Save to My Lists

SentinelOne Singularity Identity Detection & Response Reviews & Product Details

SentinelOne Singularity Identity Detection & Response Overview

What is SentinelOne Singularity Identity Detection & Response?

Singularity Identity is an identity threat detection and response (ITDR) solution that protects on-premises and cloud-hosted Active Directory domain controllers and domain-joined endpoints in real time. A component of the Singularity Platform, Singularity Identity detects active attacks against all device types and OSes, and safeguards against unauthorized privilege escalation and lateral movement.

SentinelOne Singularity Identity Detection & Response Details
Show LessShow More
Product Description

Singularity Identity is an identity threat detection and response (ITDR) solution that protects on-premises and cloud-hosted Active Directory domain controllers and domain-joined endpoints in real time. A component of the Singularity Platform, Singularity Identity detects active attacks against all device types and OSes, and safeguards against unauthorized privilege escalation and lateral movement.


Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
54,966 Twitter followers
LinkedIn® Page
www.linkedin.com
2,802 employees on LinkedIn®
Ownership
NASDAQ: S
Description

SentinelOne is a leading provider of autonomous security solutions for endpoint, cloud, and identity environments. Founded in
013 by a team of cybersecurity and defense experts, SentinelOne revolutionized endpoint protection with a new, AI-powered approach. Our platform unifies prevention, detection, response, remediation, and forensics in a single, easy-to-use solution.Our endpoint security product is designed to protect your organization's endpoints from known and unknown threats, including malware, ransomware, and APTs. It uses artificial intelligence to continuously learn and adapt to new threats, providing real-time protection and automated response capabilities. SentinelOne's approach to security is designed to help organizations secure their assets with speed and simplicity. We provide the ability to detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response, and adapt their defenses against the most advanced cyberattacks. We are recognized by Gartner in the Endpoint Protection Magic Quadrant as a Leader and have enterprise customers worldwide. Our customers include some of the world's largest companies in various industries such as finance, healthcare, government, and more.At SentinelOne, we understand that cybersecurity is a constantly evolving field and that the threats facing organizations are becoming increasingly sophisticated. That's why we are committed to staying at the forefront of technology and innovation and providing our customers with the best protection against cyber threats.We offer our customers a wide range of services, including threat hunting, incident response, and incident management. Our team of experts is available to assist you
4/7 and can help you respond to and manage cyber incidents quickly and effectively.To learn more about our products and services, please visit our website at www.sentinelone.com or contact us to schedule a demo.

Recent SentinelOne Singularity Identity Detection & Response Reviews

MR
Manish R.Small-Business (50 or fewer emp.)
5.0 out of 5
"S1 - Incredibly Effective, Always Evolving Security tool"
It is very easy to deployed on endpoints and even support legacy operating systems, which including Windows XP, 2003, and 2008. It has very user f...
PB
Prashant B.Mid-Market (51-1000 emp.)
5.0 out of 5
"Robust Security Tool"
SentinelOne Singularity is a tool with the all-in-one capability to do all the security tasks on the same dashboard. Sentinel gives you complete vi...

SentinelOne Singularity Identity Detection & Response Media

Answer a few questions to help the SentinelOne Singularity Identity Detection & Response community
Have you used SentinelOne Singularity Identity Detection & Response before?
Yes

2 SentinelOne Singularity Identity Detection & Response Reviews

5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
MR
Functional Tester
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about SentinelOne Singularity Identity Detection & Response?

It is very easy to deployed on endpoints and even support legacy operating systems, which including Windows XP, 2003, and 2008.

It has very user friendly and attractive UI.

It automaticaly mitigate most of the threats but sometimes needs humam intervention.

S1 has Cloud-based console so security team can access it from anywhere.

Easy to take device offline remotely in order to isolate it from internet. Review collected by and hosted on G2.com.

What do you dislike about SentinelOne Singularity Identity Detection & Response?

I do not find any major difficulties while using it but when we need support, they are available in 3-4 hours. Review collected by and hosted on G2.com.

What problems is SentinelOne Singularity Identity Detection & Response solving and how is that benefiting you?

We provides securities to many companies. SentinelOne EDR helps us to Identify threads on each and every endpoints and has abality to mitigate the threats. Review collected by and hosted on G2.com.

PB
Network Security Engineer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about SentinelOne Singularity Identity Detection & Response?

SentinelOne Singularity is a tool with the all-in-one capability to do all the security tasks on the same dashboard. Sentinel gives you complete visibility and real-time Threat Protection to Active Directory and Cloud AD Review collected by and hosted on G2.com.

What do you dislike about SentinelOne Singularity Identity Detection & Response?

Sentinel Singularity, from the Threat protection point of view, is acceptable and very effective, but from another point of view, like free trail and consulting, it's costly. Review collected by and hosted on G2.com.

What problems is SentinelOne Singularity Identity Detection & Response solving and how is that benefiting you?

SentinelOne Singularity identity provides the art and identity protect for Premise and cloud AD. its helps to identify the user behaviour on AD and it group behavior and its's activity. Review collected by and hosted on G2.com.

There are not enough reviews of SentinelOne Singularity Identity Detection & Response for G2 to provide buying insight. Below are some alternatives with more reviews:

1
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(290)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
2
IBM MaaS360 Logo
IBM MaaS360
4.2
(173)
Keep your business moving with mobile device management and security
3
Microsoft Defender for Identity Logo
Microsoft Defender for Identity
4.3
(99)
Microsoft Defender for Identity enables you to integrate Microsoft Defender for Identity with Defender for Endpoint, for an even more complete threat protection solution. While Defender for Identity monitors the traffic on your domain controllers, Defender for Endpoint monitors your endpoints, together providing a single interface from which you can protect your environment.
4
Microsoft Entra Identity Protection Logo
Microsoft Entra Identity Protection
4.5
(42)
Identity Protection is a tool that allows organizations to accomplish three key tasks: Automate the detection and remediation of identity-based risks. Investigate risks using data in the portal. Export risk detection data to your SIEM.
5
Huntress Managed ITDR Logo
Huntress Managed ITDR
4.9
(33)
Continuously monitors for indications and behaviors of a BEC attack, like a user logging in from a suspicious location or a malicious email forwarding rule. The Huntress Security Operations Center (SOC) reviews any detections, instantly isolating any compromised identities, and supplies a semi-automated remediation plan for further necessary actions.
6
Adaptive Shield Logo
Adaptive Shield
4.8
(31)
Proactively find and fix weaknesses across your SaaS platforms, and maintain continuous security for all global settings and user privileges.
7
Zilla Security Logo
Zilla Security
4.7
(22)
8
Silverfort Logo
Silverfort
4.8
(17)
Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure.
9
Vectra AI Platform Logo
Vectra AI Platform
4.3
(18)
Vectra AI provides an automated threat management solution that monitors internal network traffic to detect in real time active cyber attacks inside networks.
10
Semperis Directory Services Protector Logo
Semperis Directory Services Protector
4.7
(17)
Semperis is a provider of Identity and Access Management (IAM) solutions, addressing challenges surrounding the operation of active directory in hybrid IT environments.
Show More