singularity Identity vs. Tenable Vulnerability Management Report (Updated: March 2024).
768,924 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The incident and threat logs are great.""The XDR capabilities are very good.""The threat detection capability is the most valuable feature.""The most valuable feature of SentinelOne Singularity Identity is its ability to detect based on behavior rather than just static signatures.""I like the detection and protection features. We don't need to do anything, and it will alert us when the mitigation is not successful. We only need to target those endpoints. Otherwise, we don't have to do anything about that.""One of the top things we're interested in is cloud protection.""All the features within the XDR are valuable as a whole for our organization.""The protection provided by SentinelOne Singularity Identity is the most valuable feature."

More SentinelOne Singularity Identity Pros →

"The tool has an easy-to-use interface.""It helps us create remediation projects and assign the console’s responsibility to specific engineers.""The product is easy to use.""It is a stable solution. Stability-wise, I rate the solution a ten out of ten.""The best feature of the solution is the amount of visibility it provides of the vulnerabilities.""The solution is very simple to use.""One of the most valuable features of Tenable.io Vulnerability Management is its exportability, which allows us to conduct risk assessments efficiently.""It is very stable, and it is updated periodically by adding new vulnerabilities."

More Tenable Vulnerability Management Pros →

Cons
"SentinelOne Singularity Identity could be more user-friendly.""The solution's query resolution time could be reduced further, and a faster resolution could be provided.""A lot of those features came from an acquisition of a different company.""The resolution turnaround from SentinelOne Singularity Identity's support should be improved.""I don't like SentinelOne's reporting tools. Their reports seem fine theoretically, but the issue is the sample size. For example, it will report that there were four incidents, and that equals 25 percent fewer incidents compared to the previous months. It would be a great improvement if I could expand the range to see reports for the last six months, but it's always one month. That would be an easy thing for them to resolve.""Sometimes I get kicked out of the console. I don't know why.""The primary reason for this discontent is that we frequently encounter performance issues with our servers.""The UI can be more user-friendly."

More SentinelOne Singularity Identity Cons →

"An area of improvement for this solution is being able to customize the dashboard. For example, the dashboard does not allow us to view a previous months vulnerability results alongside current results to make comparisons.""I'm not satisfied with the reporting structure.""The pricing of the solution could be more reasonable.""Tenable could improve visibility into assets, including automated asset tagging. You should be able to automatically tag assets based on location, function, ownership, etc. That would help us because we spend a lot of time identifying and tagging assets by hand.""The product is a bit expensive.""The solution is a bit slow.""The tool's reports are bad. They're not very customizable or flexible. During audits, we often have to exclude things that aren't relevant to our organization, but we can't do that easily with the reports. They come in HTML or PDF format, and we can't compare current results with previous ones in Excel because we never receive reports in Excel.""Tenable.io Vulnerability Management could be improved with an increased number of dashboards and MSSP integration."

More Tenable Vulnerability Management Cons →

Pricing and Cost Advice
  • "The price is affordable."
  • "SentinelOne seemed to offer more while being priced lower than its competitors."
  • "The cost of SentinelOne Singularity Identity is better than CrowdStrike."
  • "The price of SentinelOne Singularity Identity is relatively high, but it offers numerous features and capabilities that make it well worth the investment."
  • "Ideally, I would like SentinelOne to lower their prices a little bit."
  • "The pricing is a bit high."
  • "Its price is a little bit high. It is a nice product, but it comes at a cost. Compared to other products, it is not cheap, but you sometimes have to pay for the value you get. It is not cheap, but it is worth it."
  • "SentinelOne Singularity Identity's pricing is cheaper than CrowdStrike and is really good."
  • More SentinelOne Singularity Identity Pricing and Cost Advice →

  • "There are additional features that can be licensed for an additional cost."
  • "The solution is not too expensive."
  • "Tenable.io Vulnerability Management's pricing solution model isn't great."
  • "The total cost we pay for this solution is over 45K. This is for a large education organization."
  • "Compared to other VM solutions, Tenable.io Vulnerability Management is expensive."
  • "On a scale of one to ten, where one is low, and ten is high price, I rate the pricing an eight. So, it is a pretty expensive solution."
  • "Tenable.io is not known for being a cheap product."
  • "A yearly payment has to be made toward the solution's licensing costs."
  • More Tenable Vulnerability Management Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    768,924 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Yes -- SentinelOne has a Virtual Patching functionality called Virtual Patching and Exploit Shield. This preventive security solution uses behavioral AI to identify and block zero-day attacks and… more »
    Top Answer:If a company is a Microsoft shop, it makes sense to stick with Microsoft tools. It doesn't have mature SIEM capabilities or root cause analysis. It does not have a seamless integrated log management… more »
    Top Answer: Tenable Nessus is a vulnerability assessment solution that is both easy to deploy and easy to manage. The design of the program is such that if a company should desire to handle the installation… more »
    Top Answer:The integration of Tenable into our security ecosystem was very good.
    Top Answer:I'm not satisfied with the reporting structure. We cannot do much customization. We can do it in Tenable.sc. We need to maintain two different solutions. We need the on-premise tool for reporting… more »
    Ranking
    8th
    Views
    214
    Comparisons
    147
    Reviews
    14
    Average Words per Review
    1,156
    Rating
    8.6
    2nd
    Views
    13,395
    Comparisons
    10,776
    Reviews
    26
    Average Words per Review
    463
    Rating
    8.3
    Comparisons
    Also Known As
    Tenable.io
    Learn More
    SentinelOne
    Video Not Available
    Overview

    Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.

    Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.

    Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.

    By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.

    Managed in the cloud and powered by Tenable Nessus, Tenable Vulnerability Management (formerly Tenable.io) provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your organization. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and proactively prioritize remediations.

    Sample Customers
    Information Not Available
    Global Payments AU/NZ
    Top Industries
    REVIEWERS
    Manufacturing Company21%
    Healthcare Company14%
    Financial Services Firm7%
    Venture Capital & Private Equity Firm7%
    VISITORS READING REVIEWS
    Financial Services Firm17%
    Computer Software Company14%
    Government9%
    Manufacturing Company9%
    REVIEWERS
    Security Firm24%
    Government12%
    Manufacturing Company12%
    Financial Services Firm12%
    VISITORS READING REVIEWS
    Educational Organization23%
    Computer Software Company12%
    Government9%
    Financial Services Firm8%
    Company Size
    REVIEWERS
    Small Business21%
    Midsize Enterprise21%
    Large Enterprise57%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise19%
    Large Enterprise59%
    REVIEWERS
    Small Business53%
    Midsize Enterprise3%
    Large Enterprise45%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise32%
    Large Enterprise50%
    Buyer's Guide
    SentinelOne Singularity Identity vs. Tenable Vulnerability Management
    March 2024
    Find out what your peers are saying about SentinelOne Singularity Identity vs. Tenable Vulnerability Management and other solutions. Updated: March 2024.
    768,924 professionals have used our research since 2012.

    SentinelOne Singularity Identity is ranked 8th in Vulnerability Management with 14 reviews while Tenable Vulnerability Management is ranked 2nd in Vulnerability Management with 38 reviews. SentinelOne Singularity Identity is rated 8.6, while Tenable Vulnerability Management is rated 8.2. The top reviewer of SentinelOne Singularity Identity writes "It offers deep and continuous visibility into our attack surface". On the other hand, the top reviewer of Tenable Vulnerability Management writes "Discovers vulnerabilities and integrates well with other solutions". SentinelOne Singularity Identity is most compared with Microsoft Defender for Identity, Qualys VMDR, SailPoint IdentityIQ, Microsoft Defender for Office 365 and Claroty Platform, whereas Tenable Vulnerability Management is most compared with Tenable Security Center, Tenable Nessus, Qualys VMDR, Amazon Inspector and Microsoft Defender Vulnerability Management. See our SentinelOne Singularity Identity vs. Tenable Vulnerability Management report.

    See our list of best Vulnerability Management vendors.

    We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.