Sie haben eine Sicherheitsverletzung festgestellt?

See the Difference

Talk to an expert and discover why customers across all industries and sizes choose SentinelOne over Palo Alto Networks.

3 Reasons Why Customers Choose

SentinelOne vs Palo Alto Networks

S1Homepage Desktop InnovationCard
Visibility Icon
Proven EDR Performance & Value
Palo Alto Networks fails to detect targeted attacks as proven each year during the MITRE Engenuity ATT&CK Evaluations. In contrast, SentinelOne provided 99% visibility and had the highest analytics coverage without a single delay.
S1Homepage Desktop InnovationCard
Maximize Time Icon
Designed to Maximize Your Time
Palo Alto Networks delays your responsiveness to malicious activity by requiring extensive tuning. SentinelOne streamlines the process from end to end through automation and application of AI.
S1Homepage Desktop InnovationCard
Protection Icon
Protection from What You Know, and What You Don’t
Palo Alto Networks depends heavily on cloud access and file signatures sourced from third parties to identify attacks. SentinelOne leverages both static and behavioral AI engines to detect anomalous activity & modern attacks with or without cloud connectivity.

Backed by the Industry

Tried and Trusted by the Industry’s Leading Authorities, Analysts, and Associations.

Gartner Primary Logo WHT
ENDPOINT PROTECTION PLATFORMS

  • A Leader in the 2023 Magic Quadrant for Endpoint Protection Platforms

MITRE Engenuity Logo WHT
RECORD BREAKING ATT&CK EVALUATION

  • 100% Protection. 100% Detection.
  • Top Analytic Coverage 3 Years in a Row
  • 100% Real-time with Zero Delays

Gartner Peer Insights 2023 Hp
96% WOULD RECOMMEND FOR EDR AND EPP

  • 4.8/5 Rating for Endpoint Protection Platforms and Endpoint Detection & Response Platforms

Trusted by the Best

The World’s Leading & Largest Organizations Choose Singularity XDR

Logogrid Samsung 1
Logogrid EA 2
Logogrid Mckesson 1
Logogrid EsteeLauder 1

Konzipiert für die Abwehr zukünftiger Bedrohungen –

Endpunkte und Cloud sind Speicherorte für Ihre sensibelsten Daten. Schützen Sie Ihre wichtigsten Ressourcen vor Cyber-Attacken. Verstärken Sie die gesamte Netzwerkperipherie mit autonomem Echtzeit-Schutz.

Entschuldigung
Leider ist der Inhalt dieser Seite in Ihrer Sprache nicht verfügbar. Sie sehen die englische Seite.