Most Helpful Review
Does what a first-level SOC analyst would do, notifying us of, and remediating, issues at that level
Handles the important task of virtual patching, although the agent-based version has performance issues
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
The strength of SentinelOne is that it has an automated, active EDR. It does that first level of what a SOC analyst would do, automatically, using artificial intelligence, so we can focus on other things. Active EDR not only notifies you, but it actually fixes that first level. That is unheard of. Very few, if any, companies do that.
We love the API. We use it to generate robust reporting, and we also developed tools to perform agent actions remotely without needing to provide all IT staff with console access.
It has the ability to rollback a ransomware infection instantly and with minimal disruption to the user & provides robust reporting.
The solution offers very rich details surrounding threats or attacks.
We have a preference for their receptor. It's good at finding many EFC files. EFC files could have a virus.
The most valuable feature of this solution is the user-friendly interface.
All of the features are valuable. The way that it integrates into management with fault correction capabilities over is especially valuable. Any of the full gamut of the features that it provides are useful to us.
I have found the activity timeline and threat analysis to be particularly useful.
The most valuable feature is the virtual patching.
The vulnerability scanning reduces false positives by quite a bit.
The most valuable features are web security, email filtering, and content filtering.
It has improved functions by bringing us complete security on our clients' virtual environment.
It has a perfect SaaS which integrates with AWS, offering flexibility to deploy quickly and easily in the cloud.
Deep Security enables us to bridge the gap between patching windows using the Virtual Patching feature. This allows us to make sure full patching is tested properly in our testing environments before rollout.
It provides a comprehensive feature set and a strong security baseline for us with integrations into other security tools.
There are compliance issues for legacy applications and after applying OS security patches. The product's HIPS (Host Intrusion Prevention System) modules do the job for you automatically, without any downtime.
The area where it could be improved is reporting. They have some online reporting, but it would be nice to be able to pick and choose. When I'm looking at the console, I would love to be able to pull certain things into a report, the things that are specific to me.
It would be nice if the console stored data daily, so that you could look at a timeline of events on a machine over a period of time, and currently this is not possible.
Set up is very labor-intensive.
The solution needs better reporting on new threats and malware. The reporting is present, but I can't find the information easily.
It's fine. It's correcting all the EFC files with a virus. All the achievements, maximum EFC files. Many EFC files will be flagged as a virus. Some virus databases need to be updated. The model is good at finding many EFC files. The trouble is it needs to be updated.
This solution would be more attractive to customers if the price were lower.
In terms of improvement, I would like to see better alerting to let us know if there is anything wrong with SentinelOne working on the endpoint of the computer.
I would like to see something a little more sophisticated than simply being able to mark a false positive as safe or there's usually just one or two options in certain areas and they're a little rudimentary at this stage.
When implementing this solution, sometimes we have challenges with SQL migration.
The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future.
The support for email protection can be improved.
It needs better global visibility of the virtual environment.
I would like them to add EDR features, moving away from traditional signature-based anti-malware.
The default reports provided don't provide much insight.
I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved.
It needs to improve its integration with a lot of other products. This should be in the road map because we have a lot of SaaS-based appliances which are not connected with each other.
Pricing and Cost Advice
The larger count you have, the deeper discount you will receive in your contract.
The per-seat cost is low, but you have to commit to a certain number of licenses for a year.
Some of our customers complain about the cost of this solution.
The cost is approximately six thousand Qatari Riyal ($1650 USD) per user.
Purchasing this solution through the AWS Marketplace was secure and quick. AWS has good prices for a good product.
The training needs improvement. It is expensive (classroom training), and it is often hard to find answers by yourself using the documentation.
The AWS licensing model is scalable and easy to use, but could do with tiered discounts. I am not sure how well this model will scale when we start to use Auto Scaling with AWS resources.
We are an original partner with AWS, so a couple of customers chose to directly take it from AWS Marketplace. A couple of customers will want us to take care of the billing. So, it's a mixed type of reaction that we receive from the customer.
The price is reasonably good as compared to other products into the market.
Purchasing on the AWS Marketplace is like shopping on Amazon Prime.
out of 59 in Endpoint Protection (EPP) for Business
Average Words per Review
out of 6 in Virtualization Security
Average Words per Review
Compared 13% of the time.
Compared 13% of the time.
Compared 10% of the time.
Compared 18% of the time.
Compared 18% of the time.
Compared 9% of the time.
Also Known As
|Sentinel Labs||Deep Security|
SentinelOne delivers autonomous endpoint protection through a single agent that successfully prevents, detects, responds, and hunts attacks across all major vectors. Designed for extreme ease of use, the S1 platform saves customers time by applying AI to automatically eliminate threats in real-time for both on-premise and cloud environments and is the only solution to provide full visibility across networks directly from the endpoint. To learn more visit www.sentinelone.com or follow us at @SentinelOne, on LinkedIn or Facebook.
The Trend Micro Cloud and Data Center Security solution protects applications and data and prevents business disruptions, while helping meet regulatory compliance. Whether you are focused on securing physical virtual, cloud, or hybrid environments, Trend Micro provides the advanced server security you need with the Trend Micro™ Deep Security™ platform.
Learn more about SentinelOne
Learn more about Trend Micro Deep Security
|Havas, Flex, Estee Lauder, McKesson, Norfolk Southern, JetBlue, Norwegian airlines, TGI Friday, AVX, Fim Bank||Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada|
Software R&D Company26%
Comms Service Provider11%
Financial Services Firm33%
Software R&D Company36%
Comms Service Provider13%
See also SentinelOne Reviews, Trend Micro Deep Security Reviews, and our list of Best Endpoint Protection (EPP) for Business Companies.