Ratings and Reviews 6 Ratings

Total
ease
features
design
support

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Alternatives to Consider

  • Wiz Reviews & Ratings
    1,101 Ratings
    Company Website
  • Orca Security Reviews & Ratings
    493 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    90 Ratings
    Company Website
  • Blumira Reviews & Ratings
    145 Ratings
    Company Website
  • Adaptive Security Reviews & Ratings
    83 Ratings
    Company Website
  • Kasm Workspaces Reviews & Ratings
    125 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,195 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    140 Ratings
    Company Website
  • Guardz Reviews & Ratings
    105 Ratings
    Company Website
  • Graylog Reviews & Ratings
    385 Ratings
    Company Website

What is SentinelOne Singularity?

An exceptionally groundbreaking platform. Unrivaled speed. Infinite scalability. Singularityâ„¢ delivers unmatched visibility, premium detection features, and autonomous response systems. Discover the power of AI-enhanced cybersecurity that encompasses the whole organization. The leading enterprises globally depend on the Singularity platform to detect, prevent, and manage cyber threats with astonishing rapidity, expansive reach, and improved accuracy across endpoints, cloud infrastructures, and identity oversight. SentinelOne provides cutting-edge security through this innovative platform, effectively protecting against malware, exploits, and scripts. Designed to meet industry security standards, the SentinelOne cloud-based solution offers high performance across diverse operating systems such as Windows, Mac, and Linux. With its ongoing updates, proactive threat hunting, and behavioral AI capabilities, the platform is adept at addressing any new threats, guaranteeing thorough protection. Additionally, its flexible design empowers organizations to remain ahead of cybercriminals in a continuously changing threat environment, making it an essential tool for modern cybersecurity strategies.

What is OpenText Core Endpoint Protection?

OpenText Core Endpoint Protection is a modern, cloud-powered security solution built to defend organizations from escalating threats such as ransomware, phishing, and zero-day exploits. It leverages advanced machine learning and the extensive OpenText Threat Intelligence network to detect malicious behavior as it happens and automatically intervene. The platform continuously analyzes processes, network activity, and file behaviors to identify abnormalities that signal an attack. Administrators gain centralized, cloud-based control over every endpoint, enabling policy enforcement, monitoring, and incident response from anywhere. Simple policy templates and tight RMM integrations reduce complexity, making deployment and management fast and efficient. When suspicious activity is detected, teams can isolate devices instantly and visualize the event chain to support detailed investigations. For organizations needing expanded capabilities, OpenText Core Endpoint Protection works in tandem with OpenText Core EDR to deliver deeper telemetry, root-cause analysis, and automated response workflows. End users benefit from quiet, unobtrusive protection, while IT leaders gain assurance that systems remain secure without performance drops. The platform supports compliance readiness by enforcing consistent security standards across distributed environments. Overall, OpenText Core Endpoint Protection helps businesses minimize downtime, reduce risk, and maintain resilience in the face of rapidly evolving cyber threats.

Media

Media

Integrations Supported

CYREBRO
NinjaOne
PC Matic
Arista NDR
Avalor
BrightGauge
ConnectWise PSA
Cybraics
Cyclops
Daylight
FortiSandbox
ISO2HANDLE
Intezer Analyze
Medigate
OverSOC
Recovery Point
Rewst
ScaleOps
VirtualArmour

Integrations Supported

CYREBRO
NinjaOne
PC Matic
Arista NDR
Avalor
BrightGauge
ConnectWise PSA
Cybraics
Cyclops
Daylight
FortiSandbox
ISO2HANDLE
Intezer Analyze
Medigate
OverSOC
Recovery Point
Rewst
ScaleOps
VirtualArmour

API Availability

Has API

API Availability

Has API

Pricing Information

$45 per user per year
Free Trial Offered?
Free Version

Pricing Information

$30 per year
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

SentinelOne

Date Founded

2013

Company Location

United States

Company Website

www.sentinelone.com

Company Facts

Organization Name

OpenText

Date Founded

1991

Company Location

Canada

Company Website

cybersecurity.opentext.com/products/threat-detection/endpoint-protection/

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Categories and Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Popular Alternatives

Popular Alternatives

Criminal IP Reviews & Ratings

Criminal IP

AI SPERA
CrowdStrike Falcon Reviews & Ratings

CrowdStrike Falcon

CrowdStrike
CrowdStrike Falcon Reviews & Ratings

CrowdStrike Falcon

CrowdStrike