Find out what your peers are saying about Palo Alto Networks, Wiz, SentinelOne and others in Container Security.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
If I had to ask for anything to make it easier, it would be signed images that are GPG signed and a public repository where we can get the bits from.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
As soon as we need to add somebody, we just add them to NinjaOne, and then we have a script set up where it automatically deploys and adds them to whichever group we need.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
The price was very, very important to us, and it came down to the price when we were doing our evaluations WatchGuard and SentinelOne.
Covering our 50,000 endpoints would have nearly bankrupted most security programs, even well-funded ones like ours.
In my experience, there has been 100 percent uptime.
SentinelOne Singularity Cloud is incredibly reliable.
The cloud console is very resilient.
The real-time detection and response capabilities of SentinelOne Singularity Cloud impressive because it is a platform that uses artificial intelligence to determine what is normal and what is abnormal and can lock down any virus it may encounter.
We were shown how ransomware can be immediately stopped in real-time. That was huge.
Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks.
SentinelOne Singularity Cloud Security protects cloud workloads, offering advanced threat detection and automated response. It integrates seamlessly with cloud environments and secures containerized applications and virtual machines against vulnerabilities.
SentinelOne Singularity Cloud Security is renowned for its efficiency in mitigating threats in real-time. The platform integrates effortlessly with existing cloud environments, ensuring robust cloud security management with minimal manual intervention. Securing containerized applications and virtual machines, it excels in threat intelligence and endpoint protection. However, improvements are needed in performance during high workload periods, and more integrations with third-party tools and better documentation would be beneficial. Users often find the installation process complex, support response times slow, and the dashboard's navigation unintuitive.
What are the key features of SentinelOne Singularity Cloud Security?In specific industries, SentinelOne Singularity Cloud Security is implemented to safeguard critical data and infrastructure. Organizations in finance, healthcare, and technology depend on its real-time threat detection and automated response to protect sensitive information. Its ability to secure containerized applications and virtual machines is particularly valuable in dynamic environments where rapid scaling is necessary.
Panoptica is used for monitoring and managing data security, providing real-time insights into potential vulnerabilities. It assists in compliance tracking, helping maintain regulatory standards. Users value its integration capabilities, extensive reporting features, and high scalability.
Panoptica is a robust data security solution known for its real-time threat detection and comprehensive analytics tools. Users appreciate its seamless integration with existing systems and detailed reporting functions. The ease of deployment and scalability make it suitable for organizations of different sizes. High regard is given to Panoptica's incident response tools, which are crucial for maintaining network integrity and performance. Areas for improvement include stability during high traffic periods, better integration with other tools, and faster customer support. While its documentation could be more comprehensive, users find the learning curve steep and mention occasional glitches. Increased customization options would enhance its versatility.
What are the most valuable features of Panoptica?In industries such as finance, healthcare, and technology, Panoptica is implemented to enhance data security and ensure compliance with strict regulatory requirements. Its ability to provide real-time threat alerts and detailed analytics is especially valuable in these sectors. Organizations leverage Panoptica's extensive reporting functions for regular audits and reviews, facilitating a streamlined approach to security management. The solution's scalability and ease of integration allow it to be effective in both large corporations and smaller enterprises, adapting to their specific security and compliance needs.
Portshift Kubernetes Security is increasingly utilized for securing Kubernetes clusters, providing effective policy enforcement, monitoring, and compliance checks. It integrates seamlessly into existing environments, offering strong visibility and control over workloads, and efficiently manages container security.
Portshift Kubernetes Security provides comprehensive policy enforcement, real-time threat detection, and detailed visibility into Kubernetes clusters. Users appreciate its ease of deployment, robust API support, and automation capabilities that enhance operational efficiency. It effectively identifies vulnerabilities, although there is a need for improved configurability, integration capabilities, and scalability. Additionally, users seek better documentation for advanced features to maximize utilization.
What are the key features?Portshift Kubernetes Security is implemented across industries such as finance, healthcare, and technology, where protecting sensitive data is crucial. In finance, it offers secure transactions and data protection, while in healthcare, it ensures patient data privacy and compliance with regulations. The tech industry uses it to safeguard intellectual property and maintain continuous service delivery.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.