Compare Microsoft Defender External Attack Surface Management and SentinelOne Singularity Endpoint

Save your comparisonKeep these tools in one place and come back anytime.
Save to board
At a Glance
Microsoft Defender External Attack Surface Management
Microsoft Defender External Attack Surface Management
Star Rating
(16)4.3 out of 5
Market Segments
Small-Business (37.5% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about Microsoft Defender External Attack Surface Management
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Star Rating
(201)4.7 out of 5
Market Segments
Mid-Market (45.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 3 pricing plans

Microsoft Defender External Attack Surface Management vs SentinelOne Singularity Endpoint

When assessing the two solutions, reviewers found SentinelOne Singularity Endpoint easier to use. However, Microsoft Defender External Attack Surface Management is easier to set up and administer. Reviewers also preferred doing business with Microsoft Defender External Attack Surface Management overall.

  • Reviewers felt that SentinelOne Singularity Endpoint meets the needs of their business better than Microsoft Defender External Attack Surface Management.
  • When comparing quality of ongoing product support, reviewers felt that Microsoft Defender External Attack Surface Management is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Microsoft Defender External Attack Surface Management over SentinelOne Singularity Endpoint.
Pricing
Entry-Level Pricing
Microsoft Defender External Attack Surface Management
No pricing available
SentinelOne Singularity Endpoint
Singularity Core
Contact Us
Browse all 3 pricing plans
Free Trial
Microsoft Defender External Attack Surface Management
No trial information available
SentinelOne Singularity Endpoint
Free Trial is available
Ratings
Meets Requirements
9.0
16
9.3
170
Ease of Use
8.8
16
8.9
168
Ease of Setup
9.4
6
8.9
143
Ease of Admin
9.7
5
8.9
142
Quality of Support
9.3
15
8.9
164
Has the product been a good partner in doing business?
9.4
6
9.3
138
Product Direction (% positive)
10.0
16
9.8
165
Features by Category
Not enough data
8.0
29
Performance
Not enough data
9.0
28
Not enough data
9.5
29
Not enough data
7.4
29
Not enough data
8.7
29
Network
Not enough data
8.1
26
Not enough data
8.1
26
Not enough data
7.6
26
Application
Not enough data
7.6
23
Not enough data
7.0
23
Not enough data
7.3
21
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
9.3
42
Administration
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.6
30
Not enough data
9.4
32
Functionality
Not enough data
9.6
33
Not enough data
9.1
31
Not enough data
9.4
36
Not enough data
9.4
35
Analysis
Not enough data
9.4
37
Not enough data
9.2
34
Not enough data
9.6
34
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
9.4
49
Detection & Response
Not enough data
9.4
45
Not enough data
9.4
44
Not enough data
9.1
41
Not enough data
9.8
44
Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Analytics
Not enough data
9.3
48
Not enough data
9.3
46
Not enough data
9.4
46
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
8.6
15
Not enough data
Asset Management
8.1
14
Not enough data
8.5
14
Not enough data
8.0
14
Not enough data
Monitoring
8.8
15
Not enough data
9.0
14
Not enough data
8.8
14
Not enough data
8.9
14
Not enough data
Risk Management
8.5
14
Not enough data
8.7
15
Not enough data
8.9
15
Not enough data
9.0
15
Not enough data
Generative AI
8.3
12
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
9.1
15
Monitoring
Not enough data
9.4
15
Not enough data
9.1
15
Not enough data
8.7
13
Not enough data
9.7
15
Not enough data
9.2
15
Remediation
Not enough data
9.0
15
Not enough data
8.9
15
Not enough data
7.5
56
Generative AI
Not enough data
7.4
46
Not enough data
7.7
47
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
8.2
28
Generative AI
Not enough data
8.1
26
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.0
7
Services - Endpoint Detection & Response (EDR)
Not enough data
9.0
7
Not enough data
Not enough data
Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Records
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Deception TechnologyHide 4 FeaturesShow 4 Features
Not enough data
8.4
9
Incident Management
Not enough data
8.9
9
Not enough data
9.1
9
Not enough data
9.0
8
Generative AI
Not enough data
6.4
6
Categories
Categories
Shared Categories
Microsoft Defender External Attack Surface Management
Microsoft Defender External Attack Surface Management
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Microsoft Defender External Attack Surface Management and SentinelOne Singularity Endpoint share no categories
Reviews
Reviewers' Company Size
Microsoft Defender External Attack Surface Management
Microsoft Defender External Attack Surface Management
Small-Business(50 or fewer emp.)
37.5%
Mid-Market(51-1000 emp.)
37.5%
Enterprise(> 1000 emp.)
25.0%
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Small-Business(50 or fewer emp.)
17.5%
Mid-Market(51-1000 emp.)
45.4%
Enterprise(> 1000 emp.)
37.1%
Reviewers' Industry
Microsoft Defender External Attack Surface Management
Microsoft Defender External Attack Surface Management
Information Technology and Services
31.3%
Consulting
18.8%
Manufacturing
12.5%
Security and Investigations
6.3%
Non-Profit Organization Management
6.3%
Other
25.0%
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Information Technology and Services
14.0%
Computer & Network Security
8.3%
Hospital & Health Care
5.7%
Financial Services
5.2%
Automotive
4.7%
Other
62.2%
Alternatives
Microsoft Defender External Attack Surface Management
Microsoft Defender External Attack Surface Management Alternatives
Wiz
Wiz
Add Wiz
Scrut Automation
Scrut Automation
Add Scrut Automation
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Intruder
Intruder
Add Intruder
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Cynet
Cynet
Add Cynet
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Add Check Point Harmony Endpoint
ThreatDown
ThreatDown
Add ThreatDown
Discussions
Microsoft Defender External Attack Surface Management
Microsoft Defender External Attack Surface Management Discussions
Monty the Mongoose crying
Microsoft Defender External Attack Surface Management has no discussions with answers
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint Discussions
Does SentinelOne protect me while I am disconnected from the internet (such as during traveling)?
3 Comments
Official Response from SentinelOne Singularity Endpoint
Yes, the client will protect against malware threats when the device is disconnected from the internet. However, the administrative visibility and...Read more
Will SentinelOne slow down my system?
3 Comments
Official Response from SentinelOne Singularity Endpoint
The SentinelOne client uses a small amount of system resources and should not impact your daily activities.Read more
Is SentinelOne an antivirus?
2 Comments
Uri F.
UF
Yes, it's EDR + EPP, so it covers the same functionality as an Antivirus, just much better with additional functionality that an Antivirus doesn't provide...Read more