Best Software for 2025 is now live!

Compare SentinelOne Singularity and Tenable Vulnerability Management

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
SentinelOne Singularity
SentinelOne Singularity
Star Rating
(183)4.7 out of 5
Market Segments
Mid-Market (43.5% of reviews)
Information
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 3 pricing plans
Tenable Vulnerability Management
Tenable Vulnerability Management
Star Rating
(110)4.5 out of 5
Market Segments
Enterprise (57.0% of reviews)
Information
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Tenable Vulnerability Management
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that SentinelOne Singularity excels in Real-Time Detection with a score of 9.8, indicating its effectiveness in identifying threats as they occur, while Tenable Vulnerability Management scores slightly lower at 9.0 in Detection Rate, suggesting it may not be as responsive in real-time scenarios.
  • Reviewers mention that SentinelOne's Automated Remediation feature scores an impressive 9.5, allowing for quick responses to detected vulnerabilities, whereas Tenable's similar feature scores lower at 7.9, indicating a potential delay in remediation processes.
  • G2 users highlight that SentinelOne's Quality of Support is rated at 9.0, showcasing strong customer service, while Tenable's support is rated at 7.9, suggesting that users may experience challenges in getting timely assistance.
  • Users on G2 report that SentinelOne's Application Control feature is highly rated at 9.4, providing robust management of applications, compared to Tenable's score of 8.6, which may indicate less comprehensive application oversight.
  • Reviewers mention that SentinelOne's Threat Hunting capabilities are rated at 9.3, reflecting a proactive approach to identifying potential threats, while Tenable's score of 8.5 suggests it may not be as effective in this area.
  • Users say that SentinelOne's Integration capabilities score a remarkable 9.7, allowing seamless connectivity with other tools, whereas Tenable's integration features score lower at 8.5, which could limit its interoperability with existing systems.
Featured Products
Pricing
Entry-Level Pricing
SentinelOne Singularity
Singularity Core
Contact Us
Browse all 3 pricing plans
Tenable Vulnerability Management
No pricing available
Free Trial
SentinelOne Singularity
Free Trial is available
Tenable Vulnerability Management
Free Trial is available
Ratings
Meets Requirements
9.3
155
8.8
71
Ease of Use
9.0
152
8.9
73
Ease of Setup
8.9
126
8.7
57
Ease of Admin
9.0
130
8.7
56
Quality of Support
9.0
149
7.9
70
Has the product been a good partner in doing business?
9.3
127
8.5
56
Product Direction (% positive)
9.8
150
8.7
74
Features by Category
7.9
227
8.4
302
Performance
9.0
25
8.4
40
|
Verified
9.3
25
9.0
42
|
Verified
7.5
25
7.1
42
|
Verified
8.7
25
9.2
42
|
Verified
Network
8.0
23
8.6
38
|
Verified
8.0
23
8.7
37
7.5
23
8.8
34
|
Verified
Application
7.2
20
Feature Not Available
6.8
20
7.7
27
6.9
18
Feature Not Available
Cloud Infrastructure MonitoringHide 10 FeaturesShow 10 Features
Not enough data
8.4
92
Monitoring
Not enough data
8.9
9
Not enough data
8.5
9
Not enough data
7.5
8
Not enough data
8.9
9
Administration
Not enough data
9.1
9
Not enough data
9.0
7
Not enough data
8.3
10
Analysis
Not enough data
7.7
11
Not enough data
8.2
11
Not enough data
8.0
9
Endpoint Protection SuitesHide 12 FeaturesShow 12 Features
9.4
259
Not enough data
Administration
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.5
26
Not enough data
9.4
26
Not enough data
Functionality
9.6
28
Not enough data
9.1
27
Not enough data
9.6
29
Not enough data
9.6
29
Not enough data
Analysis
9.5
31
Not enough data
9.3
31
Not enough data
9.6
32
Not enough data
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
Not enough data
8.5
491
Risk Analysis
Not enough data
8.8
48
Not enough data
8.3
49
Not enough data
8.8
48
Vulnerability Assesment
Not enough data
9.3
49
Not enough data
9.1
47
Not enough data
8.6
44
Not enough data
8.3
47
Automation
Not enough data
7.9
39
Not enough data
8.1
37
Not enough data
8.2
41
Not enough data
8.2
42
Extended Detection and Response (XDR) PlatformsHide 10 FeaturesShow 10 Features
9.4
291
Not enough data
Detection & Response
9.3
41
Not enough data
9.3
41
Not enough data
9.1
39
Not enough data
9.8
40
Not enough data
Management
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Analytics
9.3
44
Not enough data
9.3
43
Not enough data
9.4
43
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
9.3
82
Not enough data
Monitoring
9.6
12
Not enough data
9.3
12
Not enough data
8.8
10
Not enough data
9.7
12
Not enough data
9.2
12
Not enough data
Remediation
9.2
12
Not enough data
9.3
12
Not enough data
Not enough data
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Generative AI
Feature Not Available
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Deception TechnologyHide 4 FeaturesShow 4 Features
9.0
26
Not enough data
Incident Management
8.9
9
Not enough data
9.1
9
Not enough data
9.0
8
Not enough data
Generative AI
Feature Not Available
Not enough data
ServiceNow Store AppsHide 2 FeaturesShow 2 Features
Not enough data
8.3
14
ServiceNow Apps
Not enough data
8.3
7
Not enough data
8.3
7
Categories
Categories
Shared Categories
SentinelOne Singularity
SentinelOne Singularity
Tenable Vulnerability Management
Tenable Vulnerability Management
SentinelOne Singularity and Tenable Vulnerability Management are categorized as Vulnerability Scanner
Reviews
Reviewers' Company Size
SentinelOne Singularity
SentinelOne Singularity
Small-Business(50 or fewer emp.)
18.1%
Mid-Market(51-1000 emp.)
43.5%
Enterprise(> 1000 emp.)
38.4%
Tenable Vulnerability Management
Tenable Vulnerability Management
Small-Business(50 or fewer emp.)
10.0%
Mid-Market(51-1000 emp.)
33.0%
Enterprise(> 1000 emp.)
57.0%
Reviewers' Industry
SentinelOne Singularity
SentinelOne Singularity
Information Technology and Services
12.4%
Computer & Network Security
7.9%
Hospital & Health Care
6.2%
Financial Services
5.1%
Government Administration
4.5%
Other
63.8%
Tenable Vulnerability Management
Tenable Vulnerability Management
Information Technology and Services
14.0%
Financial Services
13.0%
Computer & Network Security
9.0%
Banking
7.0%
Computer Software
6.0%
Other
51.0%
Most Helpful Reviews
SentinelOne Singularity
SentinelOne Singularity
Most Helpful Favorable Review
Patrick M.
PM
Patrick M.
Verified User in Food & Beverages

From monitoring to deployment and most importantly mitigating threats, this endpoint has gone above and beyond and allows our business heads to sleep at night. We couldn't be more happy with our decision to move (as an office) from Norton to SentinelOne.

Most Helpful Critical Review
AD
Andrew D.
Verified User in Computer & Network Security

When we first implemented SentinelOne, there was a faux malware attack spreading through out our network. Thanks to their great support, we resolved it to being an old AV software fighting sentinel one. However in that time we got Thousands of email...

Tenable Vulnerability Management
Tenable Vulnerability Management
Most Helpful Favorable Review
Verified User
G
Verified User in Computer Software

The speed at which the platform incorporates new vulnerabilities is critical to it being the leading product.

Most Helpful Critical Review
BC
Ben C.
Verified User in Information Technology and Services

The reporting capability is really poor and the new interface they released is incredibly lacking functionality that makes you continue going back to the classic interface.

Alternatives
SentinelOne Singularity
SentinelOne Singularity Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Sophos Intercept X: Next-Gen Endpoint
Sophos Intercept X: Next-Gen Endpoint
Add Sophos Intercept X: Next-Gen Endpoint
Tenable Vulnerability Management
Tenable Vulnerability Management Alternatives
InsightVM (Nexpose)
InsightVM (Nexpose)
Add InsightVM (Nexpose)
Wiz
Wiz
Add Wiz
Cisco Vulnerability Management (formerly Kenna.VM)
Cisco Vulnerability Management (formerly Kenna.VM)
Add Cisco Vulnerability Management (formerly Kenna.VM)
Dynatrace
Dynatrace
Add Dynatrace
Discussions
SentinelOne Singularity
SentinelOne Singularity Discussions
Will SentinelOne slow down my system?
3 comments
Luis C.
LC
Nop, different to any other EDR, SentinelOne uses less than 100MB in memory and up to 200MB while running a scanRead more
Does SentinelOne protect me while I am disconnected from the internet (such as during traveling)?
3 comments
Luis C.
LC
Yes, SentinelOne only needs internet access to update the policies, there's a 24/7 protectionRead more
On which Operating Systems SentinelOne can run?
2 comments
Luis C.
LC
SentinelOne can run in Windows XP (as legacy agent) Windows 7, Windows 8, 8.1, 10, Linux, MacOS and kubernetsRead more
Tenable Vulnerability Management
Tenable Vulnerability Management Discussions
Please advice on best practices for utilizing API to tie to visualization dashboards such as Power BI, Qlick, or Tableau
1 comment
Verified User
G2
What is tenable io?
1 comment
CK
Tenable.io is user-friendly front end for Nessus scanners that provides a digestible view of all of the data the scanner is picking up. It allows you to...Read more
What is Tenable.io used for?
1 comment
DH
vulnerability and security management.Read more