Try our new research platform with insights from 80,000+ expert users

AWS GuardDuty vs Cisco Secure Workload comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 12, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
118
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd), AI Software Development (1st), AI Observability (2nd)
AWS GuardDuty
Ranking in Cloud Workload Protection Platforms (CWPP)
2nd
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
25
Ranking in other categories
No ranking in other categories
Cisco Secure Workload
Ranking in Cloud Workload Protection Platforms (CWPP)
15th
Average Rating
8.6
Reviews Sentiment
7.7
Number of Reviews
15
Ranking in other categories
Cloud and Data Center Security (8th), Microsegmentation Software (4th), Cisco Security Portfolio (8th)
 

Mindshare comparison

As of February 2026, in the Cloud Workload Protection Platforms (CWPP) category, the mindshare of SentinelOne Singularity Cloud Security is 4.2%, up from 2.4% compared to the previous year. The mindshare of AWS GuardDuty is 14.5%, up from 12.4% compared to the previous year. The mindshare of Cisco Secure Workload is 2.4%, down from 3.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Workload Protection Platforms (CWPP) Market Share Distribution
ProductMarket Share (%)
AWS GuardDuty14.5%
SentinelOne Singularity Cloud Security4.2%
Cisco Secure Workload2.4%
Other78.9%
Cloud Workload Protection Platforms (CWPP)
 

Featured Reviews

SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.
SK
Senior IT Auditor at Ernst & Young
Has provided automated threat detection and daily malicious activity insights while supporting seamless orchestration with existing dashboards
I would assess the integration of AWS GuardDuty with Threat Intelligence as majorly positive; no threat intelligence is 100% accurate, and there are a few false positives, but as a security engineer, this must be accepted, and overall, the response and service is good for us. We do not directly use AWS GuardDuty dashboard by itself, as we have our own integrated security dashboard; AWS GuardDuty gives the feed to that dashboard, and it's giving us a satisfactory view of how the security landscape looks. We use metrics such as zero-day threats, any malicious traffic, and any traffic which originates from OFAC countries to measure its effectiveness, as we are majorly into a financial institution, as any traffic that is from a malicious IP or a rogue device. I don't see any significant negative points regarding AWS GuardDuty; it's a good product to have if you're a cloud consumer. I rate AWS GuardDuty nine out of ten overall.
Raj Metkar - PeerSpot reviewer
Director, Head of Networks at MUFG, EMEA
Discover internal application dependencies and create a dependency map
We actively seek improvements in integrating the Infoblox DDI platform with Cisco Secure Workload. This integration allows Cisco Secure Workload to learn about our networks and network tags, providing valuable insights into vulnerabilities related to the operating system and various applications installed on our servers. Recently, Cisco announced a new product called HyperShield, an AI-based autonomous micro-segmentation solution. While Cisco has not stated that HyperShield will replace Cisco Secure Workload, it represents a natural evolution for the company. HyperShield features dynamic policy discovery and enforcement; however, once policies are enforced, they do not change until a discovery occurs, requiring a re-enforcement process. This new platform operates autonomously, minimizing the need for user or security engineer intervention. I would have expected Cisco to incorporate more automatic discovery and enforcement features within the existing Cisco Secure Workload product. Instead of enhancing the current product, they have introduced a new solution. Cisco plans to honor existing Tetration licenses, allowing users to transition to HyperShield without additional costs, reflecting the investment enterprises have already made. From Cisco’s perspective, this represents a natural progression in their product line. While the product name changes, it seems more of a rebranding effort. The enhancements are greater autonomy, improved discovery, and automatic enforcement, which are now being introduced in HyperShield. Cisco Secure Workload offers automatic policy enforcement but cannot adjust policies dynamically as the application needs to change. Having used the platform for the past five years, the recent announcement has been reassuring. Cisco has confirmed that our investment in the platform will not go to waste. They will honor our existing licenses, providing a natural migration path to the new solution without any disruption

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Singularity Cloud Workload Security provides us with better security detection and more visibility. It is another resource that we can use to detect vulnerabilities in our company's systems. For example, it can help us detect new file processes that we are not familiar with, which could be used by attackers to exploit our systems. Singularity Cloud Workload Security can also help us diagnose and analyze data to determine whether it is malicious or not. Singularity Cloud Workload Security is like another pair of eyes that can help us protect our systems from cyberattacks."
"The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"I would definitely recommend SentinelOne Singularity Cloud Security for infrastructure security."
"The visibility is the best part of the solution."
"Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
"The most valuable feature is the notification system, providing real-time alerts and comparisons crucial for maintaining security."
"It integrates very well. We sell different products from different vendors. We know that the SentinelOne Singularity platform can be integrated with several different solutions from different vendors."
"It is fairly simple. Anybody can use it."
"The out-of-band malware detection from the EBS volumes. It's really cool. No agents or anything needed, it automatically finds and correlates based on malware."
"GuardDuty is extensive in terms of configuration and security compliance."
"The correlation back end is the solution's most valuable feature."
"We generally use AWS GuardDuty for detection of zero-day vulnerabilities and automatic threat responses; it serves as a SOAR, an orchestrated and automated response solution for us in the AWS platform."
"It is a highly scalable solution since it is a service by AWS. Scalability-wise, I rate the solution a ten out of ten."
"GuardDuty is extensive in terms of configuration and security compliance."
"What we found most valuable in Amazon GuardDuty is its threat detection feature, especially because we were monitoring a huge number of AWS accounts, so we needed a solution that would monitor for any kind of malicious activity. The monitoring aspect of the solution was great because it gave us timely notifications if and when anything happened, and Amazon GuardDuty helped keep us on our toes to make sure we took action right away."
"GuardDuty's comprehensive threat detection does not only monitor data - it also detects a wide range of security threats."
"The most valuable feature is micro-segmentation, which is the most important with respect to visibility."
"The product offers great visibility into the network so we can enforce security measures."
"The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network."
"Scalability is its most valuable feature."
"A complete and powerful micro-segmentation solution."
"The product provides multiple-device integration."
"Generally speaking, Cisco support is considered one of the best in the networking products and stack."
"It's stable."
 

Cons

"Maybe container runtime security could be improved."
"We can customize security policies but lack auditing capabilities."
"To enhance the notification system's efficiency, resolved issues should be promptly removed from the portal."
"We repeatedly get alerts on the tool dashboard that we've already solved on our end, but they still appear. That is somewhat irritating."
"The areas with room for improvement include the cost, which is higher compared to other security platforms. The dashboard can also be laggy."
"The cloud-based operations might pose challenges in areas with limited or unavailable internet connectivity. Desktop features might be useful for smaller organizations with less complex security needs."
"In version 2, a lot of rules have been deployed for Kubernetes security and CDR, which makes a lot of issues of critical severity, whereas they are not critical or of high severity. There is a mismatch of severities. They need to work on severity management."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"It would be great if the solution had some automation capabilities."
"GuardDuty is limited to AWS environments."
"Comparing AWS GuardDuty to similar products from Microsoft, Microsoft has a product called Sentinel, which is a completely integrated solution that basically does everything from vulnerability management to managing log analytics. This is something which AWS GuardDuty doesn't have since it's a separate service."
"It is evolving, and at the moment, I will just need it on a larger scale. Then, it will satisfy my demand, initially."
"AWS GuardDuty needs to be more customer-oriented."
"I think that some detections in container environments such as container runtime, and on services such as AWS container service, Fargate service or EKS service could be improved."
"Some of the pain points in Amazon GuardDuty was the cost. When compared to some of the other services, depending on how many we had to monitor, if we had a huge range of accounts, as our accounts increased, we had a cost factor that came into play. Sometimes there were issues, for example, with findings that came up, we wanted to add notes and there were issues back then where notes couldn't be entered properly. If we wanted to leave a note such as "Okay, we have assessed this and this is how we feel", or "This is a false positive", Amazon GuardDuty wasn't allowing us to do that. Even with the suppression of certain findings, there was some issue that we had faced at one time. Those were some of the pain points of the solution."
"Comparing AWS GuardDuty to similar products from Microsoft, Microsoft has a product called Sentinel, which is a completely integrated solution that basically does everything from vulnerability management to managing log analytics. This is something which AWS GuardDuty doesn't have since it's a separate service."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes."
"It is highly scalable, but there is a limitation that it is only available on Cisco devices."
"The interface is really helpful for technical people, but it is not user-friendly."
"The integration could be better, especially with different types of solutions."
"There's room for improvement when it comes to Cisco Secure Workload. A couple of internal areas could be refined a little bit. They are trying to solve it, depending on where you suppose the agent is. Suppose you have the agent on both the server and the client, which could be the front-end server or web server connecting to the. In that case, if those two are communicating on RPC, the server can look into its configuration. It could go down and find the configuration file on the FTP server and then set the policies to it. But there are a lot of different FTP servers out there. It's also a complex case for the tool to support all FTP servers."
"Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it."
"There was a controversy when Cisco reduced the amount of data they kept, and the solution became quite cost-intensive, which made its adoption challenging….Although they have modified it now, I preferred the previous version, and I wish all the functionality were back under the same product."
"I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications."
 

Pricing and Cost Advice

"I understand that SentinelOne is a market leader, but the bill we received was astronomical."
"PingSafe is cost-effective for the amount of infrastructure we have. It's reasonable for what they offer compared to our previous solution. It's at least 25 percent to 30 percent less."
"The cost for PingSafe is average when compared to other CSPM tools."
"The features included in PingSafe justify its price point."
"As a partner, we receive a discount on the licenses."
"The pricing tends to be high."
"Its pricing was a little less than other providers."
"Its pricing is constant. It has been constant over the previous year, so I am happy with it. However, price distribution can be better explained. That is the only area I am worried about. Otherwise, the pricing is very reasonable."
"The price of the solution is exactly right."
"I have heard that the solution's price is quite high."
"The platform is inexpensive."
"It can get very expensive. If you turn on every feature, it can turn into hundreds of thousands of dollars."
"The tool has no subscription charges."
"On a scale of one to ten, where one is a high price, and ten is a low price, I rate the pricing a four or five, which is somewhere in the middle."
"The pricing model is pay as you go and is based on the number of events per month."
"I don't have all the details in terms of licensing for Amazon GuardDuty, but my organization does have a license set up for it."
"Pricing depends on the scope of the application and the features. Larger installations save more."
"The pricing is a bit higher than we anticipated."
"The price is outrageous. If you have money to throw at the product, then do it."
"The price is based on how many computers you're going to install it on."
"It is not cheap and pricing may limit scalability."
"The cost for the hardware is around 300k."
"Regarding price, Cisco Secure Workload can be expensive if you don't have a budget. If you're not doing micro-segmentation, every extra security measure or enforcement you're putting on top of your existing environment will be an extra cost. It's not a cheap solution at all. But from my point of view, if you need to do micro-segmentation, this is one of the best tools I've seen for it. I can't compare that to Microsoft's solution because I haven't looked into it. I've looked into VMware and Cisco. Those are the only two that I know of. I didn't know that Microsoft could do micro-segmentation at all. Maybe they can, but I haven't heard anything about it."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
882,479 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
10%
Government
6%
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
9%
Government
6%
Manufacturing Company
13%
Computer Software Company
12%
Financial Services Firm
10%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business48
Midsize Enterprise22
Large Enterprise54
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise15
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise3
Large Enterprise8
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
Regarding the pricing for SentinelOne Singularity Cloud Security, I do not think it is something I can compare.
What needs improvement with PingSafe?
Regarding the downsides of cloud security, I do not have much negative to discuss about cloud security, because it is...
What do you like most about Amazon GuardDuty?
With anomaly detection, active threat monitoring, and set correlation, GuardDuty alerts me to any unusual user behavi...
What is your experience regarding pricing and costs for Amazon GuardDuty?
AWS GuardDuty is an expensive feature, and while you can't expect the price to be low, it can be lower because it's p...
What needs improvement with Amazon GuardDuty?
AWS GuardDuty is a good product; it's doing its job right now, and I don't see any additional improvements needed. Co...
What is your experience regarding pricing and costs for Cisco Secure Workload?
CloudStrike offers antivirus capabilities and firewall features for servers and VDI but lacks automatic policy discov...
What needs improvement with Cisco Secure Workload?
We actively seek improvements in integrating the Infoblox DDI platform with Cisco Secure Workload. This integration a...
What is your primary use case for Cisco Secure Workload?
When we onboarded Cisco Secure Workload, the usual use case was to discover internal application dependencies and cre...
 

Also Known As

PingSafe
No data available
Cisco Tetration
 

Overview

 

Sample Customers

Information Not Available
autodesk, mapbox, fico, webroot
ADP, University of North Carolina Charlotte (UNCC)
Find out what your peers are saying about AWS GuardDuty vs. Cisco Secure Workload and other solutions. Updated: February 2026.
882,479 professionals have used our research since 2012.