Users report that Absolute Secure Endpoint excels in Endpoint Inclusiveness with a score of 9.6, indicating a comprehensive approach to endpoint security that covers a wide range of devices. In contrast, SentinelOne Singularity, while strong, does not provide the same level of inclusiveness.
Reviewers mention that SentinelOne Singularity shines in Application Control, scoring 9.4, which allows for more granular control over applications compared to Absolute Secure Endpoint's score of 8.1. This feature is particularly appreciated by users who need to manage application permissions tightly.
G2 users highlight the Real-Time Detection capabilities of Absolute Secure Endpoint, which received a high score of 9.8, making it a preferred choice for organizations that prioritize immediate threat response. In comparison, SentinelOne Singularity also performs well but does not match this level of real-time effectiveness.
Reviewers say that both products offer strong Quality of Support, each scoring 9.0, but users on G2 note that Absolute Secure Endpoint has been particularly responsive and helpful during critical incidents, enhancing user satisfaction.
Users report that SentinelOne Singularity has a superior Malware Detection score of 9.6, which is significantly higher than Absolute Secure Endpoint's score of 7.3. This feature is crucial for organizations that face high malware threats and need robust detection capabilities.
Reviewers mention that Absolute Secure Endpoint's Automated Scans feature, scoring 8.7, is user-friendly and efficient, while SentinelOne Singularity's automated features are noted for their advanced capabilities, scoring 9.5, which appeals to users looking for more sophisticated automation in their security processes.
Pricing
Entry-Level Pricing
Absolute Secure Endpoint
No pricing available
SentinelOne Singularity
Singularity Core
Contact Us
Singularity Core is the foundation of all SentinelOne endpoint security offerings to replace legacy AV or NGAV with a more effective and easily managed EPP. Core includes static and behavioral AI engines to detect a wide range of attacks. Our autonomous Sentinel Agent applies protection and detection right at the endpoint, with or without a cloud connection.
Is there a way to exclude executables from the full list?
1 Comment
Official Response from Absolute Secure Endpoint
Thanks for your comment, James. The ability to filter executables shown in application reports is part of our product roadmap and will be made available...Read more
What is Absolute's Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Risk Analysis is a new feature within the Absolute platform that provides a comprehensive assessment of the risk associated with a particular device,...Read more
What is the process for Investigating stolen devices? Is that different from the Risk Analysis feature?
1 Comment
Official Response from Absolute Secure Endpoint
Yes. Investigations and Risk Analysis are different. Customers simply need to file an Investigation report in the Absolute cloud-based console. This report...Read more
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.