Compare IBM MaaS360 and SentinelOne Singularity Endpoint

At a Glance
IBM MaaS360
IBM MaaS360
Star Rating
(202)4.2 out of 5
Market Segments
Mid-Market (43.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$5.00 per device $10.00 per user
Free Trial is available
Browse all 4 pricing plans
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Star Rating
(199)4.7 out of 5
Market Segments
Mid-Market (44.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that IBM MaaS360 excels in providing a comprehensive management solution, particularly for mobile devices. Users appreciate its unified dashboard that allows for seamless management of both corporate and BYOD devices across various operating systems, making it a strong choice for organizations with diverse device needs.
  • Users say that SentinelOne Singularity Endpoint stands out for its ease of deployment and responsive configuration changes. Reviewers highlight the amazing support team that enhances the overall user experience, making it a reliable option for businesses looking for quick and effective endpoint protection.
  • According to verified reviews, IBM MaaS360 is praised for its robust security features, including the Secure Container that effectively separates corporate data from personal data. This feature is particularly valued by users managing sensitive information across devices.
  • Reviewers mention that while SentinelOne Singularity Endpoint offers a well-designed and informative dashboard, it faces challenges in terms of overall user satisfaction compared to IBM MaaS360. Users have noted that while it is easy to use, it may not provide the same level of control over device management as IBM's solution.
  • G2 reviewers highlight that IBM MaaS360 has a solid reputation for its quality of support, with users noting the helpfulness and responsiveness of the support team. This aspect is crucial for organizations that require ongoing assistance and guidance in managing their endpoint security.
  • Users report that while both products cater to the mid-market segment, IBM MaaS360 has a slight edge in overall user satisfaction metrics, particularly in areas like ease of use and ease of setup. This makes it a favorable option for businesses looking for a straightforward implementation process.
Pricing
Entry-Level Pricing
IBM MaaS360
Deluxe Edition
$5.00 per device
$10.00 per user
Browse all 4 pricing plans
SentinelOne Singularity Endpoint
Singularity Core
Contact Us
Browse all 3 pricing plans
Free Trial
IBM MaaS360
Free Trial is available
SentinelOne Singularity Endpoint
Free Trial is available
Ratings
Meets Requirements
8.3
160
9.3
169
Ease of Use
8.2
162
8.9
166
Ease of Setup
7.9
125
8.9
141
Ease of Admin
8.0
101
8.9
142
Quality of Support
8.1
156
8.9
163
Has the product been a good partner in doing business?
8.0
100
9.3
138
Product Direction (% positive)
8.3
164
9.8
164
Features by Category
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
8.2
44
Not enough data
Scope
8.3
33
Not enough data
8.2
34
Not enough data
Security
8.8
33
Not enough data
8.3
36
Not enough data
8.8
34
Not enough data
Management
8.5
37
Not enough data
8.5
35
Not enough data
8.3
36
Not enough data
8.4
34
Not enough data
7.9
33
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
7.9
14
Not enough data
7.7
13
Not enough data
7.7
14
Not enough data
7.9
14
Not enough data
7.9
14
Not enough data
7.9
15
Not enough data
7.8
15
Not enough data
Not enough data
8.0
29
Performance
Not enough data
9.0
28
Not enough data
9.5
29
Not enough data
7.4
29
Not enough data
8.7
29
Network
Not enough data
8.1
26
Not enough data
8.1
26
Not enough data
7.6
26
Application
Not enough data
7.6
23
Not enough data
7.0
23
Not enough data
7.3
21
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
9.4
41
Administration
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.6
29
Not enough data
9.4
31
Functionality
Not enough data
9.7
32
Not enough data
9.1
30
Not enough data
9.5
35
Not enough data
9.5
34
Analysis
Not enough data
9.5
36
Not enough data
9.2
33
Not enough data
9.6
34
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
9.4
49
Detection & Response
Not enough data
9.4
45
Not enough data
9.4
44
Not enough data
9.1
41
Not enough data
9.8
44
Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Analytics
Not enough data
9.3
48
Not enough data
9.3
46
Not enough data
9.4
46
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
9.0
10
9.1
15
Monitoring
9.0
10
9.4
15
9.2
10
9.1
15
8.5
10
8.7
13
8.8
10
9.7
15
9.0
10
9.2
15
Remediation
9.3
10
9.0
15
9.5
10
8.9
15
Not enough data
7.5
55
Generative AI
Not enough data
7.4
45
Not enough data
7.7
46
Endpoint ManagementHide 1 FeatureShow 1 Feature
8.6
25
8.2
28
Generative AI
8.6
24
8.1
26
Mobile Application ManagementHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Agentic AI - Mobile Application Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Autonomous Endpoint Management (AEM)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Generative AI - Autonomous Endpoint Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Management - Autonomous Endpoint Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.3
5
Services - Endpoint Detection & Response (EDR)
Not enough data
9.3
5
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
8.6
83
Not enough data
Platform - Mobile Device Management (MDM)
8.7
66
Not enough data
Operating System
8.7
64
Not enough data
8.3
62
Not enough data
8.5
64
Not enough data
Management
8.5
69
Not enough data
8.7
61
Not enough data
8.5
61
Not enough data
8.8
56
Not enough data
8.0
63
Not enough data
Security
8.9
67
Not enough data
9.1
67
Not enough data
Agentic AI - Mobile Device Management (MDM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enterprise Mobility ManagementHide 21 FeaturesShow 21 Features
9.0
45
Not enough data
Platform
9.0
32
Not enough data
8.9
34
Not enough data
8.9
34
Not enough data
Operating System
8.7
31
Not enough data
8.9
29
Not enough data
9.3
31
Not enough data
Security
9.3
35
Not enough data
9.1
29
Not enough data
9.1
34
Not enough data
Management
9.0
35
Not enough data
9.1
33
Not enough data
9.2
34
Not enough data
9.2
32
Not enough data
8.4
33
Not enough data
Agentic AI - Enterprise Mobility Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Deception TechnologyHide 4 FeaturesShow 4 Features
Not enough data
8.4
9
Incident Management
Not enough data
8.9
9
Not enough data
9.1
9
Not enough data
9.0
8
Generative AI
Not enough data
6.4
6
Categories
Categories
Shared Categories
IBM MaaS360
IBM MaaS360
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Reviews
Reviewers' Company Size
IBM MaaS360
IBM MaaS360
Small-Business(50 or fewer emp.)
24.0%
Mid-Market(51-1000 emp.)
43.7%
Enterprise(> 1000 emp.)
32.2%
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Small-Business(50 or fewer emp.)
17.8%
Mid-Market(51-1000 emp.)
44.5%
Enterprise(> 1000 emp.)
37.7%
Reviewers' Industry
IBM MaaS360
IBM MaaS360
Information Technology and Services
19.7%
Computer Software
7.1%
Banking
6.6%
Computer & Network Security
4.9%
Hospital & Health Care
4.4%
Other
57.4%
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Information Technology and Services
13.1%
Computer & Network Security
8.4%
Hospital & Health Care
5.8%
Financial Services
5.2%
Automotive
4.7%
Other
62.8%
Alternatives
IBM MaaS360
IBM MaaS360 Alternatives
Jamf
Jamf
Add Jamf
Hexnode
Hexnode
Add Hexnode
ManageEngine Mobile Device Manager Plus
ManageEngine Mobile Device...
Add ManageEngine Mobile Device Manager Plus
Scalefusion
Scalefusion
Add Scalefusion
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Add Check Point Harmony Endpoint
Cynet
Cynet
Add Cynet
ThreatDown
ThreatDown
Add ThreatDown
Discussions
IBM MaaS360
IBM MaaS360 Discussions
What is IBM MaaS360 with Watson?
2 Comments
Sindhuja G.
SG
IBM MaaS360 with Watson is a cloud-based solution that combines Unified Endpoint Management (UEM) with AI-powered insights. It helps organizations manage and...Read more
Android Enterprise
1 Comment
JH
Hi Bryn, this could be a limitation you are experiencing related to your organizations licensing agreement with IBM. I would recommend contacting your...Read more
Is there a way to ensure no registered devices can connect to an unsecured wi-fi network?
1 Comment
JH
Yes. MaaS360 has a broad assortment of policy configurations available to customers, including the ability to mandate whether or not a device can connect...Read more
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint Discussions
Will SentinelOne slow down my system?
3 Comments
Luis C.
LC
Nop, different to any other EDR, SentinelOne uses less than 100MB in memory and up to 200MB while running a scanRead more
Does SentinelOne protect me while I am disconnected from the internet (such as during traveling)?
3 Comments
Luis C.
LC
Yes, SentinelOne only needs internet access to update the policies, there's a 24/7 protectionRead more
On which Operating Systems SentinelOne can run?
2 Comments
Luis C.
LC
SentinelOne can run in Windows XP (as legacy agent) Windows 7, Windows 8, 8.1, 10, Linux, MacOS and kubernetsRead more