Try our new research platform with insights from 80,000+ expert users

Google Cloud Security Command Center vs Prevasio comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Security Posture Management (CSPM)
3rd
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
3rd
Average Rating
8.8
Reviews Sentiment
7.8
Number of Reviews
109
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Compliance Management (2nd)
Google Cloud Security Comma...
Ranking in Cloud Security Posture Management (CSPM)
24th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
19th
Average Rating
7.4
Reviews Sentiment
7.1
Number of Reviews
3
Ranking in other categories
No ranking in other categories
Prevasio
Ranking in Cloud Security Posture Management (CSPM)
39th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
28th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
10
Ranking in other categories
Container Monitoring (11th)
 

Mindshare comparison

As of April 2025, in the Cloud-Native Application Protection Platforms (CNAPP) category, the mindshare of SentinelOne Singularity Cloud Security is 3.1%, up from 1.2% compared to the previous year. The mindshare of Google Cloud Security Command Center is 1.9%, up from 0.3% compared to the previous year. The mindshare of Prevasio is 0.1%, down from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud-Native Application Protection Platforms (CNAPP)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Nishant_Mishra - PeerSpot reviewer
Provides visibility, address cloud misconfiguration and prevent threats
In terms of identifying, the solution is pretty good. It takes care of all the layers. We have Cloud, Kubernetes cluster, instances running, and network. We have identities, permissions, and access. It provides pictures of everything in GCP. There's no such integration required. There are Google APIs that you need to enable. The compliance reporting feature helped us maintain a baseline of compliance within the information security policies. It's pretty stable and scalable. However, visibility can be improved along with automation. SCC to provide an option to fix those things, perhaps by clicking a button. For example, if a firewall rule allows an application to accept HTTP traffic, I should be able to address that specific issue directly within the interface. It's just a regular call to action button. There are no prerequisites for the solution. It's a requirement to have good security visibility into your Google Cloud Infrastructure. Cloud Security Command Center could be a good product to consider. There are other open-source solutions available. There are solutions from Aqua that are pretty decent. I would recommend that if somebody is opting for SCC, they should also explore open-source solutions. Open-source solutions can be very beneficial, especially if they are pursuing a multi-cloud strategy. You won't need additional security tools for platforms like AWS or others. Whenever a security issue pops up, a generative AI backend provides a summary of what happened. The information provided is quite detailed. Overall, I rate the solution an eight out of ten.
Reviewer75941 - PeerSpot reviewer
An excellent, intelligent tool that is helpful for finding duplicate rules
AFA is helpful when finding duplicate rules, subnets, and policies for your ports that have not been used in the last six months. It also helps to find out which ports have been opened for all firewalls. After that, we run the reports and share them with the customer. After getting approval from the customer, if there is a block on a particular port or ports not used in a current environment, Analyzer is helpful when placing the change request of the users. In this case, AlgoSec provides the link to the user who raises the request though the automation, which is the change request. From that change request, it comes through our ticketing tools, e.g., BMC Remedy. Then, we have to check and approve it. Once it gets approved, we deploy the particular policies, as per the user's request. It provides visibility for the risk. Whenever unnecessary ports have been opened in our environment, whether by mistake or human error, a support ticket gets opened so we can find out about it in an easy way. After that, we can implement or block the particular ports if they are not necessary for the organization's production. The solution has become more helpful during the cleanup rules for the firewall, when we do those activities twice a month. For example, if a user raises a request two to three months ago, then we forget to block the particular port by human error. During the client's cleanup workshop, we can make things clearer, which is more useful for us when cleaning up unnecessary rules and ports from the firewall. AlgoSec enables us to manage these hybrid environments in a single pane of glass. It is an excellent, intelligent tool. The console is user-friendly for understanding and implementing things on firewalls. It is helpful for finding duplicate rules.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We really appreciate the Slack integration. When we have an incident, we get an instant notification. We also use Joe Sandbox, which Singularity can integrate with, so we can verify if a threat is legitimate."
"For Singularity, the task capability is easy to use and it has a very intuitive dashboard, which streamlines the processes."
"The cooperative nature of SentinelOne has influenced our decision not to shift."
"The compliance monitoring feature of SentinelOne Singularity Cloud Security gives us a report with a compliance score to ensure we meet certain regulatory standards."
"PingSafe offers three key features: vulnerability management notifications, cloud configuration assistance, and security scanning."
"The Offensive Security Engine, powered by impressive AI/ML capabilities, seamlessly integrates with cloud infrastructure to analyze data and provide optimal security solutions."
"The user-friendliness is the most valuable feature."
"With PingSafe, it's easy to onboard new accounts."
"Most people use the threat detection dashboard."
"It simplifies compliance efforts."
"The compliance reporting feature helped us maintain a baseline of compliance within the information security policies."
"AlgoSec has good tools to manage policies and devices. Many administrators like how it helps you monitor and clean up the policy for the on-premise firewall."
"The firewall policy summarization is the most valuable feature. It helps us to cross-check the firewall ruleset. That's the main purpose of it. And of course, it monitors changes of the firewall policy. It provides full visibility into the risk involved in firewall change requests. It helps us to check for any integrity issues and conflicts with other rulesets, and of course the compliance."
"We have used the solution to implement and manage microsegmentation initiatives. That is the whole point of modeling towards, "Hey, how will this work for a specific situation in the end?" I think it's a great solution because a lot of companies are not just going to the cloud, but microsegmentation and service-delivered products. So, I feel like it is very capable and comparatively better than its peers, if not equal."
"The most unique feature is the ability to help fix any gaps or mismatches in the configuration of the firewall."
"Because we get about 60 to 70 rules to deploy a week during the firewall maintenance window, we might create some duplicate rules or open duplicate ports. AlgoSec has become very helpful whenever we need to find out the nodes or subnets that have already been created, then we don't need to create the duplicate subnet of that particular IP address."
"We have Check Point, Palo Alto, and FortiGate firewalls, and it integrates pretty seamlessly with these firewalls. We have had no issues so far."
"The workflow and the fact that I can follow up on a request that I've created and clearly see the status it is in are the most valuable features of this solution. When I need things to move on, for example, if the security guys didn't look at the request or the implementation is not going as it should, then I can contact people. There is a mechanism in there that clearly indicates the service level agreement we have for implementation. We can see if it is being attained."
"The most valuable feature is the automation that can be accomplished by using scripts. If we didn't have AlgoSec, I would have to do everything manually."
 

Cons

"It took us a while to configure the software to work well in this type of environment, as the support documents were not always clear."
"We can customize security policies but lack auditing capabilities."
"We use PingSafe and also SentinelOne. If PingSafe integrated some of the endpoint security features of SentinelOne, it would be the perfect one-stop solution for everything. We wouldn't need to switch between the products. At my organization, I am responsible for endpoint security and vulnerability management. Integrating both functions into one application would be ideal because I could see all the alerts, heat maps, and reports in one console."
"The categorization of the results from the vulnerability assessment could be improved."
"One of the issues with the product stems from the fact that it clubs different resources under one ticket."
"Some of the navigation and some aspects of the portal may be a little bit confusing."
"The Infrastructure as Code service available in PingSafe and the services available in AWS cloud security can be merged so that we can get the security data directly from AWS cloud in PingSafe. This way, all the data related to security will be in one single place. Currently, we have to check a couple of things on PingSafe, and we have to validate that same data on the AWS Cloud to be sure. If they can collaborate like that, it will be great."
"For vulnerabilities, they are showing CVE ID. The naming convention should be better so that it indicates the container where a vulnerability is present. Currently, they are only showing CVE ID, but the same CVE ID might be present in multiple containers. We would like to have the container name so that we can easily fix the issue."
"Visibility can be improved along with automation."
"The AI capabilities have been heavily promoted, but I haven't seen a significant impact."
"We work with multiple security vendors. It's rather difficult to integrate the vendors. AlgoSec is a platform that hasn't really been developed as much as we would like to just because of its complexity to set up. If it was easy to set up and easy to get integrations with other companies, then we would be doing it. But the thought is that we are relatively stretched thin in our team as it is and the complexity of configuring AlgoSec doesn't make it any easier."
"The API integration could potentially improve. I didn't get a chance to look and see how well this solution can integrate with ServiceNow or our GRC environment."
"There is a little bit of scope for improvement in the risk profiles that come with the AlgoSec Firewall Analyzer module. Currently, AlgoSec provides only three standard zones within a risk profile. These standard zones are external, internal, and DMZ. Everybody's network is divided into different zones within a data center, but AlgoSec only provides three zones. This is a limitation that I see for the risk profile analysis. If there was an option to customize these zones, it would be great."
"Now that we've moved to the VM it is more stable and independent of hardware."
"When we send multiple requests across at once, sometimes it causes errors and FireFlow gets stuck. In cases like this, we have to go back in and fix it."
"AlgoSec cannot be integrated with solutions that require two-step or multi-factor authentication. Embedding multi-factor authentication capability into the solution would be a valuable feature."
"Integration with Oracle on the cloud is not supported. I would also like to see integrations with network devices in Layer 2."
"In the new version H32, there are many, many bugs."
 

Pricing and Cost Advice

"The features included in PingSafe justify its price point."
"Singularity Cloud Security by SentinelOne is cost-efficient."
"The pricing is fair. It is not inexpensive, and it is also not expensive. When managing a large organization, it is going to be costly, but it meets the business needs. In terms of what is out there on the market, it is fair and comparable to what I have seen, so I do not have any complaints about the cost"
"SentinelOne is relatively cheap. If ten is the most expensive, I would rate it a seven."
"PingSafe falls somewhere in the middle price range, neither particularly cheap nor expensive."
"PingSafe is not very expensive compared to Prisma Cloud, but it's also not that cheap. However, because of its features, it makes sense to us as a company. It's fairly priced."
"The cost for PingSafe is average when compared to other CSPM tools."
"I understand that SentinelOne is a market leader, but the bill we received was astronomical."
"Initially, it used to be relatively expensive, starting at around four or five hundred dollars."
"I heard that the licensing was around $100,000 a year."
"For the South American market, the prices are very high."
report
Use our free recommendation engine to learn which Cloud-Native Application Protection Platforms (CNAPP) solutions are best for your needs.
846,617 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Computer Software Company
19%
Financial Services Firm
15%
Retailer
7%
University
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
It is cost-effective compared to other solutions in the market.
What needs improvement with PingSafe?
The documentation could be better. Besides improving the documentation, obtaining a professional or partner specializ...
What do you like most about Google Cloud Security Command Center?
The compliance reporting feature helped us maintain a baseline of compliance within the information security policies.
What is your primary use case for Google Cloud Security Command Center?
The primary use case is to monitor the Google Cloud infrastructure across all projects for security-related alerts. T...
Ask a question
Earn 20 points
 

Also Known As

PingSafe
No data available
No data available
 

Overview

Find out what your peers are saying about Google Cloud Security Command Center vs. Prevasio and other solutions. Updated: March 2025.
846,617 professionals have used our research since 2012.