Compare N-able N-central and SentinelOne Singularity Endpoint

At a Glance
N-able N-central
N-able N-central
Star Rating
(530)4.4 out of 5
Market Segments
Small-Business (61.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about N-able N-central
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Star Rating
(199)4.7 out of 5
Market Segments
Mid-Market (44.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that SentinelOne Singularity Endpoint excels in user experience, with many praising its intuitive dashboard and ease of deployment. Users have highlighted how responsive the platform is to configuration changes, making it a favorite for those who value quick adjustments.
  • Users say that N-able N-central offers robust management capabilities, particularly through its ability to deploy powerful rules for customer management. This feature has been noted as a significant advantage for users managing multiple clients, showcasing its strength in operational efficiency.
  • According to verified reviews, SentinelOne Singularity Endpoint stands out for its exceptional support, with users describing the support team as amazing and quick to assist with any issues. This level of service contributes to a higher overall satisfaction compared to N-able N-central.
  • Reviewers mention that while N-able N-central provides a wealth of information within its portal, some users find it less user-friendly compared to SentinelOne. The feedback suggests that navigating N-central can be more complex, which may hinder day-to-day usability for some teams.
  • G2 reviewers highlight that SentinelOne Singularity Endpoint has a strong focus on compliance, with users appreciating its willingness to sign business associate agreements for HIPAA compliance. This feature is particularly appealing for organizations in regulated industries, setting it apart from N-able N-central.
  • Users report that N-able N-central has a solid market presence, especially among small businesses, but it may not meet the specific needs of mid-market companies as effectively as SentinelOne. This distinction is crucial for buyers considering their organization's size and requirements.
Pricing
Entry-Level Pricing
N-able N-central
No pricing available
SentinelOne Singularity Endpoint
Singularity Core
Contact Us
Browse all 3 pricing plans
Free Trial
N-able N-central
Free Trial is available
SentinelOne Singularity Endpoint
Free Trial is available
Ratings
Meets Requirements
8.4
432
9.3
169
Ease of Use
7.9
442
8.9
166
Ease of Setup
7.7
374
8.9
141
Ease of Admin
7.9
368
8.9
142
Quality of Support
8.0
410
8.9
163
Has the product been a good partner in doing business?
8.6
353
9.3
138
Product Direction (% positive)
8.8
426
9.8
164
Features by Category
Remote Monitoring & Management (RMM)Hide 19 FeaturesShow 19 Features
8.1
288
Not enough data
Inventory Management - Remote Monitoring & Management (RMM)
8.7
283
|
Verified
Not enough data
9.5
10
Not enough data
8.7
9
Not enough data
Monitoring and Management
9.0
281
|
Verified
Not enough data
7.9
157
Not enough data
7.6
278
|
Verified
Not enough data
8.2
281
|
Verified
Not enough data
9.0
10
Not enough data
IT Operations & Workflow - Remote Monitoring & Management (RMM)
8.7
9
Not enough data
Service Management
8.6
281
|
Verified
Not enough data
9.1
9
Not enough data
7.9
8
Not enough data
Agentic AI - Remote Monitoring & Management (RMM)
7.2
12
Not enough data
7.4
12
Not enough data
7.9
13
Not enough data
6.8
12
Not enough data
7.4
12
Not enough data
7.1
12
Not enough data
6.8
12
Not enough data
Unified Endpoint Management (UEM)Hide 17 FeaturesShow 17 Features
Not enough data
Not enough data
Scope
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Unified Endpoint Management (UEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.0
29
Performance
Not enough data
9.0
28
Not enough data
9.5
29
Not enough data
7.4
29
Not enough data
8.7
29
Network
Not enough data
8.1
26
Not enough data
8.1
26
Not enough data
7.6
26
Application
Not enough data
7.6
23
Not enough data
7.0
23
Not enough data
7.3
21
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
7.6
136
Not enough data
Functionality
8.4
135
Not enough data
8.7
136
Not enough data
Feature Not Available
Not enough data
8.2
132
Not enough data
Monitoring - Network Monitoring
7.6
12
Not enough data
7.8
12
Not enough data
8.2
12
Not enough data
Management
7.8
131
Not enough data
7.7
131
Not enough data
7.2
129
Not enough data
Analytics - Network Monitoring
7.1
11
Not enough data
6.8
12
Not enough data
Security - Network Monitoring
7.6
12
Not enough data
7.9
12
Not enough data
7.8
12
Not enough data
Network Performance - Network Monitoring
7.2
12
Not enough data
8.8
12
Not enough data
AI Automation - Network Monitoring
6.3
12
Not enough data
7.4
12
Not enough data
6.2
11
Not enough data
Agentic AI - Network Monitoring
6.1
6
Not enough data
8.3
7
Not enough data
8.6
7
Not enough data
6.9
7
Not enough data
6.7
7
Not enough data
6.0
7
Not enough data
7.1
7
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
9.4
41
Administration
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
8.6
29
Not enough data
9.4
31
Functionality
Not enough data
9.7
32
Not enough data
9.1
30
Not enough data
9.5
35
Not enough data
9.5
34
Analysis
Not enough data
9.5
36
Not enough data
9.2
33
Not enough data
9.6
34
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
9.4
49
Detection & Response
Not enough data
9.4
45
Not enough data
9.4
44
Not enough data
9.1
41
Not enough data
9.8
44
Management
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Analytics
Not enough data
9.3
48
Not enough data
9.3
46
Not enough data
9.4
46
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
9.1
15
Monitoring
Not enough data
9.4
15
Not enough data
9.1
15
Not enough data
8.7
13
Not enough data
9.7
15
Not enough data
9.2
15
Remediation
Not enough data
9.0
15
Not enough data
8.9
15
Not enough data
7.5
55
Generative AI
Not enough data
7.4
45
Not enough data
7.7
46
Endpoint ManagementHide 1 FeatureShow 1 Feature
5.9
128
8.2
28
Generative AI
5.9
128
8.1
26
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
9.0
5
9.3
5
Services - Endpoint Detection & Response (EDR)
9.0
5
9.3
5
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Enterprise IT ManagementHide 18 FeaturesShow 18 Features
7.8
158
Not enough data
Analysis
7.4
154
Not enough data
Platform
6.8
154
Not enough data
8.9
158
Not enough data
7.6
148
Not enough data
7.9
154
Not enough data
7.4
150
Not enough data
Security
8.1
152
Not enough data
8.5
156
Not enough data
7.2
148
Not enough data
8.0
151
Not enough data
7.4
148
Not enough data
Agentic AI - Enterprise IT Management
8.1
6
Not enough data
8.3
6
Not enough data
8.3
6
Not enough data
7.8
6
Not enough data
7.5
6
Not enough data
7.5
6
Not enough data
7.5
6
Not enough data
Deception TechnologyHide 4 FeaturesShow 4 Features
Not enough data
8.4
9
Incident Management
Not enough data
8.9
9
Not enough data
9.1
9
Not enough data
9.0
8
Generative AI
Not enough data
6.4
6
Categories
Categories
Shared Categories
N-able N-central
N-able N-central
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
N-able N-central and SentinelOne Singularity Endpoint are categorized as Endpoint Management and Endpoint Detection & Response (EDR)
Reviews
Reviewers' Company Size
N-able N-central
N-able N-central
Small-Business(50 or fewer emp.)
61.1%
Mid-Market(51-1000 emp.)
34.0%
Enterprise(> 1000 emp.)
4.9%
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Small-Business(50 or fewer emp.)
17.8%
Mid-Market(51-1000 emp.)
44.5%
Enterprise(> 1000 emp.)
37.7%
Reviewers' Industry
N-able N-central
N-able N-central
Information Technology and Services
48.1%
Computer & Network Security
21.6%
Computer Networking
4.5%
Accounting
1.6%
Information Services
1.6%
Other
22.6%
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Information Technology and Services
13.1%
Computer & Network Security
8.4%
Hospital & Health Care
5.8%
Financial Services
5.2%
Automotive
4.7%
Other
62.8%
Alternatives
N-able N-central
N-able N-central Alternatives
NinjaOne
NinjaOne
Add NinjaOne
Atera
Atera
Add Atera
Datto RMM
Datto RMM
Add Datto RMM
Kaseya VSA
Kaseya VSA
Add Kaseya VSA
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Add Check Point Harmony Endpoint
Cynet
Cynet
Add Cynet
ThreatDown
ThreatDown
Add ThreatDown
Discussions
N-able N-central
N-able N-central Discussions
Why is there no "Server Down" alarm or monitoring notificaiton ?
1 Comment
Official Response from N-able N-central
Hi Robert! Hmm - I think our "How to Set up Server Alert to be Sent to a Specific Email Address" might be able to help with your challenge! Check out this...Read more
Integration with more 3rd party AV on the horizon? Such as sophos?
1 Comment
SC
Sup, Nicholas! In short, YUP - we are always looking to expand our product's capabilities by providing best-of-breed integrations with 3rd party vendors. ...Read more
What can I monitor with N-central?
1 Comment
Official Response from N-able N-central
We can monitor just about anything! N-central will automatically detect almost any IP-connected device, and with hundreds of built-in monitoring services.Read more
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint Discussions
Will SentinelOne slow down my system?
3 Comments
Luis C.
LC
Nop, different to any other EDR, SentinelOne uses less than 100MB in memory and up to 200MB while running a scanRead more
Does SentinelOne protect me while I am disconnected from the internet (such as during traveling)?
3 Comments
Luis C.
LC
Yes, SentinelOne only needs internet access to update the policies, there's a 24/7 protectionRead more
On which Operating Systems SentinelOne can run?
2 Comments
Luis C.
LC
SentinelOne can run in Windows XP (as legacy agent) Windows 7, Windows 8, 8.1, 10, Linux, MacOS and kubernetsRead more