# ThreatLocker Allowlisting, Wazuh vs SentinelOne Singularity Endpoint Comparison

| | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Star Rating** | 4.8 out of 5 | 4.5 out of 5 | 4.7 out of 5 | 
| **Total Reviews** | 474 | 69 | 201 | 
| **Largest Market Segment** | Small-Business (53.8% of reviews) | Small-Business (51.5% of reviews) | Mid-Market (45.4% of reviews) | 
| **Entry Level Price** | Free Trial | No pricing available | Contact Us | 

---
## Top Pros & Cons

### ThreatLocker Allowlisting

Pros:
- Customer Support (92 reviews)
- Threat Detection (87 reviews)

Cons:
- Learning Curve (44 reviews)
- Difficult Learning Curve (30 reviews)

### Wazuh

Pros:
- Ease of Use (3 reviews)
- Affordable (2 reviews)

Cons:
- Complex Interface (2 reviews)
- Not User-Friendly (2 reviews)

### SentinelOne Singularity Endpoint

Pros:
- Ease of Use (16 reviews)
- Features (11 reviews)

Cons:
- Learning Curve (4 reviews)
- Not User-Friendly (4 reviews)

---
## Ratings Comparison
| Rating | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
  | **Meets Requirements** | 9.5 (147 reviews) | 8.7 (51 reviews) | 9.3 (170 reviews) | 
  | **Ease of Use** | 8.4 (289 reviews) | 8.7 (51 reviews) | 8.9 (168 reviews) | 
  | **Ease of Setup** | 8.6 (275 reviews) | 8.0 (32 reviews) | 8.9 (143 reviews) | 
  | **Ease of Admin** | 8.6 (138 reviews) | 8.6 (28 reviews) | 8.9 (142 reviews) | 
  | **Quality of Support** | 9.7 (145 reviews) | 8.3 (49 reviews) | 8.9 (164 reviews) | 
  | **Has the product been a good partner in doing business?** | 9.7 (136 reviews) | 8.5 (23 reviews) | 9.3 (138 reviews) | 
  | **Product Direction (% positive)** | 9.7 (140 reviews) | 9.0 (48 reviews) | 9.8 (165 reviews) | 

---
## Pricing

### ThreatLocker Allowlisting

#### Entry-Level Pricing

Plan: Enterprise

Price: Free Trial

Description: ThreatLocker enables IT teams to control the applications that run on their machines, and stop these applications from being exploited and weaponized. We give IT teams total control to manage and define what is, and what is not allowed, to run on their machines. 

Key Features:
- Allowlisting
- Ringfencing
- Zero Trust Cloud Access

[Browse all 2 editions](https://www.g2.com/products/threatlocker-allowlisting/pricing)

#### Free Trial

Yes

### Wazuh

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### SentinelOne Singularity Endpoint

#### Entry-Level Pricing

Plan: Singularity Core

Price: Contact Us

Description: Singularity Core is the foundation of all SentinelOne endpoint security offerings to replace legacy AV or NGAV with a more effective and easily managed EPP. Core includes static and behavioral AI engines to detect a wide range of attacks. Our autonomous Sentinel Agent applies protection and detection right at the endpoint, with or without a cloud connection.

Key Features:
- On-agent Storyline™
- On-agent static AI
- On-agent Behavioral AI

[Browse all 3 editions](https://www.g2.com/products/sentinelone-singularity-endpoint/pricing)

#### Free Trial

Yes

---
## Features Comparison By Category

### Zero Trust Networking

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | 7.9/10 | 8 |
| **Wazuh** | N/A | N/A |
| **SentinelOne Singularity Endpoint** | N/A | N/A |

#### Network Management

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Network Segmentation** | Feature Not Available | Not enough data | Not enough data | 
| **Network Mapping** | Feature Not Available | Not enough data | Not enough data | 
| **Security Analytics** | 8.1 (7 reviews) | Not enough data | Not enough data | 
| **API/Integrations** | 6.9 (6 reviews) | Not enough data | Not enough data | 

#### Security

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Security Automation** | 8.5 (8 reviews) | Not enough data | Not enough data | 
| **Application Security** | 8.1 (7 reviews) | Not enough data | Not enough data | 
| **Workload Protection** | 7.8 (6 reviews) | Not enough data | Not enough data | 
| **Data Protection** | 8.1 (7 reviews) | Not enough data | Not enough data | 

#### Identity Management

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Adaptive Access Control** | 8.6 (7 reviews) | Not enough data | Not enough data | 
| **Identity Scoring** | 7.1 (7 reviews) | Not enough data | Not enough data | 
| **User Monitoring** | 8.3 (7 reviews) | Not enough data | Not enough data | 

#### Generative AI

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **AI Text Summarization** | Feature Not Available | Not enough data | Not enough data | 
| **AI Text Generation** | Feature Not Available | Not enough data | Not enough data | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | N/A | N/A |
| **Wazuh** | N/A | N/A |
| **SentinelOne Singularity Endpoint** | 8.0/10 | 29 |

#### Performance

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Issue Tracking** | Not enough data | Not enough data | 9.0 (28 reviews) | 
| **Detection Rate** | Not enough data | Not enough data | 9.5 (29 reviews) | 
| **False Positives** | Not enough data | Not enough data | 7.4 (29 reviews) | 
| **Automated Scans** | Not enough data | Not enough data | 8.7 (29 reviews) | 

#### Network

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Compliance Testing** | Not enough data | Not enough data | 8.1 (26 reviews) | 
| **Perimeter Scanning** | Not enough data | Not enough data | 8.1 (26 reviews) | 
| **Configuration Monitoring** | Not enough data | Not enough data | 7.6 (26 reviews) | 

#### Application

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Manual Application Testing** | Not enough data | Not enough data | 7.6 (23 reviews) | 
| **Static Code Analysis** | Not enough data | Not enough data | 7.0 (23 reviews) | 
| **Black Box Testing** | Not enough data | Not enough data | 7.3 (21 reviews) | 

#### Agentic AI - Vulnerability Scanner

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 

### Endpoint Protection Platforms

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | N/A | N/A |
| **Wazuh** | N/A | N/A |
| **SentinelOne Singularity Endpoint** | 9.3/10 | 42 |

#### Administration

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Compliance** | Not enough data | Not enough data | Feature Not Available | 
| **Web Control** | Not enough data | Not enough data | Feature Not Available | 
| **Application Control** | Not enough data | Not enough data | Feature Not Available | 
| **Asset Management** | Not enough data | Not enough data | 8.6 (30 reviews) | 
| **Device Control** | Not enough data | Not enough data | 9.4 (32 reviews) | 

#### Functionality

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **System Isolation** | Not enough data | Not enough data | 9.6 (33 reviews) | 
| **Firewall** | Not enough data | Not enough data | 9.1 (31 reviews) | 
| **Endpoint Intelligence** | Not enough data | Not enough data | 9.4 (36 reviews) | 
| **Malware Detection** | Not enough data | Not enough data | 9.4 (35 reviews) | 

#### Analysis

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Automated Remediation** | Not enough data | Not enough data | 9.4 (37 reviews) | 
| **Incident Reports** | Not enough data | Not enough data | 9.2 (34 reviews) | 
| **Behavioral Analysis** | Not enough data | Not enough data | 9.6 (34 reviews) | 

### Extended Detection and Response (XDR) Platforms

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | N/A | N/A |
| **Wazuh** | N/A | N/A |
| **SentinelOne Singularity Endpoint** | 9.4/10 | 49 |

#### Detection &amp; Response

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Response Automation** | Not enough data | Not enough data | 9.4 (45 reviews) | 
| **Threat Hunting** | Not enough data | Not enough data | 9.4 (44 reviews) | 
| **Rule-Based Detection** | Not enough data | Not enough data | 9.1 (41 reviews) | 
| **Real-Time Detection** | Not enough data | Not enough data | 9.8 (44 reviews) | 

#### Management

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Extensibility** | Not enough data | Not enough data | Feature Not Available | 
| **Workflow Automation** | Not enough data | Not enough data | Feature Not Available | 
| **Unified Visibility** | Not enough data | Not enough data | Feature Not Available | 

#### Analytics

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Threat Intelligence** | Not enough data | Not enough data | 9.3 (48 reviews) | 
| **Artificial Intelligence &amp; Machine Learning** | Not enough data | Not enough data | 9.3 (46 reviews) | 
| **Data Collection** | Not enough data | Not enough data | 9.4 (46 reviews) | 

#### Agentic AI - Extended Detection and Response (XDR) Platforms

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | Not enough data | 

#### Services - Extended Detection and Response (XDR)

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Managed Services** | Not enough data | Not enough data | Not enough data | 

### Identity Threat Detection and Response (ITDR)

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | N/A | N/A |
| **Wazuh** | N/A | N/A |
| **SentinelOne Singularity Endpoint** | 9.1/10 | 15 |

#### Monitoring

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Investigate** | Not enough data | Not enough data | 9.4 (15 reviews) | 
| **Monitoring** | Not enough data | Not enough data | 9.1 (15 reviews) | 
| **Misconfigurations** | Not enough data | Not enough data | 8.7 (13 reviews) | 
| **Integrate** | Not enough data | Not enough data | 9.7 (15 reviews) | 
| **Visability** | Not enough data | Not enough data | 9.2 (15 reviews) | 

#### Remediation

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Remediation** | Not enough data | Not enough data | 9.0 (15 reviews) | 
| **Audit** | Not enough data | Not enough data | 8.9 (15 reviews) | 

### Antivirus

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | N/A | N/A |
| **Wazuh** | N/A | N/A |
| **SentinelOne Singularity Endpoint** | 7.5/10 | 56 |

#### Generative AI

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **AI Text Generation** | Not enough data | Not enough data | 7.4 (46 reviews) | 
| **AI Text Summarization** | Not enough data | Not enough data | 7.7 (47 reviews) | 

### Endpoint Management

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | N/A | N/A |
| **Wazuh** | N/A | N/A |
| **SentinelOne Singularity Endpoint** | 8.2/10 | 28 |

#### Generative AI

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **AI Text Summarization** | Not enough data | Not enough data | 8.1 (26 reviews) | 

### Zero Trust Platforms

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | 8.9/10 | 11 |
| **Wazuh** | N/A | N/A |
| **SentinelOne Singularity Endpoint** | N/A | N/A |

#### Identity and Access Management - Zero Trust Platforms

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Single sign-on (SSO)** | 7.0 (5 reviews) | Not enough data | Not enough data | 
| **Multi-factor authentication (MFA)** | Not enough data | Not enough data | Not enough data | 
| **Role-based access control (RBAC)** | Not enough data | Not enough data | Not enough data | 
| **Identity federation** | Not enough data | Not enough data | Not enough data | 

#### Security - Zero Trust Platforms

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Encryption** | Not enough data | Not enough data | Not enough data | 
| **Endpoint detection and response (EDR)** | 9.0 (5 reviews) | Not enough data | Not enough data | 
| **Device posture assessment** | Not enough data | Not enough data | Not enough data | 
| **Micro-segmentation** | Not enough data | Not enough data | Not enough data | 
| **Zero trust network access (ZTNA)** | Not enough data | Not enough data | Not enough data | 

#### Data Security - Zero Trust Platforms

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Data loss prevention (DLP)** | Not enough data | Not enough data | Not enough data | 
| **Data classification** | Not enough data | Not enough data | Not enough data | 

#### Application Visibility - Zero Trust Platforms

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **API support** | Not enough data | Not enough data | Not enough data | 
| **Application-level controls** | 9.4 (6 reviews) | Not enough data | Not enough data | 
| **Secure application access** | Not enough data | Not enough data | Not enough data | 
| **User and entity behavior analytics (UEBA)** | Not enough data | Not enough data | Not enough data | 
| **Continuous monitoring** | 9.0 (5 reviews) | Not enough data | Not enough data | 

#### Reporting and Policies - Zero Trust Platforms

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Policy automation** | 9.0 (5 reviews) | Not enough data | Not enough data | 
| **Regulatory compliance** | 9.3 (5 reviews) | Not enough data | Not enough data | 
| **Cross-platform compatibility** | Not enough data | Not enough data | Not enough data | 
| **Policy enforcement** | 9.4 (6 reviews) | Not enough data | Not enough data | 
| **Comprehensive reporting** | Not enough data | Not enough data | Not enough data | 

#### Agentic AI - Zero Trust Platforms

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 

### Endpoint Detection &amp; Response (EDR)

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | N/A | N/A |
| **Wazuh** | N/A | N/A |
| **SentinelOne Singularity Endpoint** | 9.0/10 | 7 |

#### Services - Endpoint Detection &amp; Response (EDR) 

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Managed Services** | Not enough data | Not enough data | 9.0 (7 reviews) | 

### Incident Response

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | N/A | N/A |
| **Wazuh** | 8.0/10 | 30 |
| **SentinelOne Singularity Endpoint** | N/A | N/A |

#### Response

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Resolution Automation** | Not enough data | 7.9 (24 reviews) | Not enough data | 
| **Resolution Guidance** | Not enough data | 7.9 (23 reviews) | Not enough data | 
| **System Isolation** | Not enough data | 7.8 (22 reviews) | Not enough data | 
| **Threat Intelligence** | Not enough data | 8.5 (26 reviews) | Not enough data | 
| **Incident Investigation** | Not enough data | Not enough data | Not enough data | 

#### Records

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Incident Logs** | Not enough data | 9.1 (28 reviews) | Not enough data | 
| **Incident Reports** | Not enough data | 8.3 (26 reviews) | Not enough data | 

#### Management

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Incident Alerts** | Not enough data | 8.8 (26 reviews) | Not enough data | 
| **Incident Case Management** | Not enough data | 7.9 (21 reviews) | Not enough data | 
| **Workflow Management** | Not enough data | 8.0 (22 reviews) | Not enough data | 

#### Generative AI

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **AI Text Generation** | Not enough data | 7.0 (10 reviews) | Not enough data | 
| **AI Text Summarization** | Not enough data | 6.7 (10 reviews) | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | N/A | N/A |
| **Wazuh** | N/A | N/A |
| **SentinelOne Singularity Endpoint** | N/A | N/A |

#### Cloud Visibility

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | Not enough data | 

#### Security

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Data Security** | Not enough data | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | Not enough data | 

#### Identity

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **SSO** | Not enough data | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | Not enough data | 

### Endpoint Protection

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | N/A | N/A |
| **Wazuh** | N/A | N/A |
| **SentinelOne Singularity Endpoint** | N/A | N/A |

#### System Control

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Device Control** | Not enough data | Not enough data | Not enough data | 
| **Web Control** | Not enough data | Not enough data | Not enough data | 
| **Application Control** | Not enough data | Not enough data | Not enough data | 
| **Asset Management** | Not enough data | Not enough data | Not enough data | 
| **System Isolation** | Not enough data | Not enough data | Not enough data | 

#### Vulnerability Prevention

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Endpoint Intelligence** | Not enough data | Not enough data | Not enough data | 
| **Firewall** | Not enough data | Not enough data | Not enough data | 
| **Malware Detection** | Not enough data | Not enough data | Not enough data | 

#### Security Management

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Incident Reports** | Not enough data | Not enough data | Not enough data | 
| **Security Validation** | Not enough data | Not enough data | Not enough data | 
| **Compliance ** | Not enough data | Not enough data | Not enough data | 

### Deception Technology

| Product | Score | Reviews |
|---|---|---|
| **ThreatLocker Allowlisting** | N/A | N/A |
| **Wazuh** | N/A | N/A |
| **SentinelOne Singularity Endpoint** | 8.4/10 | 9 |

#### Incident Management

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Forensics** | Not enough data | Not enough data | 8.9 (9 reviews) | 
| **Threat Intelligence** | Not enough data | Not enough data | 9.1 (9 reviews) | 
| **Response Automation** | Not enough data | Not enough data | 9.0 (8 reviews) | 

#### Generative AI

| Feature | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **AI Text Summarization** | Not enough data | Not enough data | 6.4 (6 reviews) | 

---
## Categories

**Unique to ThreatLocker Allowlisting (2):** [Zero Trust Networking Software](https://www.g2.com/categories/zero-trust-networking), [Zero Trust Platforms](https://www.g2.com/categories/zero-trust-platforms)

**Unique to Wazuh (2):** [Endpoint Detection &amp; Response (EDR) Software](https://www.g2.com/categories/endpoint-detection-response-edr), [Incident Response Software](https://www.g2.com/categories/incident-response)

**Unique to SentinelOne Singularity Endpoint (9):** [Identity Threat Detection and Response (ITDR)  Software](https://www.g2.com/categories/identity-threat-detection-and-response-itdr), [Extended Detection and Response (XDR) Platforms](https://www.g2.com/categories/extended-detection-and-response-xdr-platforms), [Deception Technology Software](https://www.g2.com/categories/deception-technology), [Endpoint Protection Platforms](https://www.g2.com/categories/endpoint-protection-platforms), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner), [Endpoint Management Software](https://www.g2.com/categories/endpoint-management), [Antivirus Software](https://www.g2.com/categories/antivirus), [Endpoint Detection &amp; Response (EDR) Software](https://www.g2.com/categories/endpoint-detection-response-edr), [Incident Response Software](https://www.g2.com/categories/incident-response)


---
## Reviewer Demographics

### By Company Size

| Segment | ThreatLocker Allowlisting | Wazuh | SentinelOne Singularity Endpoint | 
|---|---|---|---|
| **Small-Business** | 53.8% | 51.5% | 17.5% | 
| **Mid-Market** | 33.0% | 34.8% | 45.4% | 
| **Enterprise** | 13.2% | 13.6% | 37.1% | 

### By Industry

#### ThreatLocker Allowlisting

- **Information Technology and Services:** 34.0%
- **Computer &amp; Network Security:** 18.5%
- **Hospital &amp; Health Care:** 4.2%
- **Financial Services:** 3.6%
- **Accounting:** 2.7%
- **Government Administration:** 2.7%
- **Computer Networking:** 2.4%
- **Insurance:** 2.1%
- **Oil &amp; Energy:** 2.1%
- **Manufacturing:** 2.1%
- **Other:** 25.7%

#### Wazuh

- **Information Technology and Services:** 37.9%
- **Computer &amp; Network Security:** 21.2%
- **Computer Software:** 10.6%
- **Security and Investigations:** 4.5%
- **Hospital &amp; Health Care:** 4.5%
- **Financial Services:** 3.0%
- **Apparel &amp; Fashion:** 3.0%
- **Accounting:** 3.0%
- **Utilities:** 1.5%
- **Military:** 1.5%
- **Other:** 9.1%

#### SentinelOne Singularity Endpoint

- **Information Technology and Services:** 14.0%
- **Computer &amp; Network Security:** 8.3%
- **Hospital &amp; Health Care:** 5.7%
- **Financial Services:** 5.2%
- **Automotive:** 4.7%
- **Government Administration:** 4.1%
- **Computer Software:** 3.6%
- **Education Management:** 3.1%
- **Health, Wellness and Fitness:** 3.1%
- **Retail:** 3.1%
- **Other:** 45.1%

---
## Alternatives

### Alternatives to ThreatLocker Allowlisting

- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) — 4.7/5 stars (405 reviews)
- [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews) — 4.7/5 stars (826 reviews)
- [ThreatDown](https://www.g2.com/products/threatdown/reviews) — 4.6/5 stars (1083 reviews)
- [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews) — 4.6/5 stars (973 reviews)
- [Huntress Managed EDR](https://www.g2.com/products/huntress-managed-edr/reviews) — 4.9/5 stars (883 reviews)
- [Microsoft Defender for Endpoint](https://www.g2.com/products/microsoft-defender-for-endpoint/reviews) — 4.4/5 stars (310 reviews)
- [Webroot Business Endpoint Protection](https://www.g2.com/products/webroot-business-endpoint-protection/reviews) — 4.5/5 stars (532 reviews)
- [Carbon Black Cloud](https://www.g2.com/products/carbon-black-cloud/reviews) — 4.1/5 stars (39 reviews)
- [Sophos MDR](https://www.g2.com/products/sophos-mdr/reviews) — 4.7/5 stars (506 reviews)
- [Symantec End-user Endpoint Security](https://www.g2.com/products/symantec-end-user-endpoint-security/reviews) — 4.4/5 stars (553 reviews)

### Alternatives to Wazuh

- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) — 4.7/5 stars (405 reviews)
- [IBM QRadar SIEM](https://www.g2.com/products/ibm-ibm-qradar-siem/reviews) — 4.4/5 stars (335 reviews)
- [CrowdSec](https://www.g2.com/products/crowdsec/reviews) — 4.7/5 stars (87 reviews)
- [Carbon Black EDR](https://www.g2.com/products/carbon-black-edr/reviews) — 4.4/5 stars (86 reviews)
- [Huntress Managed EDR](https://www.g2.com/products/huntress-managed-edr/reviews) — 4.9/5 stars (883 reviews)
- [Cortex XDR](https://www.g2.com/products/palo-alto-networks-cortex-xdr/reviews) — 4.6/5 stars (53 reviews)
- [Microsoft Defender for Endpoint](https://www.g2.com/products/microsoft-defender-for-endpoint/reviews) — 4.4/5 stars (310 reviews)
- [Cynet](https://www.g2.com/products/cynet/reviews) — 4.7/5 stars (250 reviews)
- [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews) — 4.7/5 stars (826 reviews)
- [TheHive](https://www.g2.com/products/thehive/reviews) — 4.3/5 stars (18 reviews)

### Alternatives to SentinelOne Singularity Endpoint

- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) — 4.7/5 stars (405 reviews)
- [Cynet](https://www.g2.com/products/cynet/reviews) — 4.7/5 stars (250 reviews)
- [Check Point Harmony Endpoint](https://www.g2.com/products/check-point-harmony-endpoint/reviews) — 4.5/5 stars (284 reviews)
- [ThreatDown](https://www.g2.com/products/threatdown/reviews) — 4.6/5 stars (1083 reviews)
- [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews) — 4.6/5 stars (973 reviews)
- [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews) — 4.7/5 stars (826 reviews)
- [Trellix Endpoint Security](https://www.g2.com/products/trellix-endpoint-security/reviews) — 4.3/5 stars (327 reviews)
- [Bitdefender GravityZone XDR](https://www.g2.com/products/bitdefender-gravityzone-xdr/reviews) — 4.0/5 stars (85 reviews)
- [Microsoft Defender for Endpoint](https://www.g2.com/products/microsoft-defender-for-endpoint/reviews) — 4.4/5 stars (310 reviews)
- [FortiClient](https://www.g2.com/products/forticlient/reviews) — 4.4/5 stars (274 reviews)

---
## Top Discussions

### ThreatLocker Allowlisting

- Title: [Does ThreatLocker work on Mac?](https://www.g2.com/discussions/does-threatlocker-work-on-mac) — 2 comments, 1 upvote
  > **Top comment:** "Yes. There is a MAC agent "
- Title: [What is the function of application whitelisting?](https://www.g2.com/discussions/what-is-the-function-of-application-whitelisting) — 1 comment
  > **Top comment:** "Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker&#39;s..."
- Title: [What does ThreatLocker do?](https://www.g2.com/discussions/what-does-threatlocker-do) — 1 comment
  > **Top comment:** "Threatlocker does application whitelisting &amp; application ringfencing. Application Whitelisting only allows known &amp; tested applications to run on your..."

### Wazuh

- Title: [What is Wazuh - The Open Source Security Platform used for?](https://www.g2.com/discussions/what-is-wazuh-the-open-source-security-platform-used-for) — 1 comment
  > **Top comment:** "We use wazuh in Amazon AWS to monitor virtual machines and cloud instances.
Apart from it it can be used for endpoint security, we just need to install an..."

### SentinelOne Singularity Endpoint

- Title: [Does SentinelOne protect me while I am disconnected from the internet (such as during traveling)?](https://www.g2.com/discussions/does-sentinelone-protect-me-while-i-am-disconnected-from-the-internet-such-as-during-traveling) — 3 comments, 1 upvote *(includes official response)*
  > **Top comment:** "Yes, the client will protect against malware threats when the device is disconnected from the internet. However, the administrative visibility and..."
- Title: [Will SentinelOne slow down my system?](https://www.g2.com/discussions/will-sentinelone-slow-down-my-system) — 3 comments, 1 upvote *(includes official response)*
  > **Top comment:** "The SentinelOne client uses a small amount of system resources and should not impact your daily activities."
- Title: [Is SentinelOne an antivirus?](https://www.g2.com/discussions/is-sentinelone-an-antivirus) — 2 comments
  > **Top comment:** "Yes, it&#39;s EDR + EPP, so it covers the same functionality as an Antivirus, just much better with additional functionality that an Antivirus doesn&#39;t provide..."
- Title: [What is SentinelOne used for?](https://www.g2.com/discussions/what-is-sentinelone-used-for) — 2 comments
  > **Top comment:** "Malware protection - Malware Detection and Response for endpoints and servers."
- Title: [Will SentinelOne protect me against ransomware?](https://www.g2.com/discussions/will-sentinelone-protect-me-against-ransomware) — 2 comments, 1 upvote *(includes official response)*
  > **Top comment:** "Yes, SentinelOne will recognize the behaviors of ransomware and prevent it from encrypting files. Additionally, if SentinelOne is not able to recover the..."

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/threatlocker-allowlisting-vs-wazuh-vs-sentinelone-singularity-endpoint)

