Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated SentinelOne Singularity Mobile Alternatives

SentinelOne Singularity Mobile Reviews & Product Details

SentinelOne Singularity Mobile Overview

What is SentinelOne Singularity Mobile?

Singularity Mobile is an AI-powered MTD solution delivering autonomous threat protection, detection, and response for iOS, Android, and ChromeOS devices. It is the industry’s leading on-device behavioral AI product that dynamically detects never before seen malware, phishing, exploits, and man-in-the-middle (MiTM) attacks. Singularity Mobile provides security and data privacy to support zero trust.

SentinelOne Singularity Mobile Details
Show LessShow More
Product Description

Singularity Mobile is an AI-powered MTD solution delivering autonomous threat protection, detection, and response for iOS, Android, and ChromeOS devices. It is the industry’s leading on-device behavioral AI product that dynamically detects never before seen malware, phishing, exploits, and man-in-the-middle (MiTM) attacks. Singularity Mobile provides security and data privacy to support zero trust.


Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
54,569 Twitter followers
LinkedIn® Page
www.linkedin.com
2,802 employees on LinkedIn®
Ownership
NASDAQ: S
Description

SentinelOne is a leading provider of autonomous security solutions for endpoint, cloud, and identity environments. Founded in
013 by a team of cybersecurity and defense experts, SentinelOne revolutionized endpoint protection with a new, AI-powered approach. Our platform unifies prevention, detection, response, remediation, and forensics in a single, easy-to-use solution.Our endpoint security product is designed to protect your organization's endpoints from known and unknown threats, including malware, ransomware, and APTs. It uses artificial intelligence to continuously learn and adapt to new threats, providing real-time protection and automated response capabilities. SentinelOne's approach to security is designed to help organizations secure their assets with speed and simplicity. We provide the ability to detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response, and adapt their defenses against the most advanced cyberattacks. We are recognized by Gartner in the Endpoint Protection Magic Quadrant as a Leader and have enterprise customers worldwide. Our customers include some of the world's largest companies in various industries such as finance, healthcare, government, and more.At SentinelOne, we understand that cybersecurity is a constantly evolving field and that the threats facing organizations are becoming increasingly sophisticated. That's why we are committed to staying at the forefront of technology and innovation and providing our customers with the best protection against cyber threats.We offer our customers a wide range of services, including threat hunting, incident response, and incident management. Our team of experts is available to assist you
4/7 and can help you respond to and manage cyber incidents quickly and effectively.To learn more about our products and services, please visit our website at www.sentinelone.com or contact us to schedule a demo.

Recent SentinelOne Singularity Mobile Reviews

Verified User
A
Verified UserMid-Market (51-1000 emp.)
4.5 out of 5
"The best Mobile Security"
It provides only the best Security. We now have more peace of mind about the security of our computers and mobile devices.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

SentinelOne Singularity Mobile Media

Answer a few questions to help the SentinelOne Singularity Mobile community
Have you used SentinelOne Singularity Mobile before?
Yes

1 SentinelOne Singularity Mobile Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 SentinelOne Singularity Mobile Reviews
4.5 out of 5
1 SentinelOne Singularity Mobile Reviews
4.5 out of 5
G2 reviews are authentic and verified.
Verified User in Luxury Goods & Jewelry
AL
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about SentinelOne Singularity Mobile?

It provides only the best Security. We now have more peace of mind about the security of our computers and mobile devices. Review collected by and hosted on G2.com.

What do you dislike about SentinelOne Singularity Mobile?

It would be better if Sentinelone had its own mdm solution. We think it will be available for mobile and computers in the near future. Review collected by and hosted on G2.com.

What problems is SentinelOne Singularity Mobile solving and how is that benefiting you?

The computers are also using Sentinelone.

It is a great convenience to use it on mobile devices. We are now sure of the security of mobile devices. Review collected by and hosted on G2.com.

There are not enough reviews of SentinelOne Singularity Mobile for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Jamf Pro Logo
Jamf Pro
4.8
(1,863)
A complete Apple management solution for IT pros to empower users and simplify the deployment, inventory, and security of Macs, iPads, and iPhones. Designed to automate device management for you while driving end-user productivity and creativity, Jamf Pro (formerly Casper Suite) is the EMM tool that delights IT pros and the users they support by delivering on the promise of unified endpoint management for Apple devices.
2
Palo Alto Networks GlobalProtect Logo
Palo Alto Networks GlobalProtect
4.5
(63)
GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, command-and-control traffic, and known and unknown threats.
3
Jamf Protect Logo
Jamf Protect
4.6
(46)
Jamf Protect provides a complete endpoint protection solution to maintain endpoint compliance, monitor for, respond to, and remediate security incidents on macOS. With intuitive dashboards, real-time alerts, and extensive reporting, you’ll be the first to know when suspicious activities occur on your Apple computers. And, to minimize the use of device resources and maintain employee privacy expectations, Jamf Protect leverages the infrastructure of macOS and its Endpoint Security Framework.
4
Symantec Mobile Threat Defense Logo
Symantec Mobile Threat Defense
4.1
(45)
Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.
5
Prey Logo
Prey
4.6
(45)
Prey is an Anti-Theft and management application that helps you keep track and secure your laptop, phone and tablet.
6
Harmony Mobile Logo
Harmony Mobile
4.5
(44)
Harmony Mobile offers enterprise mobile security that protects against threats to the OS, apps and network. Leveraging Check Point’s best-of-breed threat prevention technology, SandBlast Mobile offers the highest threat catch rate in the industry without impacting device performance or user experience.
7
Appdome Logo
Appdome
4.7
(35)
The mobile industry’s only mobile application Cyber Defense Automation platform.
8
Trend Micro Mobile Security Logo
Trend Micro Mobile Security
4.0
(28)
Trend Micro™ Mobile Security is an essential component of Trend Micro complete user protection solution that gives you full visibility and control of mobile devices, apps, and data through a single built-in console. It strikes the right balance between user productivity and IT risks.
9
Check Point Mobile Access Logo
Check Point Mobile Access
4.3
(28)
Mobile data protection (MDP) systems and procedures are needed to protect business data privacy, meet regulatory and contractual requirements, and comply with audits.
10
Digital Guardian Secure Collaboration Logo
Digital Guardian Secure Collaboration
4.2
(15)
Digital Guardian Secure Collaboration enables businesses of all sizes to easily secure, track and share any digital information across all platforms and devices.
Show More