

XM Cyber and SentinelOne Singularity Cloud Security are competing in the cybersecurity category. SentinelOne seems to have the upper hand due to its advanced AI-based threat intelligence, offering more sophistication and comprehensive security coverage.
Features: XM Cyber is recognized for continuous vulnerability discovery, attack simulation, and remediation prioritization. SentinelOne Singularity provides endpoint protection, threat hunting capabilities, and automated response, along with cloud workload protection.
Room for Improvement: XM Cyber could enhance its threat detection capabilities, enhance real-time response features, and bolster AI integration. SentinelOne might benefit from simplifying its user interface, reducing the complexity of its deployment options, and providing more customization for threat alert management.
Ease of Deployment and Customer Service: XM Cyber is known for a straightforward deployment process with a focus on support to optimize remediation strategies. SentinelOne Singularity offers seamless cloud integration with extensive automation options. Its highly scalable deployment and robust support enhance its appeal for large-scale operations.
Pricing and ROI: XM Cyber is competitive with its cost-effective setup and ROI driven by risk reduction and operational efficiency. SentinelOne Singularity's higher initial cost is justified by its long-term ROI through reduced breach impact and improved security posture via advanced threat capabilities.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
It has saved us more than 50% of our time.
There was a specific issue that our other security tooling did not pick up, but XM Cyber did.
It's reduced the timescale to remediate vulnerabilities that are identified as representing a high risk.
Having a reliable team ready and willing to assist with any issues is essential.
Throughout the migration, they remained available for several hours without complaint, providing assistance at every step.
In my experience, I have never encountered a junior person or someone without knowledge coming into support from SentinelOne.
The customer support is fantastic; it's probably some of the best we've received across all our security vendors.
Customer support for XM Cyber is good, responsive, and it follows up on issues.
The SentinelOne Singularity Cloud exhibits high scalability.
We've automated in our MDM so any device that we start in our MDM automatically installs SentinelOne.
It is scalable. I would rate it a ten out of ten for scalability.
Its scalability is great; it's easy to deploy and fully scalable.
We have not experienced any issues with scalability or reached its limits.
SentinelOne Singularity Cloud is incredibly reliable.
The only downtime we had was when switching from V1 to V2 but it was smooth.
I would rate it a ten out of ten for stability.
We have quite a complex and large IT estate, and we've certainly experienced no limitations or problems arising from the ability of XM Cyber's product to scale across that estate.
If notifications are available, then it will be more helpful, easy, and time-saving.
Alerts should be directly tied to compliance standards and have a clear role in the overall compliance process.
The Infrastructure as Code service available in PingSafe and the services available in AWS cloud security can be merged so that we can get the security data directly from AWS cloud in PingSafe.
We push the boundaries with digital twins; I understand XM Cyber uses a similar concept of graph databases to map environments.
They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks.
The part that can be improved is the mobile exposure and the IBM i specific equipment.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
If you want to buy just EDR, the price is less. XDR is a little bit more expensive.
It should not be based on subscription. It should be based on the number of servers that I am scanning.
We have a large, complicated estate, and in the licensing discussions, we were keen not to have the cost balloon because of the complication, the number of PCs and servers that we have.
This tool has been helpful for us. It allows us to search for vulnerabilities and provides evidence directly on the screen.
The cloud misconfiguration feature gave us almost zero false positives.
PingSafe has sped up the process by 80% to 90%.
Our loss exposure amount has reduced significantly, leading to two big wins: our loss exposure amount has gone down, and we have direct savings from focusing our team's time on what's important, allowing them to work on other business benefits and generate value for the company.
By far, the best feature of XM Cyber is being able to map out the way vulnerabilities can be exploited based on what they call the choke points in the network where the path that a bad actor would take comes closest to assets within our environment that are most vulnerable but also most valuable.
XM Cyber allows us to quantify the risk, and we are able to track remediation, so we can quantify the risk at an executive level and also to a technical IT team.
| Product | Mindshare (%) |
|---|---|
| SentinelOne Singularity Cloud Security | 2.6% |
| XM Cyber | 1.0% |
| Other | 96.4% |


| Company Size | Count |
|---|---|
| Small Business | 52 |
| Midsize Enterprise | 22 |
| Large Enterprise | 58 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?
What benefits should users expect from SentinelOne Singularity Cloud Security?
SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
XM Cyber quantifies risk for different organizational levels, enhances patching by targeting choke points, and offers precise attack simulations, optimizing management time and vulnerability resolutions.
XM Cyber empowers organizations to identify significant risks by focusing on choke points and improving patching strategies. The platform excels in providing reliable and precise simulations, informing users about critical vulnerabilities without false positives. It enhances vulnerability management and internal reconnaissance, reducing loss exposure while supporting attack surface management. Users seek improved mobile exposure capabilities and IBM i specific solutions along with better visualization and AI integration.
What are the key features of XM Cyber?XM Cyber is deployed to manage risks in internet-exposed assets and hybrid cloud environments. Its implementation allows organizations to optimize IT resources by identifying vulnerabilities in critical attack paths, thus enhancing efficiency and supporting robust security strategies across industries.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.