Best Software for 2025 is now live!
Save to My Lists
Unclaimed
Unclaimed

Top Rated SentinelOne Singularity XDR Alternatives

SentinelOne Singularity XDR Reviews & Product Details

Jack E.
JE
Muay Thai Instructor
Information Technology and Services
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about SentinelOne Singularity XDR?

It's incredibly effective in protecting assets in our infrastructure from attacks. It's total autonomous coverage of security and exelent customer support. It's easy to implement and integrates well with a multitude of other third party tools. Ease of use is needless to say. The management console iUX is robust and appealing to the eye. Review collected by and hosted on G2.com.

What do you dislike about SentinelOne Singularity XDR?

There isn't anything that I don't like about SentinelOne Review collected by and hosted on G2.com.

What problems is SentinelOne Singularity XDR solving and how is that benefiting you?

It provides real-time, threat detection and response, helping our company quickly identify and mitigate threats. It offers a unified view of all assets and threats, making it easier to manage and respond to threats and can even automate responses to detected threats, reducing the workload on our small sized SOC Review collected by and hosted on G2.com.

SentinelOne Singularity XDR Overview

SentinelOne Singularity XDR Details
Show LessShow More

Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
54,569 Twitter followers
LinkedIn® Page
www.linkedin.com
2,802 employees on LinkedIn®
Ownership
NASDAQ: S
Description

SentinelOne is a leading provider of autonomous security solutions for endpoint, cloud, and identity environments. Founded in
013 by a team of cybersecurity and defense experts, SentinelOne revolutionized endpoint protection with a new, AI-powered approach. Our platform unifies prevention, detection, response, remediation, and forensics in a single, easy-to-use solution.Our endpoint security product is designed to protect your organization's endpoints from known and unknown threats, including malware, ransomware, and APTs. It uses artificial intelligence to continuously learn and adapt to new threats, providing real-time protection and automated response capabilities. SentinelOne's approach to security is designed to help organizations secure their assets with speed and simplicity. We provide the ability to detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response, and adapt their defenses against the most advanced cyberattacks. We are recognized by Gartner in the Endpoint Protection Magic Quadrant as a Leader and have enterprise customers worldwide. Our customers include some of the world's largest companies in various industries such as finance, healthcare, government, and more.At SentinelOne, we understand that cybersecurity is a constantly evolving field and that the threats facing organizations are becoming increasingly sophisticated. That's why we are committed to staying at the forefront of technology and innovation and providing our customers with the best protection against cyber threats.We offer our customers a wide range of services, including threat hunting, incident response, and incident management. Our team of experts is available to assist you
4/7 and can help you respond to and manage cyber incidents quickly and effectively.To learn more about our products and services, please visit our website at www.sentinelone.com or contact us to schedule a demo.

Recent SentinelOne Singularity XDR Reviews

Jack E.
JE
Jack E.Mid-Market (51-1000 emp.)
5.0 out of 5
"SentinelOne is TOP NOTCH"
It's incredibly effective in protecting assets in our infrastructure from attacks. It's total autonomous coverage of security and exelent customer ...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

SentinelOne Singularity XDR Media

Answer a few questions to help the SentinelOne Singularity XDR community
Have you used SentinelOne Singularity XDR before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of SentinelOne Singularity XDR for G2 to provide buying insight. Below are some alternatives with more reviews:

1
ESET PROTECT Logo
ESET PROTECT
4.6
(834)
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next-gen prevention, detection, and proactive threat hunting capabilities. Complementing the platform is a comprehensive suite of services, including managed detection and response (MDR), ensuring robust and continuous protection.
2
Wiz Logo
Wiz
4.7
(697)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
3
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
4
Sophos Intercept X: Next-Gen Endpoint Logo
Sophos Intercept X: Next-Gen Endpoint
4.6
(447)
Sophos Intercept X is the world’s most comprehensive endpoint protection solution. Built to stop the widest range of attacks, Intercept X has been proven to prevent even the most advanced ransomware and malware by leveraging a unique combination of next-generation techniques. This includes the ability to detect never-before-seen malware with deep learning, stop ransomware with Sophos anti-ransomware technology, and deny attacker tools with signatureless exploit prevention. Intercept X also includes root cause analysis to provide insight into threats, and instant malware removal to ensure no attack remnants remain.
5
Microsoft Defender XDR Logo
Microsoft Defender XDR
4.5
(293)
As threats become more complex and persistent, alerts increase, and security teams are overwhelmed. Microsoft 365 Defender, part of Microsoft’s XDR solution, leverages the Microsoft 365 security portfolio to automatically analyze threat data across domains, building a complete picture of each attack in a single dashboard. With this breadth and depth of clarity defenders can now focus on critical threats and hunt for sophisticated breaches, trusting that the powerful automation in Microsoft 365 Defender detects and stops attacks anywhere in the kill chain and returns the organization to a secure state.
6
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(288)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
7
Cynet - All-in-One Cybersecurity Platform Logo
Cynet - All-in-One Cybersecurity Platform
4.7
(208)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
8
Trend Vision One Logo
Trend Vision One
4.7
(187)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
9
LogRhythm SIEM Logo
LogRhythm SIEM
4.1
(143)
LogRhythm empowers organizations on six continents to successfully reduce risk by rapidly detecting, responding to, and neutralizing damaging cyberthreats
10
Blumira Automated Detection & Response Logo
Blumira Automated Detection & Response
4.6
(107)
Blumira's Automated SIEM enables organizations to detect and respond effectively to cybersecurity threats without having a dedicated in-house security operations center or security expertise.
Show More