Compare Intruder and SentinelOne Singularity Endpoint

Save your comparisonKeep these tools in one place and come back anytime.
Save to board
At a Glance
Intruder
Intruder
Star Rating
(206)4.8 out of 5
Market Segments
Small-Business (58.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $149.00 Per Month
Free Trial is available
Browse all 4 pricing plans
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Star Rating
(199)4.7 out of 5
Market Segments
Mid-Market (44.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Intruder excels in ease of setup, with users highlighting its straightforward installation process. Many appreciate how quickly they can start using the autoscanner, which is a crucial feature for monitoring security vulnerabilities.
  • Users say that SentinelOne Singularity Endpoint offers a responsive support team that is highly praised for its effectiveness. Reviewers have noted the team's willingness to assist with configuration changes, making it a reliable choice for those needing strong customer support.
  • According to verified reviews, Intruder stands out for its clarity and prioritization of vulnerability findings. Users appreciate that it focuses on significant issues rather than overwhelming them with less critical alerts, which helps streamline their security efforts.
  • Reviewers mention that SentinelOne Singularity Endpoint is easy to use and features a well-designed dashboard. This user-friendly interface allows for efficient navigation and management of security settings, making it suitable for teams with varying technical expertise.
  • G2 reviewers highlight that Intruder provides continuous updates on critical vulnerabilities, which users find invaluable for maintaining their network security. This proactive approach helps organizations stay ahead of potential threats.
  • Users report that while SentinelOne Singularity Endpoint is effective, it may not be as competitively priced as Intruder, which offers a clear entry-level pricing structure starting at $149. This pricing transparency can be a deciding factor for small businesses looking for budget-friendly options.
Pricing
Entry-Level Pricing
Intruder
Essential
Starting at $149.00
Per Month
Browse all 4 pricing plans
SentinelOne Singularity Endpoint
Singularity Core
Contact Us
Browse all 3 pricing plans
Free Trial
Intruder
Free Trial is available
SentinelOne Singularity Endpoint
Free Trial is available
Ratings
Meets Requirements
9.4
159
9.3
170
Ease of Use
9.5
164
8.9
167
Ease of Setup
9.6
143
8.9
142
Ease of Admin
9.5
132
8.9
142
Quality of Support
9.7
153
8.9
164
Has the product been a good partner in doing business?
9.7
125
9.3
138
Product Direction (% positive)
9.8
149
9.8
165
Features by Category
8.8
33
Not enough data
Administration
Feature Not Available
Not enough data
9.2
32
Not enough data
9.7
31
Not enough data
Risk Analysis
Feature Not Available
Not enough data
9.6
31
Not enough data
Feature Not Available
Not enough data
Threat Protection
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Generative AI
6.8
10
Not enough data
9.0
53
Not enough data
Administration
8.6
28
Not enough data
8.5
25
Not enough data
9.1
50
Not enough data
Analysis
9.4
41
Not enough data
9.2
38
Not enough data
9.6
51
Not enough data
Testing
Feature Not Available
Not enough data
8.6
20
Not enough data
8.7
29
Not enough data
9.4
39
Not enough data
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
8.8
8
Not enough data
Administration
8.9
6
Not enough data
8.6
6
Not enough data
Analysis
9.5
7
Not enough data
9.6
8
Not enough data
Feature Not Available
Not enough data
9.8
8
Not enough data
Feature Not Available
Not enough data
Testing
7.9
7
Not enough data
8.8
7
Not enough data
7.8
6
Not enough data
9.0
7
Not enough data
9.5
7
Not enough data
7.9
7
Not enough data
8.7
103
8.0
29
Performance
9.1
80
|
Verified
9.0
28
9.3
90
|
Verified
9.5
29
7.8
89
|
Verified
7.4
29
9.5
98
|
Verified
8.7
29
Network
9.0
39
8.1
26
9.0
82
|
Verified
8.1
26
Feature Not Available
7.6
26
Application
8.2
54
|
Verified
7.6
23
Feature Not Available
7.0
23
8.4
50
|
Verified
7.3
21
Agentic AI - Vulnerability Scanner
8.1
8
Not enough data
8.3
9
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
9.3
42
Administration
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.6
30
Not enough data
9.4
32
Functionality
Not enough data
9.6
33
Not enough data
9.1
31
Not enough data
9.4
36
Not enough data
9.4
35
Analysis
Not enough data
9.4
37
Not enough data
9.2
34
Not enough data
9.6
34
8.9
11
Not enough data
API Management
8.8
8
Not enough data
Feature Not Available
Not enough data
9.2
10
Not enough data
Feature Not Available
Not enough data
Security Testing
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.7
10
Not enough data
Security Management
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
9.4
49
Detection & Response
Not enough data
9.4
45
Not enough data
9.4
44
Not enough data
9.1
41
Not enough data
9.8
44
Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Analytics
Not enough data
9.3
48
Not enough data
9.3
46
Not enough data
9.4
46
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Configuration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
8.8
25
Not enough data
Asset Management
9.3
19
Not enough data
8.1
18
Not enough data
Feature Not Available
Not enough data
Monitoring
Feature Not Available
Not enough data
9.5
22
Not enough data
9.3
21
Not enough data
9.6
22
Not enough data
Risk Management
9.2
22
Not enough data
8.9
22
Not enough data
Feature Not Available
Not enough data
9.3
20
Not enough data
Generative AI
6.3
13
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
9.1
15
Monitoring
Not enough data
9.4
15
Not enough data
9.1
15
Not enough data
8.7
13
Not enough data
9.7
15
Not enough data
9.2
15
Remediation
Not enough data
9.0
15
Not enough data
8.9
15
Not enough data
7.5
56
Generative AI
Not enough data
7.4
46
Not enough data
7.7
47
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
8.2
28
Generative AI
Not enough data
8.1
26
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
8.9
6
Services - Endpoint Detection & Response (EDR)
Not enough data
8.9
6
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Deception TechnologyHide 4 FeaturesShow 4 Features
Not enough data
8.4
9
Incident Management
Not enough data
8.9
9
Not enough data
9.1
9
Not enough data
9.0
8
Generative AI
Not enough data
6.4
6
Reviews
Reviewers' Company Size
Intruder
Intruder
Small-Business(50 or fewer emp.)
58.7%
Mid-Market(51-1000 emp.)
36.8%
Enterprise(> 1000 emp.)
4.5%
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Small-Business(50 or fewer emp.)
17.7%
Mid-Market(51-1000 emp.)
44.8%
Enterprise(> 1000 emp.)
37.5%
Reviewers' Industry
Intruder
Intruder
Computer Software
21.0%
Information Technology and Services
15.5%
Financial Services
7.5%
Computer & Network Security
6.0%
Insurance
2.5%
Other
47.5%
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Information Technology and Services
13.5%
Computer & Network Security
8.3%
Hospital & Health Care
5.7%
Financial Services
5.2%
Automotive
4.7%
Other
62.5%
Alternatives
Intruder
Intruder Alternatives
Detectify
Detectify
Add Detectify
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Invicti (formerly Netsparker)
Invicti (formerly Netsparker)
Add Invicti (formerly Netsparker)
Acunetix by Invicti
Acunetix by Invicti
Add Acunetix by Invicti
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Add Check Point Harmony Endpoint
Cynet
Cynet
Add Cynet
ThreatDown
ThreatDown
Add ThreatDown
Discussions
Intruder
Intruder Discussions
Will Intruder's scans damage my systems?
2 Comments
What does Intruder actually test for you?
2 Comments
Nigel H.
NH
Saas applications, website and WANRead more
Is intruder IO safe?
1 Comment
Olya O.
OO
Intruder’s scanning engines are configured to be safe to use – even when scanning production systems, that said, this question does crop up from time to time...Read more
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint Discussions
Does SentinelOne protect me while I am disconnected from the internet (such as during traveling)?
3 Comments
Official Response from SentinelOne Singularity Endpoint
Yes, the client will protect against malware threats when the device is disconnected from the internet. However, the administrative visibility and...Read more
Will SentinelOne slow down my system?
3 Comments
Official Response from SentinelOne Singularity Endpoint
The SentinelOne client uses a small amount of system resources and should not impact your daily activities.Read more
Is SentinelOne an antivirus?
2 Comments
Uri F.
UF
Yes, it's EDR + EPP, so it covers the same functionality as an Antivirus, just much better with additional functionality that an Antivirus doesn't provide...Read more