2026 Best Software Awards are here!See the list

Compare CrowdStrike Falcon Endpoint Protection Platform and SentinelOne Singularity Endpoint

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Star Rating
(380)4.7 out of 5
Market Segments
Enterprise (48.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 4 pricing plans
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Star Rating
(198)4.7 out of 5
Market Segments
Mid-Market (44.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that CrowdStrike Falcon excels in ease of use, with many users appreciating its unobtrusive operation. Once installed, it runs quietly in the background without noticeably slowing down systems, making it a seamless addition to their workflow.
  • Users say that SentinelOne Singularity Endpoint stands out for its real-time threat detection capabilities. Reviewers highlight its quick detection and blocking of threats without manual intervention, which is complemented by a lightweight agent that doesn't hinder system performance.
  • According to verified reviews, CrowdStrike Falcon offers a scalable functionality that appeals to both server and endpoint users. This flexibility is a significant advantage for organizations looking to protect a diverse range of devices from a single platform.
  • Reviewers mention that SentinelOne has made notable strides in customer support, with many users praising the responsiveness of the support team during deployment and after implementation. This level of support can be crucial for organizations navigating complex security environments.
  • G2 reviewers highlight that CrowdStrike Falcon provides strong visibility across all endpoints, which is essential for effective threat management. Users appreciate the centralized cloud-based console that allows for quick detection and response to threats.
  • Users report that while both platforms have their strengths, SentinelOne's Storyline feature is particularly noteworthy, as it visually represents threat activity, helping users understand the context of incidents better than some competitors.
Pricing
Entry-Level Pricing
CrowdStrike Falcon Endpoint Protection Platform
Falcon Pro
Free Trial
Browse all 4 pricing plans
SentinelOne Singularity Endpoint
Singularity Core
Contact Us
Browse all 3 pricing plans
Free Trial
CrowdStrike Falcon Endpoint Protection Platform
Free Trial is available
SentinelOne Singularity Endpoint
Free Trial is available
Ratings
Meets Requirements
9.3
278
9.3
168
Ease of Use
9.0
283
8.9
165
Ease of Setup
9.2
241
8.9
140
Ease of Admin
9.0
215
8.9
141
Quality of Support
8.9
273
8.9
162
Has the product been a good partner in doing business?
9.2
213
9.2
137
Product Direction (% positive)
9.7
258
9.8
163
Features by Category
Not enough data
8.0
29
Performance
Not enough data
9.0
28
Not enough data
9.5
29
Not enough data
7.4
29
Not enough data
8.7
29
Network
Not enough data
8.1
26
Not enough data
8.1
26
Not enough data
7.6
26
Application
Not enough data
7.6
23
Not enough data
7.0
23
Not enough data
7.3
21
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
9.0
123
9.4
40
Administration
9.2
77
Feature Not Available
8.4
74
Feature Not Available
8.8
77
Feature Not Available
9.0
78
8.6
29
8.8
82
9.4
31
Functionality
9.4
86
9.7
32
8.4
76
9.1
30
9.4
93
9.5
34
9.6
108
9.5
33
Analysis
9.2
91
9.5
35
9.0
86
9.2
33
9.3
92
9.6
34
ServiceNow Store AppsHide 6 FeaturesShow 6 Features
9.3
23
Not enough data
ServiceNow Apps
8.9
14
Not enough data
9.1
13
Not enough data
Agentic AI - ServiceNow Store Apps
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
9.3
76
9.4
49
Detection & Response
9.3
56
9.4
45
9.3
57
9.4
44
9.5
55
9.1
41
9.7
63
9.8
44
Management
9.0
56
Feature Not Available
8.8
54
Feature Not Available
9.1
58
Feature Not Available
Analytics
9.5
58
9.3
48
9.3
62
9.3
46
9.3
58
9.4
46
Agentic AI - Extended Detection and Response (XDR) Platforms
9.3
10
Not enough data
9.2
11
Not enough data
9.4
11
Not enough data
Services - Extended Detection and Response (XDR)
9.8
11
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
9.3
24
9.1
15
Monitoring
9.5
22
9.4
15
9.7
23
9.1
15
8.7
21
8.7
13
9.0
23
9.7
15
9.2
22
9.2
15
Remediation
9.3
23
9.0
15
9.5
22
8.9
15
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
9.0
23
Not enough data
Platform Features
9.5
20
Not enough data
8.8
18
Not enough data
9.1
18
Not enough data
9.0
17
Not enough data
9.5
19
Not enough data
7.6
17
Not enough data
Not enough data
Not enough data
Automation Capabilities
9.2
17
Not enough data
9.0
18
Not enough data
Not enough data
Not enough data
Generative AI
8.3
33
7.4
45
8.3
34
7.7
46
Endpoint ManagementHide 1 FeatureShow 1 Feature
8.1
24
8.2
28
Generative AI
8.1
24
8.1
26
User and Entity Behavior Analytics (UEBA)Hide 11 FeaturesShow 11 Features
8.8
13
Not enough data
Agentic AI - User and Entity Behavior Analytics (UEBA)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
9.0
10
Not enough data
8.8
10
Not enough data
8.5
9
Not enough data
8.5
9
Not enough data
Detection
8.9
9
Not enough data
8.9
9
Not enough data
9.3
9
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
9.0
26
9.3
5
Services - Endpoint Detection & Response (EDR)
9.0
24
9.3
5
8.8
102
Not enough data
Orchestration
8.9
71
Not enough data
8.9
71
Not enough data
9.2
79
Not enough data
8.9
70
Not enough data
Information
9.3
80
Not enough data
9.5
88
Not enough data
9.3
79
Not enough data
Personalization
9.4
82
Not enough data
9.4
80
Not enough data
8.8
69
Not enough data
Generative AI
7.7
27
Not enough data
9.0
7
Not enough data
9.0
7
Not enough data
9.2
8
Not enough data
Agentic AI - Threat Intelligence
7.7
14
Not enough data
7.6
13
Not enough data
8.1
13
Not enough data
7.8
13
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Information and Event Management (SIEM)Hide 14 FeaturesShow 14 Features
9.1
21
Not enough data
Network Management
9.4
17
Not enough data
8.4
15
Not enough data
8.6
16
Not enough data
Incident Management
9.4
18
Not enough data
9.5
19
Not enough data
9.2
15
Not enough data
Security Intelligence
9.6
16
Not enough data
8.7
15
Not enough data
9.2
16
Not enough data
9.0
15
Not enough data
Agentic AI - Security Information and Event Management (SIEM)
9.4
9
Not enough data
8.5
10
Not enough data
9.3
9
Not enough data
8.5
9
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Deception TechnologyHide 4 FeaturesShow 4 Features
Not enough data
8.4
9
Incident Management
Not enough data
8.9
9
Not enough data
9.1
9
Not enough data
9.0
8
Generative AI
Not enough data
6.4
6
Categories
Categories
Shared Categories
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Unique Categories
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint is categorized as Deception Technology and Vulnerability Scanner
Reviews
Reviewers' Company Size
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Small-Business(50 or fewer emp.)
10.7%
Mid-Market(51-1000 emp.)
41.2%
Enterprise(> 1000 emp.)
48.1%
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Small-Business(50 or fewer emp.)
17.9%
Mid-Market(51-1000 emp.)
44.2%
Enterprise(> 1000 emp.)
37.9%
Reviewers' Industry
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Information Technology and Services
18.7%
Computer & Network Security
11.0%
Financial Services
8.1%
Hospital & Health Care
4.9%
Computer Software
4.9%
Other
52.4%
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Information Technology and Services
13.2%
Computer & Network Security
7.9%
Hospital & Health Care
5.8%
Financial Services
5.3%
Automotive
4.7%
Other
63.2%
Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform Alternatives
Cynet
Cynet
Add Cynet
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint Alternatives
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Add Check Point Harmony Endpoint
Cynet
Cynet
Add Cynet
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Discussions
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform Discussions
How to uninstall the CS sensor remotely from any host?
2 Comments
Bryan B.
BB
This can be done via RTR if enabled or via deploying CS's uninstall tool through GPO, or whatever other deployment package manager you are using.Read more
Crowd strike have UBA??
1 Comment
Bryan B.
BB
No it does not.Read more
How do people see Firewall logs in Crowdstrike . Is it Possible to view Firewall logs or requires a separated application to pull those into CS console.
1 Comment
Bryan B.
BB
You can see firewall changes and rule modifications under the event_SimpleNames "FirewallChangeOption" and "FirewallSetRule". CrowdStrike's Firewall license...Read more
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint Discussions
Will SentinelOne slow down my system?
3 Comments
Luis C.
LC
Nop, different to any other EDR, SentinelOne uses less than 100MB in memory and up to 200MB while running a scanRead more
Does SentinelOne protect me while I am disconnected from the internet (such as during traveling)?
3 Comments
Luis C.
LC
Yes, SentinelOne only needs internet access to update the policies, there's a 24/7 protectionRead more
On which Operating Systems SentinelOne can run?
2 Comments
Luis C.
LC
SentinelOne can run in Windows XP (as legacy agent) Windows 7, Windows 8, 8.1, 10, Linux, MacOS and kubernetsRead more