Security How You Want It: Burden Free
January 02, 2021

Security How You Want It: Burden Free

Eric Milles | TrustRadius Reviewer
Score 10 out of 10
Vetted Review

Overall Satisfaction with SentinelOne

We recently deployed SentinelOne companywide to give us more granular control of our environment than our previous solution provided. We were using Webroot. While it's a solid product, Webroot did not give the level of control that we wanted for each endpoint. It was policy driven and required more global than finite management for endpoints.
  • It allows granular, targeted control of endpoints.
  • It has a central management console.
  • It allows management of endpoints through policies or groups and/or individual device control.
  • Solves our concern for more detailed management of endpoints.
  • Deployment is easily scripted and pushed out.
  • Fewer false positives than our previous solution, which had us chasing infections that did not exist, costing manpower.
Webroot is a great product but did not provide the versatility that we really were desiring. It allowed to us to centrally manage, but required policy-based management, and not the endpoint detail we wanted. SentinelOne's central management provides a variety of options for us to deploy and manage.

Do you think SentinelOne Singularity delivers good value for the price?

Yes

Are you happy with SentinelOne Singularity's feature set?

Yes

Did SentinelOne Singularity live up to sales and marketing promises?

Yes

Did implementation of SentinelOne Singularity go as expected?

Yes

Would you buy SentinelOne Singularity again?

Yes

As an MSP, we were looking for a product to use internally and for our clients that already had a well established industry presence and could give us more flexibility for endpoint management. SentinielOne has met and exceeded our expectation for those criteria. I would recommend it to any MSP or their clients. The industry reputation is well founded based on our experience so far.

SentinelOne Singularity Feature Ratings

Anti-Exploit Technology
10
Endpoint Detection and Response (EDR)
10
Centralized Management
10
Hybrid Deployment Support
8
Infection Remediation
10
Vulnerability Management
10
Malware Detection
10