Sign in Agent Mode
Categories
Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

27 AWS reviews

External reviews

324 reviews
from and

External reviews are not included in the AWS star rating for the product.


    SahilBhatt

Advanced detection has strengthened endpoint protection and simplifies real-time threat response

  • April 22, 2026
  • Review provided by PeerSpot

What is our primary use case?

I use it primarily for endpoint protection, and I utilize it in various security scenarios. I work with SentinelOne Singularity Endpoint. I do use Purple AI, and data privacy and security are very important when utilizing Purple AI; it meets these needs well.

What is most valuable?

What I appreciate about it are its advanced detection capabilities and user-friendly interface; those are the best features in it.

My impressions of SentinelOne Singularity Endpoint's ability to ingest and correlate across my security solutions are very positive; it works effectively. SentinelOne Singularity Endpoint has helped me consolidate my security solutions significantly. I have examples about the consolidation of my security solutions with SentinelOne Singularity Endpoint; I appreciate discussing the threats that we have encountered.

I use the solution's Ranger functionality, and it has been helpful. SentinelOne Singularity Endpoint has helped to reduce alerts for me, making it easier to manage. SentinelOne Singularity Endpoint has helped to free up my staff for other projects and tasks, and I have seen time-saving aspects; I can share how much time it saved us.

It detects threats in real-time, which does not require prior scenarios. If we observe multiple false positives, we reach out to clients directly if the alert is serious; SentinelOne Singularity Endpoint does the remaining part for us by identifying and securing the client's endpoint, so we do not have to do any manual work.

Purple AI amplifies team knowledge effectively in my environment, and it has been very helpful. I assess Purple AI's capability in providing synthesized threat intelligence and contextual insights as strong. Purple AI's ability to streamline threat investigations has a positive impact on my SecOps workflows.

The main benefits that SentinelOne Singularity Endpoint brings to the table are enhanced security and improved operational efficiency.

What needs improvement?

I would like to see some improvements in SentinelOne Singularity Endpoint; there are features that are currently missing that I would like to see included or enhanced in the future.

For how long have I used the solution?

I have been using SentinelOne Singularity Endpoint more than a year.

What do I think about the stability of the solution?

Regarding the procurement aspect, I do not know where I bought it from, but I have not experienced any crashes, downtimes, or performance issues with SentinelOne Singularity Endpoint.

How are customer service and support?

I would evaluate customer service and technical support as an 8 on a scale of 1 to 10.

How was the initial setup?

The initial setup process is straightforward for me; I do not find any complexities with the setup.

What was our ROI?

Regarding the pricing aspect, I have experience with it, and I have seen ROI with it.

Which other solutions did I evaluate?

The main differences, both pros and cons of SentinelOne Singularity Endpoint compared to other endpoint protection products I have worked with, are notable.

What other advice do I have?

I use the solution's Ranger functionality, and it has been helpful. Given my experience with SentinelOne Singularity Endpoint, my advice for organizations considering it would be to certainly assess its capabilities. I rate this product as a 9 overall.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    Sayyed Mujahid Ali

Real-time threat detection has strengthened endpoint protection and simplified incident response

  • April 22, 2026
  • Review provided by PeerSpot

What is our primary use case?

SentinelOne Singularity Endpoint is one of the applications that we are using in our environment. We have been hands-on with SentinelOne for more than a year now.

SentinelOne Singularity Endpoint is very good because alerts are generated on a real-time basis. The real-time detection makes it a much better option to rely on. In comparison to other tools like Wazuh, which we use as a SIEM tool in our environment, Wazuh detects alerts very late. However, EDR solutions like SentinelOne Singularity Endpoint detect alerts in real-time, so we can rely on it much more than other tools.

Purple AI was recently introduced by SentinelOne, introduced last year. Purple AI helps us while creating advisories for our clients to identify any ongoing vulnerabilities. From a data privacy perspective, it is good because Purple AI is an inbuilt feature that SentinelOne has introduced. It is comparatively much better than using any other LLM across the internet.

To make it much better, the STAR custom rule option that SentinelOne offers could be much better and easier to deploy. As of now, I have not learned it properly, but I know it is very useful for creating and deploying use cases. The STAR custom rule can be much improved in SentinelOne Singularity Endpoint.

What is most valuable?

SentinelOne Singularity Endpoint is very useful because if there is any virus or malware detected in any endpoints, it quarantines the malware or any malicious application that it deems unusual and should not be there. It works amazingly well in this regard because it quarantines and flags it as malicious through its behavioral analysis. For endpoint security, SentinelOne Singularity Endpoint is the best option.

If a user on an endpoint downloads a file from an unknown or malicious website that contains anything malicious or has an unknown presence of suspicious or malicious EXE, SentinelOne Singularity Endpoint uses behavioral analysis with static and dynamic components. Static analysis is rule-based and created by users like us, while dynamic analysis uses behavioral pattern matching. This is useful in zero-day attacks, which is why it is one of the best options when it comes to endpoint security.

SentinelOne Singularity Endpoint is very easy to understand because the incident options and threat options are easy to understand, and the UI is very user-friendly for understanding what use cases we can create. In comparison to CrowdStrike, which took a long time for us to understand regarding what use cases we could create, SentinelOne Singularity Endpoint was much easier for us to understand. SentinelOne Singularity Endpoint provides the same functionality as CrowdStrike and is also easier to understand. For this reason, I feel SentinelOne Singularity Endpoint is much easier and much more preferable compared to other solutions.

I would rate it eight out of ten.

What needs improvement?

Ranger functionality is something I am not familiar with, and I do not have any hands-on experience with that function.

It depends on the client's perspective. If we have to whitelist any specific thing, we can easily negate the rules that we have deployed in SentinelOne Singularity Endpoint. By doing that, the detection becomes much clearer.

To make it much better, the STAR custom rule option that SentinelOne offers could be much better and easier to deploy. As of now, I have not learned it properly, but I know it is very useful for creating and deploying use cases. The STAR custom rule can be much improved in SentinelOne Singularity Endpoint.

For how long have I used the solution?

I have been using SentinelOne Singularity Endpoint for more than one year.

What do I think about the scalability of the solution?

Scalability is ten out of ten because we can scale it.

How are customer service and support?

SentinelOne's customer service is outstanding and rates ten out of ten. We have used SentinelOne support multiple times because clients have different questions that we cannot understand initially. When this happens, we raise those questions to SentinelOne's support team, and we get faster responses from them.

What other advice do I have?

We have not deployed SentinelOne Singularity Endpoint in any cloud solutions as of now. We have deployed it on a server and agent basis on-premises only. We have not deployed it in any cloud solutions.

We have a team of fourteen to fifteen people who are currently working on SentinelOne Singularity Endpoint. Across our team, we have seven to eight clients, and every person has their own job. Some have the job to trigger alerts, some have jobs to raise those alerts that have been triggered, and some have admin tasks. Every task is distributed accordingly in our team. My overall review rating for SentinelOne Singularity Endpoint is nine out of ten.


    Raj Borge

Automated threat response has reduced alerts and protected endpoints with rapid rollback recovery

  • April 16, 2026
  • Review provided by PeerSpot

What is our primary use case?

SentinelOne Singularity Endpoint is used for endpoint security to detect, prevent, and respond to cyber threats in real time. Using AI-based behavior analysis, it helps the SOC team to investigate incidents, automate responses and actions, and protect systems from malware and ransomware. SentinelOne Singularity Endpoint includes EDR, XDR, and NGAV.

What is most valuable?

A favorite feature of mine about SentinelOne Singularity Endpoint is the VSS rollback feature, which is most valuable. If a laptop is infected with any malware, there is an option to rollback files and recover them from before the attack happened.

Using SentinelOne Singularity Endpoint has helped me reduce alerts because it is integrated with FortiSIEM, one of the leading SIEM tools, and with SOAR technology. Whenever alerts come on SentinelOne Singularity Endpoint, they are directly raised to SOAR technology automatically. This is an automatic tool, so manual interaction is not required. All work is done by SentinelOne Singularity Endpoint, and I only have to take action on the analyst's verdict to determine if it is a true positive or false positive and investigate accordingly.

What needs improvement?

Dislikes include high false-positive alerts and resource consumption issues with CPU and disk usage.

Ranger functionality is for network discovery and control features. Its primary role is to identify and manage unmanaged devices on the network by detecting rogue devices in detections. It ingests logs from network sources and captures threat metrics, including IOCs. However, I cannot confirm if SentinelOne Singularity Endpoint releases the alert through Ranger, as I have not worked heavily on this feature because the Ranger functionality license is not available. SentinelOne Singularity Endpoint captures different telemetry from network devices.

For how long have I used the solution?

I have been using SentinelOne Singularity Endpoint for 2.3 years in my career.

What do I think about the stability of the solution?

Everything is perfect with SentinelOne Singularity Endpoint. There are no stability problems, and the system is very reliable and hands-on.

What do I think about the scalability of the solution?

SentinelOne Singularity Endpoint is very good in scalability. Scalability is extremely easy to achieve as new endpoints and new detection points come on board. The system can scale any number of times, and only the license for each endpoint is needed.

How are customer service and support?

Whenever I get stuck on any alert with SentinelOne Singularity Endpoint and do not understand it, or when I face any admin task challenges, I manually open a ticket with the customer team. Every time they help regarding the case. Each day, if I get stuck anywhere in SentinelOne Singularity Endpoint, whether with any admin task or threat hunting, the tech team or support team will surely help.

For the support team of SentinelOne Singularity Endpoint, I would rate them nine out of ten because there is a human voice there, so they are listening and responsive.

Which solution did I use previously and why did I switch?

For the first two years in my organization, I used Symantec AV. After that, I changed my domain to SentinelOne Singularity Endpoint.

How was the initial setup?

The initial deployment of SentinelOne Singularity Endpoint is easy and very straightforward. All that is needed is to set up a tenant and create a package file. Once installed, it automatically connects to the management console, and the entire system can be set up in one or two hours.

What about the implementation team?

For one customer of SentinelOne Singularity Endpoint, one to two people are enough for deployment. Because we are a partner with SentinelOne and have many customers, one to two members are sufficient for each customer deployment.

What's my experience with pricing, setup cost, and licensing?

I do not have knowledge about the pricing of SentinelOne Singularity Endpoint, as the sales team handles that. However, based on my knowledge, SentinelOne Singularity Endpoint is very flexible in its pricing range at approximately $9 to $10 per endpoint. We have 5,000+ endpoints because we are an MSSP provider, making it cost-effective.

Which other solutions did I evaluate?

I would choose SentinelOne Singularity Endpoint. In Symantec AV, there is only signature-based and behavior-based threat detection, whereas SentinelOne Singularity Endpoint has advanced behavior AI and pre-static AI. In Symantec AV, alerts must be manually raised and actions taken on the endpoint, but SentinelOne Singularity Endpoint has fully automated AI. The use cases are moderate in Symantec AV, but SentinelOne Singularity Endpoint is very easy with a modern UI. I prefer SentinelOne Singularity Endpoint because I have worked with both.

What other advice do I have?

The mean time to detect with SentinelOne Singularity Endpoint is very low. The mean time to respond for SentinelOne Singularity Endpoint is approximately two to three minutes since it is integrated with SOAR, and alerts are raised within that timeframe. From endpoint to console, alerts are received in real time with no lagging. SentinelOne Singularity Endpoint requires no maintenance. Since we have a partnership with the SentinelOne Singularity Endpoint team and are an MSSP provider, no maintenance is required. My overall rating for this review is eight out of ten.


    reviewer2808624

Advanced endpoint protection has reduced MTTR and continuously streamlines threat investigations

  • April 14, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for SentinelOne Singularity Endpoint is endpoint protection, threat detection, incident response, and visibility across user systems and servers. I primarily use it for malware and ransomware detection, suspicious process monitoring, automated remediations, endpoint isolations, threat hunting, and root cause analysis using Storyline. SentinelOne Singularity Endpoint has AI-powered EPP and EDR with autonomous responses, making these the best use cases that I have used day-to-day for the past two years.

The endpoint isolation and threat hunting capabilities of SentinelOne Singularity Endpoint stand out as the most valuable for my team because we rely on them the most on a daily basis.

How has it helped my organization?

SentinelOne Singularity Endpoint has positively impacted my organization by helping us achieve faster containment of endpoint threats, better visibility during investigations, and reducing reliance on traditional antivirus tools. It has improved the MTTR for endpoint cases, reducing it by around 30 to 40 percent. Alert fatigue has decreased by around 25 to 30 percent, and manual remediation efforts have reduced significantly.

Reducing MTTR by 30 to 40 percent has helped my team significantly. Earlier, analysts had to manually collect logs from multiple tools and verify affected endpoints, which took considerable coordination and time. The coordinated isolation with SentinelOne Singularity Endpoint's process tree, file activity, network connections, and threat details already available in the alert saves a lot of investigation and containment time. Alert triage has become faster by around 25 to 30 percent due to clear alert prioritization with severity, Storyline context, and behavior integration, helping analysts quickly identify true positives and focus on higher-risk incidents.

What is most valuable?

SentinelOne Singularity Endpoint offers Storyline, which provides process visibility that is one of its strongest features. It helps me understand what happened before and after detection.

The detailed process visibility and Storyline in SentinelOne Singularity Endpoint are very strong features that help in understanding what happened before and after detection, making process visibility the best feature I have noticed.

I appreciate the autonomous response time in SentinelOne Singularity Endpoint. It can kill malicious processes, quarantine files, and isolate the system quickly. Additionally, behavior layer detection is not only signature-based, which is useful for known threats. The lightweight agent performs well on endpoints, resulting in better performance on endpoint systems.

What needs improvement?

One potential improvement for SentinelOne Singularity Endpoint could be enhancing the user interface during investigations, especially for SOC employees.

For how long have I used the solution?

I have been using SentinelOne Singularity Endpoint for more than two years, and it is part of my daily SOC operations.

Which solution did I use previously and why did I switch?

I have not used a different solution prior to SentinelOne Singularity Endpoint.

What was our ROI?

I have seen a return on investment with SentinelOne Singularity Endpoint, as it reduces incident impact, leads to faster responses and detections, reduces less manual remediation, and improves analyst productivity.

What other advice do I have?

SentinelOne Singularity Endpoint Complete has helped me consolidate my security solutions.

SentinelOne Singularity Endpoint Complete has helped free up my staff for other projects and tasks, saving around 25 to 40 percent of their time.

It has also helped reduce my organization's Mean Time to Respond by about 25 to 30 percent.

SentinelOne Singularity Endpoint Complete has helped reduce alerts by around 20 to 25 percent.

One real case I handled involved a suspicious PowerShell execution on a user endpoint. SentinelOne Singularity Endpoint generated a behavior alert because the script tried to download content and spawn an additional response. I checked the process tree, parent-child relationship, command line activity, and network behavior using the console. I isolated the machine immediately after removing the threat, and what I appreciated was how quickly the investigation proceeded because the most required details were already available in one place.

Based on my experience, SentinelOne Singularity Endpoint Complete easily reduces alert fatigue by reducing alerts by around 20 to 25 percent. I would rate this product at 8.5 out of 10.


    reviewer2808624

Behavioral detection has reduced threats and response automation streamlines endpoint investigations

  • April 11, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for SentinelOne Singularity Endpoint is to work in our environment mainly for endpoint protection, threat detection, response, monitoring and suspicious process, and investigating the alerts.

What is most valuable?

SentinelOne Singularity Endpoint offers behavior AI detection, which is not just a normal signature thing, real-time threat blocking, automatic endpoint isolation, detailed process visibility, and easy-to-use dashboards.

Using SentinelOne Singularity Endpoint has positively impacted my organization by significantly reducing malware infections, providing faster incident responses, and enhancing the state of our endpoints.

SentinelOne Singularity Endpoint has helped reduce my organization's mean time to detect (MTTD) by 30 to 40%.

SentinelOne Singularity Endpoint has improved my organization's mean time to respond (MTTR) by 30 to 40% due to its automated detection and response capabilities.

What needs improvement?

SentinelOne Singularity Endpoint sometimes generates false positives, which they can work on. Additionally, the user interface can be improved, and more detailed reports could help us further.

For how long have I used the solution?

I have been using SentinelOne Singularity Endpoint for around three years.

What do I think about the stability of the solution?

SentinelOne Singularity Endpoint is very stable.

What do I think about the scalability of the solution?

SentinelOne Singularity Endpoint performs very well in terms of scalability and is very good at scaling.

How are customer service and support?

The customer support for SentinelOne Singularity Endpoint is good, and the support team is very responsive.

Which solution did I use previously and why did I switch?

Before choosing SentinelOne Singularity Endpoint, I evaluated other options like Microsoft Defender for Endpoint and CrowdStrike Falcon. However, I selected SentinelOne mainly because of its strong behavioral AI-based detection and automated response.

What was our ROI?

SentinelOne Singularity Endpoint reduces the time of SOC employees, providing a return on investment.

SentinelOne Singularity Endpoint has freed up my staff for other projects and tasks, reducing their workload by about 40 to 60% due to its main detection and investigation capabilities.

What's my experience with pricing, setup cost, and licensing?

Regarding pricing, setup cost, and licensing for SentinelOne Singularity Endpoint, I find the pricing to be dependent on the licensing and how many endpoints we have, so I don't have exact details on how it is handled by them.

What other advice do I have?

I rate the customer support for SentinelOne Singularity Endpoint a perfect 10 out of 10.

If any organization is battling with strong endpoint security and seeking faster detection and response, SentinelOne is a very good choice.

SentinelOne Singularity Endpoint sometimes generates false positives, which they can work on. Additionally, the user interface can be improved, and more detailed reports could help further.

My overall review rating for SentinelOne Singularity Endpoint is 8.5 out of 10.


    Jeevanandham R.

SentinelOne: Powerful Endpoint Security with Easy Threat Analysis

  • April 10, 2026
  • Review provided by G2

What do you like best about the product?
SentinelOne is a best end point security tool. Using this tool we can easily analyse which assets contains malicious softwares and antivirus. SentinelOne supports blocking USB port also.
What do you dislike about the product?
Initial stage of configuration takes huge amount of time and need a technical support also. Some times sentinelone sends a false positive informations also.
What problems is the product solving and how is that benefiting you?
Our end users install multiple software applications, so we need to analyze and protect their systems. That’s why we chose SentinelOne. After configuring SentinelOne, I can easily identify and remove malicious software.


    Dev Reshwal

Endpoint protection has improved threat response and incident rollback across thousands of devices

  • April 03, 2026
  • Review from a verified AWS customer

What is our primary use case?

My use cases for SentinelOne Singularity Complete are mainly for endpoint security to detect, prevent, and respond to cyber threats in real time. SentinelOne Singularity Complete serves as the first use case for endpoint security.

Our organization does not have the Ranger functionality because our customer does not require it.

We have integrated SentinelOne Singularity Complete with Shuffle SOAR technology, which is a most powerful tool.

Our organization is an MSSP provider with 10+ customers for whom we are providing security. We have 8,000 endpoints installed for our customers, and we are a 24/7 team providing security to our clients.

We have applied the protect policy and take basic analysis, which takes a couple of minutes before we raise the alert.

Regarding Purple AI, we are using it to identify the IOC. We have limited access to Purple AI, but we are using it for threat hunting purposes to find the IOCs.

What is most valuable?

What I like the most about SentinelOne Singularity Complete is the rollback capability for Windows systems. The TAC team and VSS rollback are the two features I appreciate most about SentinelOne Singularity Complete.

The response of the TAC team is very good. If SentinelOne Singularity Complete did not have a TAC team or support team, I would say it would be very lacking. When we get stuck anywhere, whether in any admin task or any threat hunting or investigation path, they are very helpful because there is a human voice on the other side helping us.

What needs improvement?

What I dislike about SentinelOne Singularity Complete is the high number of false positive alerts we get because our client sends us mail within one week stating that the CPU is highly utilized and resource consumption is high.

Regarding data privacy and security when using Purple AI, I can say that security-wise, it is good, though anyone can exploit that one.

For how long have I used the solution?

I have been using SentinelOne Singularity Complete for two years.

What do I think about the stability of the solution?

Stability-wise, SentinelOne Singularity Complete is very good. It runs continuously, and if our endpoint is online, it will protect our endpoint 100 percent.

What do I think about the scalability of the solution?

Regarding scalability, I heard that one of our competitor organizations deploys 15,000-plus endpoints for their customers. Scalability-wise, SentinelOne Singularity Complete is very good in that 15,000-plus endpoints are managed on one management console, which is double of our organization's deployment.

How are customer service and support?

I have contacted the technical support or customer support, and this is the most significant reason we are using SentinelOne Singularity Complete. They are very helpful because there is a human voice on the other side helping us.

If you compare with CrowdStrike, our organization has shifted to SentinelOne Singularity Complete only because of that TAC team or support team.

Which solution did I use previously and why did I switch?

We are using CrowdStrike, and in CrowdStrike, we are using Charlotte AI. If we raise a ticket on the community portal, within one or two hours, we get a reply from the team, and they are very helpful and can also come to the call. However, with CrowdStrike, I do not prefer it from my perspective as compared to SentinelOne Singularity Complete.

How was the initial setup?

For the initial deployment of SentinelOne Singularity Complete, I can say that it is very easy. We just need to create one tenant for the SentinelOne Singularity Complete platform. SentinelOne Singularity Complete setup is very easy.

What about the implementation team?

Maintenance is not actually required from my end because we are an MSSP provider, so no maintenance is necessary.

What was our ROI?

I can say that when an alert comes, we already have the protect policy and protect mode. After applying the protect policy, everything is taken care of by SentinelOne Singularity Complete.

What's my experience with pricing, setup cost, and licensing?

I do not have knowledge about the pricing for SentinelOne Singularity Complete because our sales team handles that. SentinelOne Singularity Complete is very valuable to me.

Which other solutions did I evaluate?

I would give SentinelOne Singularity Complete a rating of 10 out of 10 because you can compare it with CrowdStrike, and I can say that SentinelOne Singularity Complete is top tier.

What other advice do I have?

We are managing 7,000 to 8,000 endpoints for clients, and the setup is very easy. I have given SentinelOne Singularity Complete an overall review rating of 10 out of 10.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Abhinandan Yadav

Centralized protection has reduced ransomware risk and response time across all endpoints

  • March 31, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for SentinelOne Singularity Complete is for endpoint protection, threat detection, and automated response across all our corporate devices. Day-to-day, it is used to monitor endpoints in real time for malware, ransomware, and other threats. Automatically remediating detected threats and performing rollbacks when necessary allows us to maintain visibility into security events through the management console. Additionally, it supports our IT team with alerts and actionable reports for faster incident response.

A recent incident illustrates how we use it in our environment. Recently, one of our endpoints was targeted by a ransomware variant. SentinelOne Singularity Complete immediately detected the suspicious behavior, quarantined the affected files, and automatically rolled back the changes to restore the system to its previous state. This prevented any data loss and allowed the user to continue working without downtime. The alert also provided our IT team with detailed insights, helping us quickly understand the scope of the incident and ensure no other devices were affected.

We rely on SentinelOne Singularity Complete not only for malware and ransomware protection, but also for behavior-based threat detection, which can catch unusual activity that traditional antivirus might miss. It helps us maintain compliance by generating audit-ready security reports for management.

What is most valuable?

The best feature of SentinelOne Singularity Complete is that the console allows us to manage endpoints across multiple locations, which is critical for our distributed environment.

What stands out most about managing endpoints across multiple locations with SentinelOne Singularity Complete is the centralized dashboard, which gives us real-time visibility into all endpoints across every location from a single console. We can see threat alerts, device status, and policy compliance, which saves a lot of time compared to managing each location separately. Additionally, the reporting capabilities are very valuable. They allow us to generate detailed audit and compliance reports quickly, track trends, and identify recurring issues. This combination of centralized monitoring and actionable reporting makes it much easier to maintain a consistent security posture across our entire environment.

One feature I particularly appreciate about SentinelOne Singularity Complete is the AI-powered behavior detection. It can identify suspicious activity even before it is classified as malware, which adds an extra layer of proactive protection. I also appreciate how the platform automatically prioritizes threats based on the risk level, so our IT team can focus on the most critical issues first without being overwhelmed by alerts.

SentinelOne Singularity Complete has positively impacted my organization in several ways. Improved security regarding threats such as malware, ransomware, and suspicious behavior are detected and remediated automatically, reducing the risk of breaches. Better visibility across locations is another advantage. The centralized access console and reporting give us consistent oversight of all endpoints, helping us maintain compliance and quickly respond to alerts. Increased efficiency is evident as well; automated responses and rollback capabilities save our IT team significant time that would otherwise be spent manually investigating and resolving incidents.

Since implementing SentinelOne Singularity Complete, our IT team has been able to respond to endpoint threats up to seventy percent faster compared to our previous manual process. Incidents that used to take hours to investigate and remediate now often get resolved within minutes, thanks to automated detection, containment, and rollback. Additionally, we have reduced endpoint downtime by approximately sixty percent, minimizing disruption for our users.

What needs improvement?

In terms of improvement areas for SentinelOne Singularity Complete, while it is a very strong platform, there are a few areas where it could be better. Custom reporting flexibility is an aspect to consider; while the existing reports are useful, having more customizable report templates or an easier drag-and-drop option would help tailor insights to different teams. Granular policy control is another aspect to improve, as some security policies could benefit from more fine-grained control, especially for organizations with highly diverse endpoint and specialization workflows. Lastly, integration with other IT tools could be expanded, as additional out-of-the-box integrations with other IT management or SIEM platforms could further streamline operations. Overall, these are relatively minor improvements and do not take away from the core strengths of the platform. Addressing them could make SentinelOne Singularity Complete even more powerful and flexible for larger, complex environments.

A needed improvement for SentinelOne Singularity Complete is faster console load time. On very large deployments, the management console can sometimes be slightly slow to load dashboards or filter large endpoint lists. Faster performance here would improve efficiency. Additionally, enhanced threat insights in alerts would be beneficial. While alerts are clear, having contextual information and suggested remediation steps directly in the alert could help junior IT staff act even faster.

For how long have I used the solution?

I have been using SentinelOne Singularity Complete for the last two years.

What do I think about the stability of the solution?

SentinelOne Singularity Complete is stable.

What do I think about the scalability of the solution?

SentinelOne Singularity Complete scales very well across both small and large environments. The platform is designed to handle thousands of endpoints without significant performance degradation, and I have found it easy to expand the coverage as our organization grows. The aspects for scalability include centralized management, minimal performance impact, flexible architecture, and efficient resource use. Overall, SentinelOne Singularity Complete's architecture and automation features make it easy to grow with our environment, accommodating hundreds of thousands of endpoints without needing to restructure security operations.

How are customer service and support?

Customer support for SentinelOne Singularity Complete is good.

What was our ROI?

I have seen a return on investment with SentinelOne Singularity Complete. Automatically detecting, remediating, and rolling back threats has reduced manual investigation by approximately sixty to seventy percent, allowing IT teams to reduce mean time to respond and mean time to detect, with mean time to detect improved by sixty to seventy percent. Resource efficiency is also enhanced; the platform's automation has enabled a smaller team to manage a larger number of endpoints without compromising security. Downtime is reduced by sixty percent. Overall, the solution delivers seamless operation, improved threat management, and cost-effective security, making a strong investment in our organization.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for SentinelOne Singularity Complete has been positive. SentinelOne Singularity Complete does not require any maintenance from our end. There is a maintenance schedule once a month from SentinelOne itself. We receive prior notification if there are any maintenance schedules, but it does not take much time. The system will be offline for no more than five minutes. The security is still maintained during that time. If any alerts come, they are automatically recorded.

Which other solutions did I evaluate?

Before choosing SentinelOne Singularity Complete, we evaluated multiple options such as CrowdStrike Falcon, Microsoft Defender for Endpoint, and other EDR solutions. We conducted a proof of concept phase to see which aligned best with our security requirements and operational workflow before committing to SentinelOne Singularity Complete.

What other advice do I have?

In our environment, we do use Purple AI as part of SentinelOne Singularity Complete to help with threat analysis, investigation workflows, and speeding up the incident triage. Purple AI acts as an AI-powered security analyst, helping translate complex data into actionable insights and enabling faster threat hunting and investigation across our endpoint security data.

Purple AI plays a critical role in amplifying our team knowledge by helping us interpret alerts, investigate threats, and identify patterns across endpoints quickly. It essentially amplifies our team's knowledge by providing contextual insights, suggesting remediation steps, and correlating between security events that might otherwise be missed.

SentinelOne Singularity Complete has significantly reduced the number of alerts our IT team has to handle manually. By leveraging AI-driven behavior analysis and automated threat automation, low-risk or duplicate alerts are filtered out, allowing the team to focus on the most critical incidents. In our experience, the platform has reduced actionable alerts by fifty to sixty percent.

SentinelOne Singularity Complete has significantly reduced our organization's mean time to detect. With real-time AI-driven detection, automatic alerts, and behavioral analysis, threats are identified almost immediately upon occurrence. In our environment, we have observed that mean time to detect has improved by approximately sixty to seventy percent, meaning our IT team can detect and respond to incidents much faster than before. The rapid detection has been critical in preventing escalation and minimizing potential impact on end-user systems.

SentinelOne Singularity Complete has significantly reduced our organization's mean time to respond, thanks to automated remediation, rollback capabilities, and prioritized alerts. Our IT team can respond to incidents almost immediately. Mean time to respond has been reduced by approximately sixty-two percent, allowing threats to be contained and resolved in minutes rather than hours.

For others looking into using SentinelOne Singularity Complete, I advise utilizing the Purple AI summarization. The alert without much manual investigation allows us to determine if it is a true positive or not by seeing the Purple AI alert summarization, what happened, what process, activity, and what the underlying behavior is. Overall, SentinelOne Singularity Complete is highly effective, but organizations get the most value when they combine automation, AI, incident, and proactive management. Regularly reviewing the report with audit features is valuable for complete tracking of trends. Utilize the AI-driven insight to amplify your team knowledge and reduce alert fatigue. Planning for deployment across sites if you have multiple locations is essential, as is planning your policy and endpoint coverage for centralized management. I rate this solution a nine out of ten.


    reviewer2799597

Unified security platform has enabled real-time threat detection and streamlined investigations

  • March 30, 2026
  • Review from a verified AWS customer

What is our primary use case?

I use Singularity Platform as a SIEM across many infrastructures, including cloud and on-premises environments, to detect attacks on endpoints, cloud workloads, identities such as Active Directory, and network signals.

Singularity Platform is used to detect, investigate, and respond to threats all in one platform, which is why it is called Singularity Platform, because it has EDR, XDR, and cloud security all unified in one system.

I use fraud detection while working with financial companies and many fintech companies. Although SentinelOne is not known for fraud detection, it does detect stolen credentials, accounts that have been misused, or privilege abuse. I use it to a certain extent, but I cannot provide a deep-dive analysis on it today as I am fatigued from working through the night.

In my organization, I have around ten clients, of which six use SentinelOne as a SIEM, mainly financial companies, with one being a shopping-based company. I cannot provide all client details, but that is the general overview.

What is most valuable?

The best feature of Singularity Platform is that everything is unified in one platform, which would be a main unique selling point for them. The unique feature is Next-Gen AV plus EDR, which detects and blocks threats in real-time.

There is a rollback feature that rolls back to the previous state if anything goes wrong after a new feature is installed or a ransomware attack occurs. Singularity XDR extends visibility beyond the endpoints and correlates how the endpoint, cloud, identity, and network help me to see a full attack chain.

The real-time personalization feature allows for customizing the detection rules and adapting security decisions based on who is doing what and where. It tracks users with behavior-based personalization, detecting abnormalities such as a non-admin gaining admin access. It also detects credential theft by correlating identity plus endpoint data for better context.

For policy personalization in my SOC, I group devices based on alert names, agent versions, or OS types, which helps significantly. I can personalize based on alert severity and true positives or false positives, leading to automated responses. A unique feature in Singularity Platform is StoryLine technology, which connects incidents into a full storyline attack.

It explains the attack pattern in a way that follows commands executed after an incident, and I can write workflows using AI, working even offline, mainly with agent-based decisions without constant cloud dependency.

I have customized dashboards for my companies, including an overview dashboard showing alerts from endpoints. I created a unified dashboard with a network and an endpoint dashboard, consolidating SOC-related unassigned alerts and daily solved alerts. I customized that dashboard myself, and it is very easy to do, being a UI-based feature.

Real-time monitoring is very helpful, helping me stay one step ahead in cybersecurity. It allows me to see exactly what is happening at this moment, and knowing about an attack immediately is better than knowing an hour or two later. The sooner I know, the better it is for me. Real-time monitoring helps me significantly as a SOC analyst, making it one of the best features. After an alert, analyzing what happens next is just two to three clicks away, needing only to input the timeline, the query, and the affected user or endpoint.

What needs improvement?

For improvement, I would say the infrastructure is very slow; the application I use is sluggish, potentially due to workload or problems on my company's side.

Although they have fantastic features, if it is not working properly, it hinders performance. Recently, during maintenance, it was still operational but sluggish, with features not working as efficiently.

Grouping alerts previously worked fine but now requires multiple clicks to achieve the same result, which is problematic. They could improve the UI and focus more on creating new rules from their MDR team.

Although they are working on automation, they could advance automatic remediation capabilities further than they are currently.

For how long have I used the solution?

I have been using Singularity Platform for the last six months.

What do I think about the stability of the solution?

I would give stability a seven, as it usually crashes, requiring me to log in repeatedly.

What do I think about the scalability of the solution?

Singularity Platform is very scalable but requires planning; it is not as easy as Orca Security or agentless platforms because it has agents. I would still give scalability a seven.

How are customer service and support?

I would rate technical support as an eight.

Which other solutions did I evaluate?

Comparing Singularity Platform with other vendors, I find others also have fantastic features, but SentinelOne has unique offerings like the StoryLine feature, Purple AI, and a unified platform where endpoints, cloud security, and assets come together. This gives them a great advantage. Although there are better security tools in the market, considering the money I spend, SentinelOne is much more cost-efficient than other products. For example, Microsoft Sentinel is much too costly for my company, and although CrowdStrike provides top-notch service, SentinelOne is still doing well to keep up with market needs, though there is room for improvement.

What other advice do I have?

Singularity Platform requires maintenance, which is typically done on weekends. Although there was a maintenance window recently, it is almost acceptable, but technical issues can cause lag or latency, which is common in upgrades. They can improve by utilizing a backup or other measures.

I recommend Singularity Platform because of features such as the StoryLine model, Purple AI, and automating workflows with hyper-automation capabilities. I would hesitate to recommend it solely due to reliability issues.


    reviewer2811069

AI-driven endpoint defense has reduced false positives and now speeds incident response

  • March 26, 2026
  • Review from a verified AWS customer

What is our primary use case?

Our use case primarily involves using SentinelOne Singularity Complete for other clients as an EDR to monitor endpoint-related alerts, including malware and any malicious files, ransomware files, and any attack on endpoints such as servers or laptops. We use it as an EDR.

What is most valuable?

SentinelOne Singularity Complete has behavior-based AI that detects alerts that are not predefined without relying on predefined rules. For example, it detects zero-day attacks or any behavioral changes in the baseline of the user, or any suspicious anomalies through AI-based threat detection only.

In terms of SentinelOne Singularity Complete's ability to ingest and correlate across our security solutions, when using this AI SIEM, it provides any incident in a unified view only. It correlates and gives the information in one view rather than requiring access to other data sources. It connects the dots and gives a complete, correlated incident.

With SentinelOne Singularity Complete integrated with AI, false-positive alerts have been reduced significantly. I can say that 50% of false-positive alerts have been reduced, and we mostly get true positive alerts. I cannot say 100%, but the false-positive to true-positive ratio has been reduced by 50%.

What needs improvement?

We do not currently use the Ranger functionality option as it has not been enabled by our organization.

SentinelOne Singularity Complete itself is somewhat laggy and loads slowly at times. Sometimes when there are alerts in the dashboard, we cannot see them and it shows zero alerts. In this case, we have to log out and log in again and refresh it before we can see the alerts. We also experience some flickering issues. The UI needs significant improvement. In this case, I would rate it around 6.5 to seven on stability and performance.

For how long have I used the solution?

I have been using SentinelOne Singularity Complete for one year and two months.

What do I think about the stability of the solution?

The mean time to detect with SentinelOne Singularity Complete depends on AI automation as well. Mean time to detect does not process for more than three or four seconds. We get real-time alerts that arrive as incidents occur. The product is performing very well in terms of MTDD and MTTR.

What do I think about the scalability of the solution?

Scalability for SentinelOne Singularity Complete is good. It works well with all the endpoints, even if there are large numbers of endpoints. For example, in an enterprise environment, it performs well. Proper configuration and policies need to be set, but overall it is effective. I would rate it around 8 out of 10 for scalability.

How are customer service and support?

Technical support is good. I would rate it 8 out of 10 because there is a feature of AI support. If we require any help with documentation, we receive it immediately. With a single prompt, we receive help with documentation, and those documentations are very clear.

Which solution did I use previously and why did I switch?

I have previously used CrowdStrike. I can say SentinelOne Singularity Complete is better than CrowdStrike because it is more AI-capable and integrated. It gives us alerts based on behavior using the AI. In this aspect, I have only used CrowdStrike as an EDR, and I can rate SentinelOne as better than CrowdStrike.

How was the initial setup?

Deployment of SentinelOne Singularity Complete is easy. Installing agents is straightforward. We can do it using Active Directory and group policies. It is easy to install agents in endpoints.

What about the implementation team?

In my company, SecureIntelli, we are a team of 15 members with two leads. The 15 members use SentinelOne Singularity Complete on an everyday basis to monitor for our clients.

What was our ROI?

SentinelOne Singularity Complete saves 50% time for me and my team in responding to alerts, and it has reduced response time by 50%.

What's my experience with pricing, setup cost, and licensing?

SentinelOne Singularity Complete does not require any maintenance from our end. There is maintenance scheduled once a month from SentinelOne itself. We receive prior notification if there is any maintenance scheduled, but it does not take much time. The system will be offline for no more than five minutes. The security is still maintained during this time. If any alerts come or if anything is automatically remediated, it is taken care of in the backend.

Which other solutions did I evaluate?

I would recommend SentinelOne Singularity Complete over others. If they are using CrowdStrike, I can recommend SentinelOne Singularity Complete over that product. However, it requires some fine-tuning of policies and configuration. If that is done correctly, it works very well as an EDR.

What other advice do I have?

With Purple AI, it summarizes the alerts. Without much manual intervention, we can determine if it is a true positive or not by seeing the Purple AI alert summarization, what has been happening, what process activity is occurring, and what the user behavior is. It also provides recommendations on what to look for and what needs to be done to remediate the attack. This has helped us to respond to low and medium alerts very quickly, but it still requires manual intervention for high and critical alerts because Purple AI is not that accurate. Sometimes it gives more generic answers for any queries. In this way, we use Purple AI and it has benefited us.

I can say that with Purple AI, security is maintained in terms of data privacy. We cannot share it outside. I do not have much detail on this, but based on my experience, it is secure. There is no insecurity in using Purple AI and GenAI.

In terms of threat intelligence with Purple AI, it depends on the quality of the data that it is receiving. With AI analysis, it correlates with the threat intelligence databases, and if there are any matches, it shows whether the observable is a threat or malicious. It is very good in this aspect and it will be updating very frequently.

Purple AI summarizes the alerts in a very concise format. We can determine if it is a true positive or false positive by seeing a summary. Sometimes it is very precise. As it provides remediation recommendations as well, it is very helpful for us to respond in a shorter amount of time.

I am not sure about the financial aspect as I am in a technical department as an analyst and do not have much information on financial matters.

Overall, I would rate this product 8.5 out of 10.