Introducing G2.ai, the future of software buying.Try now
Tracebit
Sponsored
Tracebit
Visit Website
Product Avatar Image
SentinelOne Singularity Identity Detection & Response

By SentinelOne

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at SentinelOne Singularity Identity Detection & Response and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
5.0 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with SentinelOne Singularity Identity Detection & Response?

Tracebit
Sponsored
Tracebit
Visit Website
It's been two months since this profile received a new review
Leave a Review

SentinelOne Singularity Identity Detection & Response Reviews & Product Details

Product Avatar Image

Have you used SentinelOne Singularity Identity Detection & Response before?

Answer a few questions to help the SentinelOne Singularity Identity Detection & Response community

SentinelOne Singularity Identity Detection & Response Reviews (2)

Reviews

SentinelOne Singularity Identity Detection & Response Reviews (2)

5.0
2 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Manish R.
MR
Functional Tester
Small-Business (50 or fewer emp.)
"S1 - Incredibly Effective, Always Evolving Security tool"
What do you like best about SentinelOne Singularity Identity Detection & Response?

It is very easy to deployed on endpoints and even support legacy operating systems, which including Windows XP, 2003, and 2008.

It has very user friendly and attractive UI.

It automaticaly mitigate most of the threats but sometimes needs humam intervention.

S1 has Cloud-based console so security team can access it from anywhere.

Easy to take device offline remotely in order to isolate it from internet. Review collected by and hosted on G2.com.

What do you dislike about SentinelOne Singularity Identity Detection & Response?

I do not find any major difficulties while using it but when we need support, they are available in 3-4 hours. Review collected by and hosted on G2.com.

Prashant B.
PB
Network Security Engineer
Mid-Market (51-1000 emp.)
"Robust Security Tool"
What do you like best about SentinelOne Singularity Identity Detection & Response?

SentinelOne Singularity is a tool with the all-in-one capability to do all the security tasks on the same dashboard. Sentinel gives you complete visibility and real-time Threat Protection to Active Directory and Cloud AD Review collected by and hosted on G2.com.

What do you dislike about SentinelOne Singularity Identity Detection & Response?

Sentinel Singularity, from the Threat protection point of view, is acceptable and very effective, but from another point of view, like free trail and consulting, it's costly. Review collected by and hosted on G2.com.

There are not enough reviews of SentinelOne Singularity Identity Detection & Response for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
4.5
(1,033)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
2
Cisco Duo Logo
Cisco Duo
4.5
(427)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
3
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(332)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
4
ThreatLocker Platform Logo
ThreatLocker Platform
4.8
(292)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
5
Cynet - All-in-One Cybersecurity Platform Logo
Cynet - All-in-One Cybersecurity Platform
4.7
(245)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
6
Absolute Secure Access Logo
Absolute Secure Access
4.7
(224)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
7
FortiClient Logo
FortiClient
4.4
(211)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
8
Trend Vision One Logo
Trend Vision One
4.7
(210)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
9
IBM MaaS360 Logo
IBM MaaS360
4.2
(198)
Keep your business moving with mobile device management and security
10
GoodAccess Logo
GoodAccess
4.7
(160)
GoodAccess is a Zero Trust cybersecurity platform (SASE/SSE) built for medium-sized businesses (50–5000+ employees). It enables rapid, low-code/no-code deployment—without hardware or expert staff—to secure remote and hybrid teams. With identity-based access, BYOD protection, network segmentation, and full visibility, GoodAccess simplifies enterprise-grade security for modern, multi-cloud environments.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.