Overview
Product Information on Singularity Mobile
What is Singularity Mobile?
Singularity Mobile Pricing
Overall experience with Singularity Mobile
“A Reliable and Well Equipped Mobile Threat Defense Solution”
“Sentinel One Mobile Secure Yet Missing Comprehensive MDM Container Environment”
About Company
Company Description
SentinelOne provides autonomous security solutions for various IT environments. The company's main focus is on endpoint security, cloud security, and identity security. It operates on an AI-powered platform that brings prevention, detection, response, remediation, and forensics under one umbrella. The endpoint security product uses artificial intelligence to constantly adapt to new threats, offering real-time protection and automated response. The key principle of SentinelOne's security approach is to allow organizations to detect harmful behavior across multiple vectors, rapidly eliminate threats with an integrated response, and continuously adapt defenses against advanced cyber attacks. The company also provides a range of services such as threat hunting, incident response, and incident management.
Company Details
Do You Manage Peer Insights at SentinelOne?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About Singularity Mobile
Reviewer Insights for: Singularity Mobile
Performance of Singularity Mobile Across Market Features
Singularity Mobile Likes & Dislikes
Singularity Mobile comes with advanced threat protection. It prevents man in the middle type of attacks. Allows teams to use personal devices securely at work. I like that Singularity Mobile supports modern workspaces.
Its integration capabilities with our other MDM tools like VMware Workspace One and Microsoft Intune helps us provide security and manage the devices centrally.
Easy deployment, strong mobile threat protection and centralized visibility from a single console with minimal impact on end users.
With Singularity Mobile, no complaints.
There should be more features like MDM capabilities to build a container like environment and also profiles for work and home which will provide the fully integrated MDM solutions feature.
Limited advanced customization and reporting options, and some features could be more detailed for deeper mobile threat analysis.
Top Singularity Mobile Alternatives
Peer Discussions
Singularity Mobile Reviews and Ratings
- It Specialist50M-1B USDServices (non-Government)Review Source
A Reliable and Well Equipped Mobile Threat Defense Solution
The platform protects our mobile endpoints thereby mitigating threats thanks to its AI powered and real-time protection capabilities. With Singularity Mobile, we never worry about data breaches, phishing, malware or insider attacks. The tool secures mobile devices without invading user privacy, making it even better. - IT ADMINISTRATOR50M-1B USDSoftwareReview Source
Centralized Console Offers Enhanced Mobile Protection with Minimal Disruption to Users
It provides strong visibility and protection for mobile devices, with easy deployment and centralized management. Overall, it improves mobile security with minimal impact on users. - NETWORK ENGINEER50M-1B USDSoftwareReview Source
SentinelOne Singularity Mobile Delivers Effective AI-Driven Security Across Platforms
We like the strengths of SentinelOne Singularity Mobile as a high security, AI powered protection, privacy focused mobile security solution that delivers highly effective low impact protection across major platforms. Its AI driven on-device architecture and seamless integrationinto the broader XDR ecosystem. - NETWORK ADMIN50M-1B USDSoftwareReview Source
Efficient mobile endpoint protection with real-time alerts and simple policy management.
It Secure mobile devices effectively without disrupting user activity. - ISO AUDIT50M-1B USDBankingReview Source
Mobile Protection Extends Beyond Email With Emphasis on Actual Security Risks
very strong MTD solution to secure mobile endpoint seriously (not just office emails but real threats like malware , phishing and network attacks



