Try our new research platform with insights from 80,000+ expert users

Hillstone Security Audit Platform vs SentinelOne Singularity Cloud Security comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Hillstone Security Audit Pl...
Ranking in Vulnerability Management
66th
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
No ranking in other categories
SentinelOne Singularity Clo...
Ranking in Vulnerability Management
6th
Average Rating
8.6
Number of Reviews
87
Ranking in other categories
Cloud and Data Center Security (5th), Container Security (5th), Cloud Workload Protection Platforms (CWPP) (5th), Cloud Security Posture Management (CSPM) (4th), Cloud-Native Application Protection Platforms (CNAPP) (4th), Compliance Management (4th)
 

Mindshare comparison

As of September 2024, in the Vulnerability Management category, the mindshare of Hillstone Security Audit Platform is 0.0%, down from 0.1% compared to the previous year. The mindshare of SentinelOne Singularity Cloud Security is 0.8%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management
 

Featured Reviews

Use Hillstone Security Audit Platform?
Share your opinion
Ashraf Razi - PeerSpot reviewer
Jul 22, 2024
Scans all devices on a network, automates remediation, and is user-friendly
Any security incident or malware detection is reported to security administrators within a fraction of a second. Basic rules and AI detections drive this rapid response. For example, suppose a file is flagged as suspicious based on its activity and alignment with the MITRE ATT&CK framework. In that case, the system identifies the file's behavior, categorizes it according to MITRE attackers, generates AI-based responses, and provides insights to security administrators for review and further investigation. Automated remediation is highly effective, responding in mere fractions of a second to block, quarantine, or contain affected files or devices. Additionally, it can isolate endpoints from the network to prevent malware from spreading or containing compromised systems. The Ranger feature is not exclusive to Linux systems. It scans all devices on a network, providing information about the types of machines and operating systems present within that specific network environment. Workload telemetry visibility is valuable during incident response, triage, and analysis. Detailed information about the process is provided when an incident is reported, offering deep insights. For example, if a file is flagged as malware, the entire process behind its execution, including accessed files and invoked processes, is displayed. This comprehensive history effectively aids in determining file behavior and accurately classifying it as benign or malicious. The benefits of SentinelOne Singularity Cloud Security are immediately visible through the quick response time. The mean time to detection is under half a second. The mean time to remediate is between one and one and a half seconds. It provides an automated response, eliminating the need to block and investigate files manually. SentinelOne Singularity immediately blocks suspicious files, and subsequent investigation allows us to whitelist the file completely or maintain the block.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pricing and Cost Advice

Information not available
"PingSafe falls somewhere in the middle price range, neither particularly cheap nor expensive."
"PingSafe falls within the typical price range for cloud security platforms."
"It's a fair price for what you get. We are happy with the price as it stands."
"The pricing for PingSafe in India was more reasonable than other competitors."
"I am not involved in the pricing, but it is cost-effective."
"As a partner, we receive a discount on the licenses."
"It is not that expensive. There are some tools that are double the cost of PingSafe. It is good on the pricing side."
"Its pricing was a little less than other providers."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
800,688 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
19%
Financial Services Firm
15%
Manufacturing Company
10%
Insurance Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features.
What is your experience regarding pricing and costs for PingSafe?
The price depends on the extension of the solution that you want to buy. If you want to buy just EDR, the price is less. XDR is a little bit more expensive. There are going to be different add-ons ...
What needs improvement with PingSafe?
I request that SentinelOne investigate this false positive, as SentinelOne has a higher false positive rate than other XDR solutions. While false positives are an expected part of incident response...
 

Also Known As

No data available
PingSafe
 

Overview

Find out what your peers are saying about Tenable, Qualys, Wiz and others in Vulnerability Management. Updated: August 2024.
800,688 professionals have used our research since 2012.