# SentinelOne Singularity Endpoint vs ThreatLocker Allowlisting Comparison
---
## AI Generated Summary
- **G2 reviewers report** that SentinelOne Singularity Endpoint excels in its autonomous detection and response capabilities, allowing users to quickly identify and contain threats with minimal manual intervention. This feature is particularly praised for providing clear visibility into endpoint activities.
- **Users say** that ThreatLocker Platform stands out for its effective Zero-Trust enforcement, which blocks unknown threats without relying on traditional antivirus signatures. Reviewers appreciate the platform&#39;s ability to protect against zero-day ransomware, making it a reliable choice for those concerned about emerging threats.
- **According to verified reviews** , SentinelOne offers a user-friendly experience with easy deployment and management, which is highlighted by users who find the cloud-based management system intuitive and efficient for endpoint protection.
- **Reviewers mention** that ThreatLocker Platform&#39;s application control feature is a significant advantage, providing detailed insights into application behavior and preventing unauthorized software execution. This level of control is particularly beneficial for users looking to enhance their security posture.
- **Users highlight** that while SentinelOne has a strong performance in malware detection and automated remediation, some find it challenging to match their specific workflow needs, indicating that there may be room for improvement in customization options.
- **G2 reviewers note** that ThreatLocker Platform has a higher overall satisfaction score, particularly in support quality, where users commend the responsive and helpful customer service, making it a strong contender for businesses seeking reliable assistance.



| | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Star Rating** | 4.7 out of 5 | 4.8 out of 5 | 
| **Total Reviews** | 201 | 474 | 
| **Largest Market Segment** | Mid-Market (45.4% of reviews) | Small-Business (53.8% of reviews) | 
| **Entry Level Price** | Contact Us | Free Trial | 

---
## Top Pros & Cons

### SentinelOne Singularity Endpoint

Pros:
- Ease of Use (16 reviews)
- Features (11 reviews)

Cons:
- Learning Curve (4 reviews)
- Not User-Friendly (4 reviews)

### ThreatLocker Allowlisting

Pros:
- Customer Support (92 reviews)
- Threat Detection (87 reviews)

Cons:
- Learning Curve (44 reviews)
- Difficult Learning Curve (30 reviews)

---
## Ratings Comparison
| Rating | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
  | **Meets Requirements** | 9.3 (170 reviews) | 9.5 (147 reviews) | 
  | **Ease of Use** | 8.9 (168 reviews) | 8.4 (289 reviews) | 
  | **Ease of Setup** | 8.9 (143 reviews) | 8.6 (275 reviews) | 
  | **Ease of Admin** | 8.9 (142 reviews) | 8.6 (138 reviews) | 
  | **Quality of Support** | 8.9 (164 reviews) | 9.7 (145 reviews) | 
  | **Has the product been a good partner in doing business?** | 9.3 (138 reviews) | 9.7 (136 reviews) | 
  | **Product Direction (% positive)** | 9.8 (165 reviews) | 9.7 (140 reviews) | 

---
## Pricing

### SentinelOne Singularity Endpoint

#### Entry-Level Pricing

Plan: Singularity Core

Price: Contact Us

Description: Singularity Core is the foundation of all SentinelOne endpoint security offerings to replace legacy AV or NGAV with a more effective and easily managed EPP. Core includes static and behavioral AI engines to detect a wide range of attacks. Our autonomous Sentinel Agent applies protection and detection right at the endpoint, with or without a cloud connection.

Key Features:
- On-agent Storyline™
- On-agent static AI
- On-agent Behavioral AI

[Browse all 3 editions](https://www.g2.com/products/sentinelone-singularity-endpoint/pricing)

#### Free Trial

Yes

### ThreatLocker Allowlisting

#### Entry-Level Pricing

Plan: Enterprise

Price: Free Trial

Description: ThreatLocker enables IT teams to control the applications that run on their machines, and stop these applications from being exploited and weaponized. We give IT teams total control to manage and define what is, and what is not allowed, to run on their machines. 

Key Features:
- Allowlisting
- Ringfencing
- Zero Trust Cloud Access

[Browse all 2 editions](https://www.g2.com/products/threatlocker-allowlisting/pricing)

#### Free Trial

Yes

---
## Features Comparison By Category

### Zero Trust Networking

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | N/A | N/A |
| **ThreatLocker Allowlisting** | 7.9/10 | 8 |

#### Network Management

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Network Segmentation** | Not enough data | Feature Not Available | 
| **Network Mapping** | Not enough data | Feature Not Available | 
| **Security Analytics** | Not enough data | 8.1 (7 reviews) | 
| **API/Integrations** | Not enough data | 6.9 (6 reviews) | 

#### Security

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Security Automation** | Not enough data | 8.5 (8 reviews) | 
| **Application Security** | Not enough data | 8.1 (7 reviews) | 
| **Workload Protection** | Not enough data | 7.8 (6 reviews) | 
| **Data Protection** | Not enough data | 8.1 (7 reviews) | 

#### Identity Management

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Adaptive Access Control** | Not enough data | 8.6 (7 reviews) | 
| **Identity Scoring** | Not enough data | 7.1 (7 reviews) | 
| **User Monitoring** | Not enough data | 8.3 (7 reviews) | 

#### Generative AI

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **AI Text Summarization** | Not enough data | Feature Not Available | 
| **AI Text Generation** | Not enough data | Feature Not Available | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | 8.0/10 | 29 |
| **ThreatLocker Allowlisting** | N/A | N/A |

#### Performance

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Issue Tracking** | 9.0 (28 reviews) | Not enough data | 
| **Detection Rate** | 9.5 (29 reviews) | Not enough data | 
| **False Positives** | 7.4 (29 reviews) | Not enough data | 
| **Automated Scans** | 8.7 (29 reviews) | Not enough data | 

#### Network

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Compliance Testing** | 8.1 (26 reviews) | Not enough data | 
| **Perimeter Scanning** | 8.1 (26 reviews) | Not enough data | 
| **Configuration Monitoring** | 7.6 (26 reviews) | Not enough data | 

#### Application

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Manual Application Testing** | 7.6 (23 reviews) | Not enough data | 
| **Static Code Analysis** | 7.0 (23 reviews) | Not enough data | 
| **Black Box Testing** | 7.3 (21 reviews) | Not enough data | 

#### Agentic AI - Vulnerability Scanner

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | 

### Endpoint Protection Platforms

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | 9.3/10 | 42 |
| **ThreatLocker Allowlisting** | N/A | N/A |

#### Administration

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Compliance** | Feature Not Available | Not enough data | 
| **Web Control** | Feature Not Available | Not enough data | 
| **Application Control** | Feature Not Available | Not enough data | 
| **Asset Management** | 8.6 (30 reviews) | Not enough data | 
| **Device Control** | 9.4 (32 reviews) | Not enough data | 

#### Functionality

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **System Isolation** | 9.6 (33 reviews) | Not enough data | 
| **Firewall** | 9.1 (31 reviews) | Not enough data | 
| **Endpoint Intelligence** | 9.4 (36 reviews) | Not enough data | 
| **Malware Detection** | 9.4 (35 reviews) | Not enough data | 

#### Analysis

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Automated Remediation** | 9.4 (37 reviews) | Not enough data | 
| **Incident Reports** | 9.2 (34 reviews) | Not enough data | 
| **Behavioral Analysis** | 9.6 (34 reviews) | Not enough data | 

### Extended Detection and Response (XDR) Platforms

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | 9.4/10 | 49 |
| **ThreatLocker Allowlisting** | N/A | N/A |

#### Detection &amp; Response

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Response Automation** | 9.4 (45 reviews) | Not enough data | 
| **Threat Hunting** | 9.4 (44 reviews) | Not enough data | 
| **Rule-Based Detection** | 9.1 (41 reviews) | Not enough data | 
| **Real-Time Detection** | 9.8 (44 reviews) | Not enough data | 

#### Management

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Extensibility** | Feature Not Available | Not enough data | 
| **Workflow Automation** | Feature Not Available | Not enough data | 
| **Unified Visibility** | Feature Not Available | Not enough data | 

#### Analytics

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Threat Intelligence** | 9.3 (48 reviews) | Not enough data | 
| **Artificial Intelligence &amp; Machine Learning** | 9.3 (46 reviews) | Not enough data | 
| **Data Collection** | 9.4 (46 reviews) | Not enough data | 

#### Agentic AI - Extended Detection and Response (XDR) Platforms

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | 

#### Services - Extended Detection and Response (XDR)

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Managed Services** | Not enough data | Not enough data | 

### Identity Threat Detection and Response (ITDR)

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | 9.1/10 | 15 |
| **ThreatLocker Allowlisting** | N/A | N/A |

#### Monitoring

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Investigate** | 9.4 (15 reviews) | Not enough data | 
| **Monitoring** | 9.1 (15 reviews) | Not enough data | 
| **Misconfigurations** | 8.7 (13 reviews) | Not enough data | 
| **Integrate** | 9.7 (15 reviews) | Not enough data | 
| **Visability** | 9.2 (15 reviews) | Not enough data | 

#### Remediation

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Remediation** | 9.0 (15 reviews) | Not enough data | 
| **Audit** | 8.9 (15 reviews) | Not enough data | 

### Antivirus

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | 7.5/10 | 56 |
| **ThreatLocker Allowlisting** | N/A | N/A |

#### Generative AI

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **AI Text Generation** | 7.4 (46 reviews) | Not enough data | 
| **AI Text Summarization** | 7.7 (47 reviews) | Not enough data | 

### Endpoint Management

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | 8.2/10 | 28 |
| **ThreatLocker Allowlisting** | N/A | N/A |

#### Generative AI

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **AI Text Summarization** | 8.1 (26 reviews) | Not enough data | 

### Zero Trust Platforms

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | N/A | N/A |
| **ThreatLocker Allowlisting** | 8.9/10 | 11 |

#### Identity and Access Management - Zero Trust Platforms

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Single sign-on (SSO)** | Not enough data | 7.0 (5 reviews) | 
| **Multi-factor authentication (MFA)** | Not enough data | Not enough data | 
| **Role-based access control (RBAC)** | Not enough data | Not enough data | 
| **Identity federation** | Not enough data | Not enough data | 

#### Security - Zero Trust Platforms

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Encryption** | Not enough data | Not enough data | 
| **Endpoint detection and response (EDR)** | Not enough data | 9.0 (5 reviews) | 
| **Device posture assessment** | Not enough data | Not enough data | 
| **Micro-segmentation** | Not enough data | Not enough data | 
| **Zero trust network access (ZTNA)** | Not enough data | Not enough data | 

#### Data Security - Zero Trust Platforms

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Data loss prevention (DLP)** | Not enough data | Not enough data | 
| **Data classification** | Not enough data | Not enough data | 

#### Application Visibility - Zero Trust Platforms

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **API support** | Not enough data | Not enough data | 
| **Application-level controls** | Not enough data | 9.4 (6 reviews) | 
| **Secure application access** | Not enough data | Not enough data | 
| **User and entity behavior analytics (UEBA)** | Not enough data | Not enough data | 
| **Continuous monitoring** | Not enough data | 9.0 (5 reviews) | 

#### Reporting and Policies - Zero Trust Platforms

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Policy automation** | Not enough data | 9.0 (5 reviews) | 
| **Regulatory compliance** | Not enough data | 9.3 (5 reviews) | 
| **Cross-platform compatibility** | Not enough data | Not enough data | 
| **Policy enforcement** | Not enough data | 9.4 (6 reviews) | 
| **Comprehensive reporting** | Not enough data | Not enough data | 

#### Agentic AI - Zero Trust Platforms

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | 

### Endpoint Detection &amp; Response (EDR)

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | 9.0/10 | 7 |
| **ThreatLocker Allowlisting** | N/A | N/A |

#### Services - Endpoint Detection &amp; Response (EDR) 

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Managed Services** | 9.0 (7 reviews) | Not enough data | 

### Incident Response

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | N/A | N/A |
| **ThreatLocker Allowlisting** | N/A | N/A |

#### Response

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Resolution Automation** | Not enough data | Not enough data | 
| **Resolution Guidance** | Not enough data | Not enough data | 
| **System Isolation** | Not enough data | Not enough data | 
| **Threat Intelligence** | Not enough data | Not enough data | 
| **Incident Investigation** | Not enough data | Not enough data | 

#### Records

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Incident Logs** | Not enough data | Not enough data | 
| **Incident Reports** | Not enough data | Not enough data | 

#### Management

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Incident Alerts** | Not enough data | Not enough data | 
| **Incident Case Management** | Not enough data | Not enough data | 
| **Workflow Management** | Not enough data | Not enough data | 

#### Generative AI

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **AI Text Generation** | Not enough data | Not enough data | 
| **AI Text Summarization** | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | N/A | N/A |
| **ThreatLocker Allowlisting** | N/A | N/A |

#### Cloud Visibility

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | 

#### Security

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Data Security** | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | 

#### Identity

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **SSO** | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | 

### Endpoint Protection

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | N/A | N/A |
| **ThreatLocker Allowlisting** | N/A | N/A |

#### System Control

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Device Control** | Not enough data | Not enough data | 
| **Web Control** | Not enough data | Not enough data | 
| **Application Control** | Not enough data | Not enough data | 
| **Asset Management** | Not enough data | Not enough data | 
| **System Isolation** | Not enough data | Not enough data | 

#### Vulnerability Prevention

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Endpoint Intelligence** | Not enough data | Not enough data | 
| **Firewall** | Not enough data | Not enough data | 
| **Malware Detection** | Not enough data | Not enough data | 

#### Security Management

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Incident Reports** | Not enough data | Not enough data | 
| **Security Validation** | Not enough data | Not enough data | 
| **Compliance ** | Not enough data | Not enough data | 

### Deception Technology

| Product | Score | Reviews |
|---|---|---|
| **SentinelOne Singularity Endpoint** | 8.4/10 | 9 |
| **ThreatLocker Allowlisting** | N/A | N/A |

#### Incident Management

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Forensics** | 8.9 (9 reviews) | Not enough data | 
| **Threat Intelligence** | 9.1 (9 reviews) | Not enough data | 
| **Response Automation** | 9.0 (8 reviews) | Not enough data | 

#### Generative AI

| Feature | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **AI Text Summarization** | 6.4 (6 reviews) | Not enough data | 

---
## Categories

**Unique to SentinelOne Singularity Endpoint (9):** [Identity Threat Detection and Response (ITDR)  Software](https://www.g2.com/categories/identity-threat-detection-and-response-itdr), [Extended Detection and Response (XDR) Platforms](https://www.g2.com/categories/extended-detection-and-response-xdr-platforms), [Deception Technology Software](https://www.g2.com/categories/deception-technology), [Endpoint Protection Platforms](https://www.g2.com/categories/endpoint-protection-platforms), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner), [Endpoint Management Software](https://www.g2.com/categories/endpoint-management), [Antivirus Software](https://www.g2.com/categories/antivirus), [Endpoint Detection &amp; Response (EDR) Software](https://www.g2.com/categories/endpoint-detection-response-edr), [Incident Response Software](https://www.g2.com/categories/incident-response)

**Unique to ThreatLocker Allowlisting (2):** [Zero Trust Networking Software](https://www.g2.com/categories/zero-trust-networking), [Zero Trust Platforms](https://www.g2.com/categories/zero-trust-platforms)


---
## Reviewer Demographics

### By Company Size

| Segment | SentinelOne Singularity Endpoint | ThreatLocker Allowlisting | 
|---|---|---|
| **Small-Business** | 17.5% | 53.8% | 
| **Mid-Market** | 45.4% | 33.0% | 
| **Enterprise** | 37.1% | 13.2% | 

### By Industry

#### SentinelOne Singularity Endpoint

- **Information Technology and Services:** 14.0%
- **Computer &amp; Network Security:** 8.3%
- **Hospital &amp; Health Care:** 5.7%
- **Financial Services:** 5.2%
- **Automotive:** 4.7%
- **Government Administration:** 4.1%
- **Computer Software:** 3.6%
- **Education Management:** 3.1%
- **Health, Wellness and Fitness:** 3.1%
- **Retail:** 3.1%
- **Other:** 45.1%

#### ThreatLocker Allowlisting

- **Information Technology and Services:** 34.0%
- **Computer &amp; Network Security:** 18.5%
- **Hospital &amp; Health Care:** 4.2%
- **Financial Services:** 3.6%
- **Accounting:** 2.7%
- **Government Administration:** 2.7%
- **Computer Networking:** 2.4%
- **Insurance:** 2.1%
- **Oil &amp; Energy:** 2.1%
- **Manufacturing:** 2.1%
- **Other:** 25.7%

---
## Alternatives

### Alternatives to SentinelOne Singularity Endpoint

- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) — 4.7/5 stars (402 reviews)
- [Cynet](https://www.g2.com/products/cynet/reviews) — 4.7/5 stars (250 reviews)
- [Check Point Harmony Endpoint](https://www.g2.com/products/check-point-harmony-endpoint/reviews) — 4.5/5 stars (284 reviews)
- [ThreatDown](https://www.g2.com/products/threatdown/reviews) — 4.6/5 stars (1083 reviews)
- [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews) — 4.6/5 stars (976 reviews)
- [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews) — 4.7/5 stars (825 reviews)
- [Trellix Endpoint Security](https://www.g2.com/products/trellix-endpoint-security/reviews) — 4.3/5 stars (327 reviews)
- [Bitdefender GravityZone XDR](https://www.g2.com/products/bitdefender-gravityzone-xdr/reviews) — 4.0/5 stars (85 reviews)
- [Microsoft Defender for Endpoint](https://www.g2.com/products/microsoft-defender-for-endpoint/reviews) — 4.4/5 stars (310 reviews)
- [FortiClient](https://www.g2.com/products/forticlient/reviews) — 4.4/5 stars (274 reviews)

### Alternatives to ThreatLocker Allowlisting

- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) — 4.7/5 stars (402 reviews)
- [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews) — 4.7/5 stars (825 reviews)
- [ThreatDown](https://www.g2.com/products/threatdown/reviews) — 4.6/5 stars (1083 reviews)
- [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews) — 4.6/5 stars (976 reviews)
- [Huntress Managed EDR](https://www.g2.com/products/huntress-managed-edr/reviews) — 4.9/5 stars (883 reviews)
- [Microsoft Defender for Endpoint](https://www.g2.com/products/microsoft-defender-for-endpoint/reviews) — 4.4/5 stars (310 reviews)
- [Webroot Business Endpoint Protection](https://www.g2.com/products/webroot-business-endpoint-protection/reviews) — 4.5/5 stars (532 reviews)
- [Carbon Black Cloud](https://www.g2.com/products/carbon-black-cloud/reviews) — 4.1/5 stars (39 reviews)
- [Sophos MDR](https://www.g2.com/products/sophos-mdr/reviews) — 4.7/5 stars (506 reviews)
- [Symantec End-user Endpoint Security](https://www.g2.com/products/symantec-end-user-endpoint-security/reviews) — 4.4/5 stars (553 reviews)

---
## Top Discussions

### SentinelOne Singularity Endpoint

- Title: [Does SentinelOne protect me while I am disconnected from the internet (such as during traveling)?](https://www.g2.com/discussions/does-sentinelone-protect-me-while-i-am-disconnected-from-the-internet-such-as-during-traveling) — 3 comments, 1 upvote *(includes official response)*
  > **Top comment:** "Yes, the client will protect against malware threats when the device is disconnected from the internet. However, the administrative visibility and..."
- Title: [Will SentinelOne slow down my system?](https://www.g2.com/discussions/will-sentinelone-slow-down-my-system) — 3 comments, 1 upvote *(includes official response)*
  > **Top comment:** "The SentinelOne client uses a small amount of system resources and should not impact your daily activities."
- Title: [Is SentinelOne an antivirus?](https://www.g2.com/discussions/is-sentinelone-an-antivirus) — 2 comments
  > **Top comment:** "Yes, it&#39;s EDR + EPP, so it covers the same functionality as an Antivirus, just much better with additional functionality that an Antivirus doesn&#39;t provide..."
- Title: [What is SentinelOne used for?](https://www.g2.com/discussions/what-is-sentinelone-used-for) — 2 comments
  > **Top comment:** "Malware protection - Malware Detection and Response for endpoints and servers."
- Title: [Will SentinelOne protect me against ransomware?](https://www.g2.com/discussions/will-sentinelone-protect-me-against-ransomware) — 2 comments, 1 upvote *(includes official response)*
  > **Top comment:** "Yes, SentinelOne will recognize the behaviors of ransomware and prevent it from encrypting files. Additionally, if SentinelOne is not able to recover the..."

### ThreatLocker Allowlisting

- Title: [Does ThreatLocker work on Mac?](https://www.g2.com/discussions/does-threatlocker-work-on-mac) — 2 comments, 1 upvote
  > **Top comment:** "Yes. There is a MAC agent "
- Title: [What is the function of application whitelisting?](https://www.g2.com/discussions/what-is-the-function-of-application-whitelisting) — 1 comment
  > **Top comment:** "Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker&#39;s..."
- Title: [What does ThreatLocker do?](https://www.g2.com/discussions/what-does-threatlocker-do) — 1 comment
  > **Top comment:** "Threatlocker does application whitelisting &amp; application ringfencing. Application Whitelisting only allows known &amp; tested applications to run on your..."

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/sentinelone-singularity-endpoint-vs-threatlocker-allowlisting)

