Introducing G2.ai, the future of software buying.Try now

Compare SentinelOne Singularity and ThreatLocker

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
SentinelOne Singularity
SentinelOne Singularity
Star Rating
(187)4.7 out of 5
Market Segments
Mid-Market (44.2% of reviews)
Information
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 3 pricing plans
ThreatLocker
ThreatLocker
Star Rating
(284)4.8 out of 5
Market Segments
Small-Business (61.1% of reviews)
Information
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that SentinelOne Singularity excels in its Real-Time Detection capabilities, scoring 9.8, which reviewers mention provides immediate threat response, while ThreatLocker, with a score of 9.6, is noted for its strong System Isolation features that help in containing threats effectively.
  • Reviewers mention that SentinelOne's False Positives score of 7.5 indicates some challenges in distinguishing between legitimate and malicious activities, whereas ThreatLocker shines with a higher score in Application Control at 9.7, suggesting it has a more refined approach to managing application permissions.
  • G2 users highlight that SentinelOne's Automated Scans score of 8.7 is beneficial for routine checks, but users on G2 appreciate ThreatLocker's Compliance score of 9.6, indicating a stronger focus on regulatory adherence and security standards.
  • Users say that SentinelOne's Quality of Support is rated at 9.0, which is commendable, but reviewers mention that ThreatLocker outperforms with a score of 9.8, reflecting a more responsive and helpful support team.
  • Reviewers mention that SentinelOne's Proactive Threat Hunting feature scores 9.2, which is effective for identifying potential threats, while ThreatLocker’s Web Control at 8.4 is seen as less robust, indicating room for improvement in managing web-based threats.
  • Users report that SentinelOne's Generative AI features, particularly in AI Text Generation and AI Text Summarization, score lower than expected, with scores of 7.4 and 7.8 respectively, while ThreatLocker’s focus on Security Workflow Automation at 9.1 is praised for enhancing operational efficiency.
Featured Products
Pricing
Entry-Level Pricing
SentinelOne Singularity
Singularity Core
Contact Us
Browse all 3 pricing plans
ThreatLocker
Enterprise
Free Trial
Browse all 2 pricing plans
Free Trial
SentinelOne Singularity
Free Trial is available
ThreatLocker
Free Trial is available
Ratings
Meets Requirements
9.3
159
9.6
130
Ease of Use
9.0
156
8.4
236
Ease of Setup
8.9
130
8.5
224
Ease of Admin
9.0
134
8.6
124
Quality of Support
8.9
153
9.8
129
Has the product been a good partner in doing business?
9.2
131
9.7
123
Product Direction (% positive)
9.8
154
9.7
123
Features by Category
Not enough data
Not enough data
Network Management
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
7.9
27
Not enough data
Performance
9.1
27
Not enough data
9.4
27
Not enough data
7.3
27
Not enough data
8.8
27
Not enough data
Network
8.1
25
Not enough data
8.1
25
Not enough data
7.7
25
Not enough data
Application
7.4
22
Not enough data
7.1
22
Not enough data
7.3
20
Not enough data
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
9.4
34
8.8
49
Administration
Feature Not Available
9.2
47
Feature Not Available
8.3
42
Feature Not Available
9.6
47
8.5
26
8.1
45
9.4
26
8.5
48
Functionality
9.6
28
9.1
45
9.1
27
8.9
44
9.6
29
8.8
18
9.6
29
8.8
42
Analysis
9.5
31
Feature Not Available
9.3
31
7.7
19
9.6
32
8.4
46
Extended Detection and Response (XDR) PlatformsHide 13 FeaturesShow 13 Features
9.4
47
Not enough data
Detection & Response
9.3
43
Not enough data
9.3
43
Not enough data
9.1
41
Not enough data
9.8
42
Not enough data
Management
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Analytics
9.3
46
Not enough data
9.3
45
Not enough data
9.4
45
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
9.3
14
Not enough data
Monitoring
9.5
14
Not enough data
9.4
14
Not enough data
9.0
12
Not enough data
9.8
14
Not enough data
9.3
14
Not enough data
Remediation
9.3
14
Not enough data
9.3
14
Not enough data
Managed Detection and Response (MDR)Hide 8 FeaturesShow 8 Features
Not enough data
9.3
13
Platform Features
Not enough data
9.4
13
Not enough data
8.8
13
Not enough data
9.5
13
Not enough data
8.7
13
Not enough data
9.0
13
Not enough data
7.6
13
Automation Capabilities
Not enough data
8.2
13
Not enough data
8.1
13
7.6
53
Not enough data
Generative AI
7.5
44
Not enough data
7.7
44
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
8.1
28
Not enough data
Generative AI
8.1
26
Not enough data
Not enough data
Not enough data
Identity and Access Management - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Security - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Application Visibility - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting and Policies - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Zero Trust Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.0
14
Orchestration
Not enough data
9.0
14
Not enough data
9.0
14
Not enough data
9.0
14
Not enough data
9.5
14
Information
Not enough data
9.4
14
Not enough data
9.0
14
Not enough data
9.5
14
Personalization
Not enough data
9.3
14
Not enough data
9.0
14
Not enough data
8.5
14
Generative AI
Not enough data
7.7
8
Agentic AI - Threat Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Deception TechnologyHide 4 FeaturesShow 4 Features
8.4
9
Not enough data
Incident Management
8.9
9
Not enough data
9.1
9
Not enough data
9.0
8
Not enough data
Generative AI
6.4
6
Not enough data
Categories
Categories
Shared Categories
SentinelOne Singularity
SentinelOne Singularity
ThreatLocker
ThreatLocker
SentinelOne Singularity and ThreatLocker are categorized as Endpoint Protection Platforms and Endpoint Detection & Response (EDR)
Reviews
Reviewers' Company Size
SentinelOne Singularity
SentinelOne Singularity
Small-Business(50 or fewer emp.)
18.2%
Mid-Market(51-1000 emp.)
44.2%
Enterprise(> 1000 emp.)
37.6%
ThreatLocker
ThreatLocker
Small-Business(50 or fewer emp.)
61.1%
Mid-Market(51-1000 emp.)
32.2%
Enterprise(> 1000 emp.)
6.7%
Reviewers' Industry
SentinelOne Singularity
SentinelOne Singularity
Information Technology and Services
12.7%
Computer & Network Security
7.7%
Hospital & Health Care
6.1%
Financial Services
5.5%
Government Administration
4.4%
Other
63.5%
ThreatLocker
ThreatLocker
Information Technology and Services
36.7%
Computer & Network Security
19.1%
Hospital & Health Care
4.2%
Accounting
3.2%
Government Administration
2.8%
Other
33.9%
Most Helpful Reviews
SentinelOne Singularity
SentinelOne Singularity
Most Helpful Favorable Review
BS
Branson S.
Verified User in Computer Software

I love having complete visibility and control over the endpoints I manage through the management console.

Most Helpful Critical Review
AD
Andrew D.
Verified User in Computer & Network Security

When we first implemented SentinelOne, there was a faux malware attack spreading through out our network. Thanks to their great support, we resolved it to being an old AV software fighting sentinel one. However in that time we got Thousands of email...

ThreatLocker
ThreatLocker
Most Helpful Favorable Review
ZK
Zachary K.
Verified User in Computer Networking

I love that with ThreatLocker it puts you in 100% control of your applications and your storage, it's kind of like having an individual firewall or a ring around each one of your applications. This allows you to control everything this application/process...

Most Helpful Critical Review
TV
Teng V.
Verified User in Government Administration

The thing about ThreatLocker is the admin has to know what they're doing. If they don't it can be a major pain in the thorn for your team. So ask yourself, does my admin know what they're doing? If they don't, I would look for a more admin friendly platform.

Alternatives
SentinelOne Singularity
SentinelOne Singularity Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Cynet - All-in-One Cybersecurity Platform
Cynet - All-in-One Cybersecurity Platform
Add Cynet - All-in-One Cybersecurity Platform
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
ThreatLocker
ThreatLocker Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Discussions
SentinelOne Singularity
SentinelOne Singularity Discussions
Will SentinelOne slow down my system?
3 comments
Luis C.
LC
Nop, different to any other EDR, SentinelOne uses less than 100MB in memory and up to 200MB while running a scanRead more
Does SentinelOne protect me while I am disconnected from the internet (such as during traveling)?
3 comments
Luis C.
LC
Yes, SentinelOne only needs internet access to update the policies, there's a 24/7 protectionRead more
On which Operating Systems SentinelOne can run?
2 comments
Luis C.
LC
SentinelOne can run in Windows XP (as legacy agent) Windows 7, Windows 8, 8.1, 10, Linux, MacOS and kubernetsRead more
ThreatLocker
ThreatLocker Discussions
Does ThreatLocker work on Mac?
2 comments
Matt K.
MK
Yes, they have a Mac agentRead more
What does ThreatLocker do?
1 comment
MF
Threatlocker does application whitelisting & application ringfencing. Application Whitelisting only allows known & tested applications to run on your...Read more
What is the function of application whitelisting?
1 comment
Dimitri R.
DR
Application Whitelisting is the primary method you will use within ThreatLocker in order to allow approved applications to run on a system. ThreatLocker's...Read more