Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

14 AWS reviews

External reviews

296 reviews
from and

External reviews are not included in the AWS star rating for the product.


5-star reviews ( Show all reviews )

    Romil T.

Best AI antivirus I have ever seen

  • April 04, 2024
  • Review provided by G2

What do you like best about the product?
It is an AI antivirus that monitors behavior. We use this everyday and is easy to implement. It detects any chances of getting infected and quarantines/kills malware right away. If someone tries to run a script from an elevated shell, it detects it within seconds. No one can remove it or disable it. It requires admin approval from the web console. You just click on the threat file from the web console, and we can see everything malicious about it. It has a deep visibility feature as well. Also, it offers seamless integration for ease of use.
What do you dislike about the product?
It might be annoying due to the number of false positives, but we can always whitelist the software if necessary. Once I had a real hard time to remove this software because it went into offline mode. I tried many things even contacted support to remove the software but no luck. We need to manually restart the devices in order to get latest update the antivirus.
What problems is the product solving and how is that benefiting you?
It solves advanced threat detection, provides unified endpoint security, offers real-time visibility, automates response and remediation, and integrates with existing security infrastructure, benefiting our school by enhancing security posture, reducing response times, and simplifying management.


    Jason P.

Best EDR we have used by far!

  • March 21, 2024
  • Review provided by G2

What do you like best about the product?
EDR that constantly updates without intervention. Scans attached drives, and computers when files are downloaded with automatically. Onboarding walks you step by step to get setup and using the portal quickly and efficiently. Support is always available. Threats are stopped automatically and restored back to normal if set to protection mode vs just detection mode.
What do you dislike about the product?
threat hunting has a lot of information to digest. If computers have small harddrives sometimes the agent is disabled because it cannot update the database file needed.
What problems is the product solving and how is that benefiting you?
EDR, protecting us from users downloading or bringing malicious programs/files into our environment.


    Kyle R.

Absolutely Love SentinelOne!

  • March 14, 2024
  • Review provided by G2

What do you like best about the product?
This is the best solution out on the market!
What do you dislike about the product?
SentinelOne blocks ALOT of batch files or "automated" processes which can be a pain at times but once you know how to exclude these, it makes it so much easier!
What problems is the product solving and how is that benefiting you?
Peace of mind knowing that any malware will be stopped immediately


    Shanmugasundaram P.

SentinelOne Singularity Endpoint & XDR

  • March 13, 2024
  • Review provided by G2

What do you like best about the product?
Easy to understand and use. It detects threats and provide visibility over the network. It also does threat hunting. Implementing it with other security devices is also feasible. SLA is upto mark and have strong customer support.
What do you dislike about the product?
New dashboard is a bit difficult to understand compared to the older versions.
What problems is the product solving and how is that benefiting you?
By using it across all platform from server to workstations, to MACs, to Windows, to Linux, VDI and embedded systems and on-premise. It improved operational efficiencies and saves time. Effortless operations are performed. Visibility over the network is better. Updated features gives an extra add on.


    Juan I.

S1 has been amazing

  • March 05, 2024
  • Review provided by G2

What do you like best about the product?
How easy it is to manage end points and complete responses.
What do you dislike about the product?
How it sometimes it flags legitimate software.
What problems is the product solving and how is that benefiting you?
We have a client that has in house IT tech that has in the past fallen for malicious software S1 has solved the issue.


    SUPPHAKORN SIPHUMI

Robust, good visibility, and easy deployment

  • March 05, 2024
  • Review provided by PeerSpot

What is our primary use case?

We are a system integrator. We are a SentinelOne partner, and we provide Singularity Complete to our customers.

How has it helped my organization?

Singularity Complete has helped to reduce alerts. There is about 50% reduction. It automatically generates alerts and can also solve a problem.

It has reduced the mean time to detect (MTTD). It has real-time detection, and it has been very good so far.

The mean time to respond (MTTR) has been reduced. We can respond to an incident in 10 to 15 minutes.

Singularity Complete saves costs for our customers. Its automation helps save money. There is a reduction in the operational costs.

It reduces the risk for the organization. They have an AI engine to detect new threats, such as Zero-day threats.

What is most valuable?

It is a robust solution. It provides great visibility. It scans and shows the vulnerabilities in our devices.

What needs improvement?

It is complicated to do certain tasks.

For how long have I used the solution?

I have been working with Singularity Complete for about one year.

What do I think about the stability of the solution?

It is stable. Our customers have not had any issues.

How are customer service and support?

I have not used their support so far.

Which solution did I use previously and why did I switch?

I have worked with Symantec and one more solution for endpoint protection. Singularity Complete has an AI engine. There is no need to download anything.

How was the initial setup?

It is very easy to deploy. It takes about a week.

What other advice do I have?

We are a partner of SentinelOne. We are happy with SentinelOne as our strategic security partner.

I would rate SentinelOne Singularity Complete a ten out of ten.


    Information Technology and Services

SentinelOne: Extremely Effective

  • February 28, 2024
  • Review provided by G2

What do you like best about the product?
The platform is extremely user friendly. The AI-Threat Hunting is extremely useful and has help us prevent disasters for many of our customers.
What do you dislike about the product?
Coming from a lesser AV, I do not have any complaints about S1.
What problems is the product solving and how is that benefiting you?
Blocking malicious files before they can infect computers. Holding files in quarantine until we can act on them.


    David M.

Great product, world leader

  • February 08, 2024
  • Review provided by G2

What do you like best about the product?
Great product , platform is easy to use and detection is powerful
What do you dislike about the product?
System reports aren't good enough, very few reports on high level data, mainly for managers
What problems is the product solving and how is that benefiting you?
Security of end points and servers


    Amit B.

SentinelOne is The Future of Endpoint Security

  • January 28, 2024
  • Review provided by G2

What do you like best about the product?
Proactive Hunting: The platform provides tools for security teams to proactively hunt for threats hidden within their network. This proactive approach can help prevent attacks before they happen. Rapid Response: Singularity can take action to respond to threats in seconds, reducing the time it takes to contain and mitigate an attack.
What do you dislike about the product?
Cost: As a comprehensive XDR solution, Singularity can be more expensive than traditional endpoint protection or EDR tools. Organizations on a tight budget might find it cost-prohibitive. Server cpu can be sometime very High , aroud 17%.
What problems is the product solving and how is that benefiting you?
Proactive threat hunting with Real-time threat detection using Automated incident response


    Bernhard Brandel

Robust security with efficient threat detection, minimal false positives and user-friendly features, empowering organizations to safeguard their systems effectively

  • December 22, 2023
  • Review provided by PeerSpot

What is our primary use case?

Our primary use cases involve Endpoint Detection and Response and Extended Detection and Response.

How has it helped my organization?

My positive experience with SentinelOne lies in its comprehensive version, allowing for rollback and replay of events, which is especially useful for EDR. The strength of behavior-based solutions like SentinelOne, CrowdStrike, CyberArk, and others lies in their ability to reveal the consequences of opening a file. Witnessing the impact of a virus gaining control over a computer or understanding the ramifications of opening a file adds a layer of insight.

It stands out for its seamless interoperability with other SentinelOne products and tools, facilitated by REST interfaces. This integration is particularly potent when connecting SentinelOne as an endpoint solution to firewalls like Fortinet, allowing the firewall to receive insights from SentinelOne clients. In today's landscape, where file transfers often occur through encrypted channels, traditional firewalls face challenges in inspecting these streams effectively. SentinelOne's endpoint security addresses this by analyzing downloaded files in their decrypted form, providing a crucial layer of protection. The bidirectional information flow between the firewall and endpoint security, enabled by SentinelOne's REST API, empowers proactive threat prevention and detection, contributing to a robust cybersecurity posture.

Utilizing SentinelOne has significantly reduced the number of alerts for us. We might have experienced more false positives and missed potential attacks without it. Its alert system is efficient, with a low rate of false positives compared to other solutions I've heard about. Managing alerts is straightforward, and the platform allows for creating white lists to handle false positives, such as those related to old printer drivers. The administration is user-friendly, offering features like multi-factor authentication for secure connections to the console and automatic updates within the SentinelOne interface.

It has proven to be a time-saver for our staff, significantly reducing the likelihood of falling victim to various cyber threats. By addressing the spectrum of attacks, from initial malware infiltration to potential worst-case scenarios like Active Directory compromise, SentinelOne has played a pivotal role. It effectively diminishes the probability of becoming a target for attacks that exploit stolen passwords, infiltrate the company's IT infrastructure, and escalate privileges, ultimately leading to severe consequences such as a randomized Active Directory.

What is most valuable?

The platform is user-friendly, easy to administer, and aligns well with GDPR requirements, which is crucial for us. What makes SentinelOne stand out is its speed and efficiency, consuming minimal computing resources. It operates by checking data only when it's accessed, synchronizing with the process that opens the data which is well-designed and effective.

I don't actively use SentinelOne's Ranger functionality because we haven't implemented it university-wide. While we've employed it in specific cases, my experience with it is limited. However, it provides valuable insights into past events, allowing you to trace the history of a virus download or malware activity. For instance, you might discover that a virus was downloaded two weeks ago using the Safari web browser, saved to the computer, and later opened with Excel, triggering certain actions before SentinelOne intervened. The ability to roll back such ransom actions is a valuable capability provided by SentinelOne.

What needs improvement?

It primarily operates on local machines, monitoring processes, and not always providing detailed insights, relying on external information to determine the nature of a file. This limitation becomes apparent in more complex scenarios, such as analyzing or assessing the content of files at the byte level, especially in cases involving files like Excel, where there may be some difficulty in discerning potential issues. They should consider incorporating a cloud-based service where users can upload suspicious links, documents like Excel sheets, or ambiguous files to observe their behavior in a sandbox environment. Currently, with SentinelOne, the process involves setting up a separate network and machine for this purpose, requiring users to upload the file and monitor its behavior on the dedicated machine. Offering a free and accessible service like this would be a noteworthy enhancement to their product, providing users with a convenient and efficient way to analyze potentially harmful content.

For how long have I used the solution?

I have been working with it for four years.

What do I think about the stability of the solution?

I would rate its stability capabilities ten out of ten.

What do I think about the scalability of the solution?

I would rate its scalability abilities nine out of ten.

How are customer service and support?

I am highly satisfied with their technical support; it is truly excellent. I would rate it ten out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Comparatively, SentinelOne has certain drawbacks, particularly when measured against CrowdStrike. CrowdStrike offers a free sandbox at hybrid-analysis.com, allowing the examination of links and downloaded files on a virtual machine. This proves especially valuable in assessing potential phishing emails. Uploading the file or link to hybrid-analysis.com provides a detailed analysis, complete with screenshots of what transpires on the virtual machine. This includes actions like the opening of links, prompting CEO impersonation attempts, and other background information. While SentinelOne may lack these specific features, its advantage lies in being an all-encompassing solution, whereas CrowdStrike functions primarily as a managed service, which may not align with specific preferences.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The deployment of Singularity Complete involved some consultation, as we collaborated with a partner who facilitated the onboarding process with SentinelOne. While the partner occasionally provides support, larger issues are infrequent, and overall, the deployment has been relatively smooth. We have implemented it across various locations. There is some maintenance involved in managing Singularity Complete.

What was our ROI?

It's challenging to quantify precisely, but the implementation of Singularity Complete has significantly reduced organizational risks. Currently, we employ it on critical systems, constituting approximately fifty percent of our infrastructure.

What other advice do I have?

Creating separate groups for various types of computers, like Windows servers and clients, enables efficient management and customization of security configurations tailored to specific needs. Overall, I would rate it ten out of ten.