We use the product across all of our entities for EDR, threat detection, and response methods.
Global IT Security Administrator at a manufacturing company with 1,001-5,000 employees
Easy to use with good historical data and real-time detection
Pros and Cons
- "The ease of use of the platform is very nice."
- "Bugs need to be disclosed quickly."
What is our primary use case?
How has it helped my organization?
We wanted a solution for protection. We had a number of entities with various EDR solutions. We wanted to centralize under one EDR solution, and we wanted one that was efficient and easy to manage with a small team.
The biggest thing for us was getting to a single platform. A single pane of glass has been nice. The ability to segment various sites out. The R-Back involved is super helpful for us as we are a multi-company organization. In general, the time has been greatly reduced for incidents.
What is most valuable?
The ease of use of the platform is very nice. The console provides excellent visibility into events that occur and, in general, the wide range of tools that are built into the agent itself.
My impression of the product's real-time detection and response capabilities is good. It definitely is a little bit different. It takes a little bit more time to learn than some of the other solutions that we have worked with in the past. Once you do understand it and once you're capable of running through the GUI and you understand what the logs and various windows they're trying to tell you, it's fairly straightforward.
The solution's automated remediation is good. I like that you can segment it into four options. You can choose to kill it at any time in the kill chain, so you can choose to quarantine it, you can choose to remediate, you can choose to roll back, you can choose to let it run. Being able to choose how far along you want those events to get is pretty nice.
The historical data record provided by the solution after an attack is decent. It gives you a flowchart of the attack. All along the processes you get good visibility and see all that were detected. Definitely, from a post-incident analysis perspective, it's very strong.
The solution has helped reduce our organization's mean time to detect by 20% to 30%. Given that extra 20% to 30%, it frees us up to focus on other items.
The solution's impact on our organization's productivity is good. It provides robust whitelisting capabilities and improves our productivity.
What needs improvement?
Agent releases need to be more stable before being pushed out.
Bugs need to be disclosed quickly.
The reporting, and the logging visibility, are not there. It's very, very crude and simple. It needs to be drastically expanded.
They need to expand their third-party integrations with SIM tools, and sites need to be given the option to expire at the end of the contract as well.
They could expand their integration with Kubernetes. They are trying to build out their third-party integrations. It does work well on Windows and Mac.
Buyer's Guide
SentinelOne Singularity Cloud Security
October 2024
Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,562 professionals have used our research since 2012.
For how long have I used the solution?
I've used the product for three and a half years.
What do I think about the stability of the solution?
Agent stability and communication with the console and agents going offline can be an issue. It can be time-consuming to coordinate and fix. However, the cloud console is very resilient. It's mostly the agent releases where we might have issues. CrowdStrike agents seem a little more stable.
What do I think about the scalability of the solution?
We have about 3,000 users using the solution.
Scaling is no issue.
How are customer service and support?
Technical support is hit or miss. We have worked with some good agents and some less knowledgeable.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have used different solutions, including the fact that we still CrowdStrike at a couple of companies. We are now moving more fully towards SentinelOne.
The simplicity and ease of use were big and where SentinelOne stands out. It's a set-and-forget policy. Based on what we saw in testing, it was the best option.
In terms of telemetry data, we were all over the board.
How was the initial setup?
The initial setup was a little more complex when we first started. However, they've smoothed a lot of their implementation out and so it's gotten easier over time. It took us a couple of weeks to a month to deploy. About 20 were involved in the deployment. We have 30 to 40 companies around the world and it's across every company and every department.
The solution does require maintenance. You need to have agents up to date and cases closed properly. It does require you to be invested.
What was our ROI?
We have witnessed ROI. It's comprehensive in its detection capabilities and has saved us from multiple attacks. We've likely saved 30% based on prevented attacks.
What's my experience with pricing, setup cost, and licensing?
The solution is relatively cheaper and is willing to work with companies on pricing.
What other advice do I have?
We are customers.
For those who believe they already have a continuous monitoring solution in place, I'd advise that SentinelOne knows its own product. They can provide that extra confidence that nothing gets missed. And if you see a high number of alerts, they're able to really help you discern those and get down to the ones that matter most.
The solution doesn't affect our ability to innovate one way or another. It doesn't hold us back.
I'd recommend the solution and advise running a POC in your environment. It's good to run against CRowdStrike. They are seriously contending against CrowdStrike.
I'd rate the solution eight out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Cloud Engineer at a tech services company with 201-500 employees
Good interface, helpful alerts, and timely support
Pros and Cons
- "We mostly use alerts. That has been pretty good. If we use the alert system from Amazon, it is much costlier to us, so we use PingSafe."
- "The Infrastructure as Code service available in PingSafe and the services available in AWS cloud security can be merged so that we can get the security data directly from AWS cloud in PingSafe. This way, all the data related to security will be in one single place. Currently, we have to check a couple of things on PingSafe, and we have to validate that same data on the AWS Cloud to be sure. If they can collaborate like that, it will be great."
What is our primary use case?
We have multiple applications in our AWS cloud environment. We have a private environment, and we do not disclose it to the Internet. We have configured multiple security alerts, such as for any incoming traffic from a public IP address.
We have also set up PingSafe alerts for key rotation of security credentials for the accounts.
How has it helped my organization?
PingSafe helps us to reduce the security overhead. We do not have to manage every small thing manually. They are taken care of by PingSafe.
We use vulnerability scanners for our AWS servers. If there is any vulnerability, we get a report on that. We close those open security points. I do not know the exact name of the scanners, but they work great.
We rarely get false positives. We usually get real-time, accurate data. Sometimes there is a mismatch between the actual data and the data we get from PingSafe, but that is negligible. It happens once in a thousand times.
PingSafe has reduced our mean time to remediate. It has saved about 60% of our time. It has helped us with that.
It has also reduced our mean time to detect. The time savings depend on the use case. On average, it saves ten to fifteen minutes per use case.
We do not use it at a large level for Infrastructure as Code scanning, but it saves us time. We do not have to click on the features in the GUI. We have set up some scripts with the Infrastructure as Code feature. We run them to generate reports and get the required output.
The Infrastructure as Code feature has helped us. We can integrate PingSafe with our cloud tools. It helps with the development part. For example, Lambda is an AWS feature. It is a code environment. We can directly connect these two. It helps with the run time of the processes.
What is most valuable?
We mostly use alerts. That has been pretty good. If we use the alert system from Amazon, it is much costlier to us, so we use PingSafe.
PingSafe's interface is quite good. It is beginner-friendly. If someone has even a little bit of idea about cloud security, they can learn it very easily.
What needs improvement?
I do not know if it is possible, but in AWS Cloud, there are multiple features or services, and if they can collaborate with them, it would be helpful. The Infrastructure as Code service available in PingSafe and the services available in AWS cloud security can be merged so that we can get the security data directly from AWS cloud in PingSafe. This way, all the data related to security will be in one single place. Currently, we have to check a couple of things on PingSafe, and we have to validate that same data on the AWS Cloud to be sure. If they can collaborate like that, it will be great. It will be an amazing tool.
For how long have I used the solution?
My organization has been using PingSafe for one and a half years, but I have been using it for the past three to four months for cloud security.
What do I think about the stability of the solution?
I have not faced any downtime. If they have any kind of maintenance, they let us know via email a week or two before. The maintenance is usually done once a quarter, and it is done out of business hours, so we do not have any concerns about that.
What do I think about the scalability of the solution?
I would rate it a seven out of ten for scalability. If they can collaborate with AWS services as well, it can be a 10 out of 10.
How are customer service and support?
I have contacted them quite a few times. They are pretty good. They are within their SLAs. I have never raised a support case with a very high severity. For the cases I raised, they have an SLA of about 24 hours, and they always meet that SLA.
I always get a perfect answer in the reply. If I have some major issue and I am unable to understand that via email, they also come on a Teams or Webex call. They provide a good service. I would rate them a nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
It is a cloud deployment. I believe they have an on-premise option as well, but we are not using that. We are completely on the cloud.
I was not involved in its deployment. Its deployment was done by the organization about a year and a half ago. I only manage operations, and I have been here only for about three months.
It does not require any maintenance as such. In the infrastructure code part, we update the code, but I am not sure if that comes under maintenance.
What other advice do I have?
You should be a little familiar with cloud security. Otherwise, you might face a few difficulties in accessing the PingSafe console. If you are a little familiar, it will be very easy for you. A completely new user without a technical background can get a bit confused by the naming conventions in the GUI.
I would recommend PingSafe to others. Overall, I would rate PingSafe an eight out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Jun 2, 2024
Flag as inappropriateBuyer's Guide
SentinelOne Singularity Cloud Security
October 2024
Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,562 professionals have used our research since 2012.
IT Architect at a tech services company with 10,001+ employees
Helps save time, and is user-friendly, but the security rules need better definitions
Pros and Cons
- "All the features we use are equal and get the job done."
- "In some cases, the rules are strictly enforced but do not align with real-world use cases."
What is our primary use case?
We use PingSafe as our CSPM. Integrated with our environment, PingSafe scans for vulnerabilities and recommends remediation.
We implemented PingSafe to monitor our cloud security for vulnerabilities in the configuration.
How has it helped my organization?
PingSafe is easy to use.
The evidence-based reporting provides details of the vulnerability and the steps we need to take to resolve it.
The PingSafe scanning engine provides valuable evidence by identifying and reporting vulnerabilities that could be attacker targets. This evidence of exploitability is crucial because it allows us to prioritize and patch vulnerabilities effectively. Without this information, we might not be able to address critical vulnerabilities promptly.
Thanks to PingSafe, our security posture has improved significantly. Our team has been able to effectively address all critical and high vulnerabilities identified by the platform.
PingSafe has improved our mean time to detection. Without a CSPM tool, we would not be able to identify vulnerabilities.
PingSafe facilitated collaboration between our cloud security, application development, and AppSec teams. The evidence provided by PingSafe streamlines collaboration and vulnerability resolution across these teams.
The collaboration has saved engineering time by up to 40 percent.
PingSafe's improved compliance monitoring capabilities have helped us achieve a more secure posture.
What is most valuable?
All the features we use are equal and get the job done.
What needs improvement?
We encountered issues with some of the configured security rules. The vulnerability recommendations provided by PingSafe were inaccurate. In some cases, the rules are strictly enforced but do not align with real-world use cases. To address this, I recommend revising the security rule definitions to better reflect practical scenarios and provide clearer explanations.
We encountered a problem with PingSafe. They required a broad security policy, but we requested that they implement least privileged access and grant fewer permissions than they initially required. It took them over six months to respond to our request.
For how long have I used the solution?
I have been using PingSafe for 1.5 years.
What do I think about the stability of the solution?
I would rate the stability of PingSafe 8 out of 10.
What do I think about the scalability of the solution?
I would rate the scalability of PingSafe 9 out of 10.
How are customer service and support?
The technical support teams' response time was good but they were lacking a deep understanding of the different environments which caused delays in resolving our issues.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial deployment was straightforward and took 2 days to complete.
Two people from our team were involved in the deployment.
What other advice do I have?
I would rate PingSafe 7 out of 10.
Four people in our organization utilize PingSafe.
No maintenance is required from our end.
I recommend PingSafe to others for CSPM.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Apr 30, 2024
Flag as inappropriateSolution architect at ACC
Has significantly strengthened our security posture
Pros and Cons
- "The most valuable feature is the easy-to-understand user interface, which allows even non-technical users to comprehend and resolve issues."
- "SentinelOne Singularity Cloud Security is excellent, and I highly recommend it."
- "To enhance the notification system's efficiency, resolved issues should be promptly removed from the portal."
- "To enhance the notification system's efficiency, resolved issues should be promptly removed from the portal."
What is our primary use case?
We use SentinelOne Singularity Cloud Security to maintain security best practices. The platform alerts us to security issues, ranging from low to critical severity, based on our infrastructure.
We chose SentinelOne Singularity Cloud Security for its targeted vulnerability recommendations and best practice guidance, which allow us to address alerts effectively and maintain a secure infrastructure.
How has it helped my organization?
SentinelOne Singularity Cloud Security is user-friendly and easy to understand.
SentinelOne Singularity Cloud Security's evidence-based reporting for helping prioritize and solve the most important cloud security issues is excellent.
The exploitability proof in reports is crucial, enabling me to pinpoint issues and solutions. Without it, identifying vulnerabilities and applying fixes would be impossible. The system alerts me to security events, pinpointing the problem's location with resource and account IDs. This detailed information allows for rapid resolution, saving valuable time.
Upon joining the company, the user interface was not very user-friendly. However, over time, upgrades were introduced, such as more issue resolution documentation and best practices, which enhanced the security of our infrastructure. I realized the benefits of SentinelOne Singularity Cloud Security within five months.
SentinelOne Singularity Cloud Security has significantly strengthened our security posture. Previously, we relied on AWS-managed security alarms, which provided a limited and reactive approach to threat detection. Singularity Cloud Security offers a more proactive and comprehensive solution, enhancing our ability to identify and respond to potential threats.
SentinelOne Singularity Cloud Security has reduced our mean time to detect by five to ten minutes.
SentinelOne Singularity Cloud Security allows us to complete remediation in five minutes.
What is most valuable?
The most valuable feature is the easy-to-understand user interface, which allows even non-technical users to comprehend and resolve issues. Additionally, the solution provides highly useful recommendations.
What needs improvement?
To enhance the notification system's efficiency, resolved issues should be promptly removed from the portal. Currently, these issues take two to three hours to be removed, creating unnecessary clutter and potentially delaying the identification of new issues.
For how long have I used the solution?
I have been using SentinelOne Singularity Cloud Security for almost two years.
What do I think about the stability of the solution?
I would rate the stability of SentinelOne Singularity Cloud Security nine out of ten.
What do I think about the scalability of the solution?
I would rate the scalability of SentinelOne Singularity Cloud Security ten out of ten.
How are customer service and support?
Customer service and support are excellent. They respond promptly, and the technical support is knowledgeable and helpful with any issues we face.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
How was the initial setup?
The initial setup took approximately one week due to the testing phase. It went smoothly with the team's collaboration.
What about the implementation team?
I was present with my team during the deployment process, but I did not personally deploy it.
What other advice do I have?
I would rate SentinelOne Singularity Cloud Security ten out of ten.
Our organization has multiple departments, but only five individuals have access to Singularity Cloud Security.
Singularity Cloud Security's maintenance is handled by SentinelOne.
From a security standpoint, SentinelOne Singularity Cloud Security is excellent, and I highly recommend it.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Nov 17, 2024
Flag as inappropriateCloud Security Engineer & Consultant at a financial services firm with 10,001+ employees
Easy to use with good UI but needs better technical support
Pros and Cons
- "The UI is very good."
- "They need more experienced support personnel."
What is our primary use case?
We use the solution for security and monitoring. It helps maintain compliance standards. Multiple policies can be mapped and evaluated and alerts can trigger your attention.
How has it helped my organization?
We're using multiple cloud environments and multiple providers, such as AWS, Azure, GCP, and Postgres. It helps us manage multi-cloud security.
What is most valuable?
The UI is very good. The solution offers very good adaptability.
Its ease of use is pretty good. After using it for nine months, I'm pretty comfortable with it.
The evidence-based reporting helps us prioritize and solve issues. This is a feature that is missing from most platforms.
We use agentless vulnerability scanning. It's a good aspect of the product.
The proof of exploitability and evidence-based reporting are excellent. They gave me a detailed idea of what was exposed.
We use the infrastructure as code scanning. It really helps manage the policies, which I have been working on.
The compliance capabilities are helping me most of all. The reports and alerts we get help manage everything and act on issues.
We've reduced the number of false positives we receive by 35% or so.
We've reduced our time to detect by about 20%.
It does take time to remediate, however, we've saved time in terms of time to remediate since we get more details around alerts and can go in and look and solve issues. We've reduced our mean time to remediation by about 30% to 35%.
What needs improvement?
It can be complex to use at the outset.
They could have better support. We've had support issues in the past. They need more experienced support personnel.
For how long have I used the solution?
I've been using the solution for 8 to 9 months.
What do I think about the stability of the solution?
The stability is okay, however, it needs more maturity.
What do I think about the scalability of the solution?
We have 2 to 3 users on the solution currently. We have it in one location right now.
The scalability depends on the integration.
How are customer service and support?
Technical support has room for improvement.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We did previously use a different solution. We used Prisma. It did offer good pricing and good scalability.
How was the initial setup?
The initial setup only took about 1 week. I was not directly involved in the customer onboarding process.
The solution does not require any maintenance.
What was our ROI?
We see an ROI in the fact that we can better map our best practices. From a security perspective, we're saving around 30% to 40% and we're able to implement more best practices.
What's my experience with pricing, setup cost, and licensing?
The pricing is pretty good. It's comparable to or better than others on the market.
What other advice do I have?
I'm a partner.
The solution is cost-efficient, yet it needs more support accessibility. However, I would recommend this solution to others. I'd rate the product 5 out of 10 overall.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
Last updated: Apr 30, 2024
Flag as inappropriateThey are constantly improving their UI, Scanning and Vulnerabilities detection capabilities by adding and updating plugin engines and also other features like evidence based reporting.
Pros and Cons
- "Cloud Native Security is user-friendly. Everything in the Cloud Native Security tool is straightforward, including detections, integration, reporting, etc. They are constantly improving their UI by adding plugins and other features."
- "We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization."
What is our primary use case?
Cloud Native Security is a CSPM platform we use for cloud security. It checks for vulnerabilities in our web applications and cloud configurations. It also detects infrastructure-as-code issues. Additionally, it scans to find secrets in our code before it goes live.
Cloud Native Security identifies vulnerabilities before any bad actor can exploit them. We know if there's a misconfiguration in the cloud or vulnerabilities in our cloud-hosted applications. Kubernetes security is also a component. It also has multiple benchmarks for compliance with security regulations.
How has it helped my organization?
Since implementing Cloud Native Security, our risk posture has greatly improved. We are more compliant now. It has built-in compliance benchmarks for various regulatory standards. We were around 60 percent compliant when we started, and now we're at more than 95 percent.
Cloud Native Security has reduced our mean detection time by continuously scanning and sorting issues into high, medium, and low priority. We can easily detect things before the wrong person finds them. The solution reduces our remediation time, but it varies depending on the team. We address critical issues immediately. Cloud Native Security's rescan capability is good because we can rescan in a few minutes to know whether the issue has been fixed.
Cloud Native Security enables more collaboration between the security team and developers. The solution allows everyone to view the dashboard, so we can integrate more users and project teams. Everyone can look at the Cloud Native Security dashboard and see which issues are in their repositories or buckets. It's easier for everyone to work together to address issues.
It saves a lot of time because we would need to look for secrets manually without Cloud Native Security. Searching for cloud misconfiguration issues is also time-consuming and hard to do correctly because our infrastructure is huge. It's inconvenient for the security team to check manually and do penetration testing of every component
When we initially integrated Cloud Native Security, we used to get some false positives, but it was manageable. Now, I rarely see any false positives because Cloud Native Security has improved its tool. We've given them a lot of feedback to help them differentiate between false positives and hits. It was a lot of manual work, but that has gotten better.
What is most valuable?
Cloud Native Security is user-friendly. Everything in Cloud Native Security is straightforward, including detections, integration, reporting, etc. They are constantly improving their UI by adding plugins and other features. Recently, they added evidence-based reporting abilities. It tells us exactly where the issue is and gives us links to the endpoint and screenshots.
It allows us to scan for vulnerabilities and rate limits without deploying agents. Cloud Native Security allows us to set those values according to our server capabilities and preferences. We can also decide how many cluster images to scan.
The infrastructure-as-code feature is helpful for discovering open ports in some of the modules. It will tell us precisely where the port is open, including the repository and source code. Thus, we know that a port is open on that particular line. After integrating Cloud Native Security into our organization's system, we identified many thousands of secrets that are pushed into the source code.
What needs improvement?
We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization.
The offensive security engine is pretty good, but I can't say it's complete. I rate it seven out of ten. Cloud Native Security's specialty is cloud security, so the offensive security does lack a few things. We cannot rip reports like Tenable, Qualys, and all those vulnerability scanners, but it identifies some sensitive issues like exposed APIs. Some other issues are not identified, like access, but it does detect sensitive information exposure.
For how long have I used the solution?
We have used Cloud Native Security for two or three years.
What do I think about the stability of the solution?
I haven't had any issues with Cloud Native Security's stability. However, we once saw a spike in CPU consumption when they implemented a new feature. We contacted Cloud Native Security, and they addressed it in a day.
What do I think about the scalability of the solution?
Cloud Native Security is highly scalable.
How are customer service and support?
I rate Cloud Native Security support nine out of ten. Their tech support is excellent. We have a dedicated person that we can contact directly. They recently introduced a new tool where we can chat with support directly from within the tool.
How would you rate customer service and support?
Positive
How was the initial setup?
Cloud Native Security is a SaaS solution, and the onboarding is straightforward. They have a good knowledge base, and it's easy to integrate it. You can get it up and running in under a day or two.
What was our ROI?
Cloud Native Security does offer ROI. We have used Cloud Native Security for more than three years, and we are stoked about the value the solution offers to our organization.
What's my experience with pricing, setup cost, and licensing?
Cloud Native Security doesn't cost much, so it's worth what you're paying, and the ROI is excellent.
What other advice do I have?
I rate Cloud Native Security nine out of ten. I would recommend it because many of the solutions that provide capabilities like secret scanning, cloud configurations, and offensive security charge by module, and the costs are pretty high. Cloud Native Security is more cost-effective, so I would recommend it. Also, the amount of issues Cloud Native Security detects is good.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Mar 18, 2024
Flag as inappropriateWorks at a comms service provider with 1-10 employees
Easy to use with a simple setup and good dashboard
Pros and Cons
- "It's positively affected the communication between cloud security, application developers, and AppSec teams."
- "We've found a lot of false positives."
What is our primary use case?
We use the solution for security purposes. We deploy it into our infrastructure in the cloud. We want to make sure that all everything is secure, for example,if APIs are getting accessed, that it's by the right people. It's a security hub for us.
What is most valuable?
The solution is very good at tracing issues.
The dashboard is quite helpful. It's easy to use. The product is flexible and can be used in multi-cloud setups.
It's an easy solution for a beginner.
We've taken advantage of the reporting, which is quite good. It provides us with all the information we need. They have proof of exploitability capabilities, which is important to use.
The solution has agentless vulnerability scanning, which we use. You can look at extra ports. It's a great feature.
Its infrastructure of code scanning is useful. I can see it in the container configuration file. It's good for identifying preproduction issues in the container configuration files. It's working well. However, it's not dynamic. It's static.
We were able to witness the benefits after some time had passed. Within a month or two had passed, we began to really witness change. Previously, we were running blind, and now we can see where things might go wrong.
Our risk posture has improved. Both time to detect and time to remediate have improved.
It's positively affected the communication between cloud security, application developers, and AppSec teams.
What needs improvement?
They could have more comprehensive reporting. I'd like to see more details.
We've found a lot of false positives. It has not helped us reduce our level of false positives.
We'd like them to work on integration between networks. If I deployed the solution with another layer of security, they can't talk to each other. PinGSafe basically needs to integrate with more tools, especially on the security side.
For how long have I used the solution?
I've used the solution for 1.5-2 years.
What do I think about the stability of the solution?
The stability is good. I haven't noticed any lagging or crashing.
What do I think about the scalability of the solution?
The solution can scale fast. The dependency is on the API side, however.
How are customer service and support?
I've contacted technical support in the past. The quality is good. However, sometimes their staff don't know the details. The speed of response is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used other solutions, including Prisma and Datadog.
How was the initial setup?
I was involved in the initial deployment of PingSafe. It was very easy to implement. We had two to three people working on the set up process.
There is no maintenance needed for the solution once it is up and running.
What other advice do I have?
I'm a PingSafe customer.
I'd rate the solution 8 out of 10. If someone is looking for a CPSM tool, they should look into PingSafe's capabilities to see if they match what a company needs.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Apr 30, 2024
Flag as inappropriateApplication Security Manager at a tech company with 1,001-5,000 employees
Cloud native with great scanning features and an easy setup
Pros and Cons
- "We noted immediate benefits from using the solution."
- "Scanning capabilities should be added for the dark web."
What is our primary use case?
We mainly use PingSafe for cloud security.
How has it helped my organization?
We like that it is cloud-native security. It gives us an overview of all cloud structures. For example, if I'm integrating with AWS or Azure and I'm not sure of all of the instances, it will scan the whole cloud and show us issues related to instances. It can help us uncover vulnerabilities.
What is most valuable?
Of all the features we use, the cloud configuration and the offensive security engine are the most used. There is a secret scanning feature that I really like. It scans the public repositories, private repositories, and developer repositories. That way, we can see if any secret is added to the search engine or anywhere over the Internet. It detects this and then lets us know to which repository it was added. We can get it removed if we need to from repositories like GitHub.
The solution is good for verifying actual exploit paths. It helps us detect whether all the instances that are publicly available can be made private. We can see if anything is suspicious or harmful to us in the future or if any technical exploit has a specific port or something like that. If there is any vulnerability, such as if our Microsoft version is publicly exposed or if it is an older version, we can disable it, or we can upgrade to get the latest version of iOS to avoid exploitation.
The solution is easy to use. The interface is nice. Anyone can spend a day or two with the solution and they'll be able to understand the whole structure of the application, its features, and how to use it.
The integration with other solutions is very good. We integrate it with Jira and it runs smoothly. There are also default integrations for various clouds, like Google and Azure. We can also get alerts in various ways, like through Jira or email.
The evidence-based reporting is useful. It provides evidence according to the issue. We get a proper overview of the issue. I can check the evidence panel to see if the issue is genuine or a false positive by looking at the evidence.
We noted immediate benefits from using the solution. Within about a month, we had it integrated with Jira, and connected to all accounts and were able to easily find issues.
With PingSafe, we are 96% to 97% compliant. It helps us judge and, as necessary, mitigate risks.
We've noticed a drop in false positives. I haven't noticed any false positives in PingSafe, to be frank. Unless it's a glitch in the system, everything coming in is a positive.
Our mean time to detect has been reduced.
It's helped us collaborate effectively between cloud security application developers and AppSec teams. Having a vulnerability management module gives good visibility to vulnerabilities that are highly exploitable. We can see exactly what's vulnerable or affected in order to troubleshoot.
What needs improvement?
We'd like the integration with Jira to be stronger in some areas. For example, we'd like to be able to create multiple tickets for multiple instances. Right now, we can only create one ticket and cannot be specific enough. There's no way to create multiple tickets. It's very difficult to assign multiple teams the same Jira ticket.
Scanning capabilities should be added for the dark web.
For how long have I used the solution?
I've used the solution for the last two years.
What do I think about the stability of the solution?
The stability is good. There's no lagging or crashing. There may be a downtime once a quarter.
What do I think about the scalability of the solution?
We haven't had any issues with scaling.
How are customer service and support?
Technical support is very good. We do have a monthly call with PingSafe whereby we run through and resolve any issues. They typically answer our queries within 24 hours. The team is good. They seem technical.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
This is the first cloud security tool we've used.
How was the initial setup?
The initial deployment was easy. The PingSafe team was very helpful. If we needed any help they were there to guide us. There's even a step-by-step guide.
We had a member of the DevOps team provide us with all of the credentials and give permissions and another security team member to communicate to the PingSafe team in order to arrange all of the integrations.
The tool is very efficient. There is no maintenance needed.
What about the implementation team?
We did not need any assistance from a reseller or consultant.
What's my experience with pricing, setup cost, and licensing?
While my understanding is there will be a price increase, so far, the pricing has been okay.
Which other solutions did I evaluate?
We evaluated Prisma Cloud and Crowd Strike. We used Crowd Strike for a while; however, now we are only using PingSafe. PingSafe is very good. It offers multiple modules, and no other tool provides vulnerability scanning, secret scanning, and container cloud security in one dashboard.
What other advice do I have?
We are a PingSafe customer.
I'd rate the solution 9 out of 10. Overall, the tool is good.
New users should be ready for a lot of issues that will come onto their dashboard. They'll need a team of three to four at the outset to analyze the dashboard and work through reported vulnerabilities.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Apr 30, 2024
Flag as inappropriateBuyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2024
Product Categories
Cloud-Native Application Protection Platforms (CNAPP) Vulnerability Management Cloud and Data Center Security Container Security Cloud Workload Protection Platforms (CWPP) Cloud Security Posture Management (CSPM) Compliance ManagementPopular Comparisons
Prisma Cloud by Palo Alto Networks
Microsoft Defender for Cloud
Zscaler Zero Trust Exchange Platform
CrowdStrike Falcon Cloud Security
Aqua Cloud Security Platform
Check Point CloudGuard CNAPP
Trend Vision One - Cloud Security
Google Cloud Security Command Center
Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Does SentinelOne have a Virtual Patching functionality?
- When evaluating Cloud-Native Application Protection Platforms (CNAPP), what aspect do you think is the most important to look for?
- Why is a CNAPP (Cloud-Native Application Protection Platform) important?
- What CNAPP solution do you recommend for a hybrid cloud?
- Why are Cloud-Native Application Protection Platforms (CNAPP) tools important for companies?
- When evaluating Cloud-Native Application Protection Platforms (CNAPP) solutions, what aspect do you think is the most important to look for?
- Why is Cloud-Native Application Protection Platforms (CNAPP) important for companies?
- What Cloud-Native Application Protection Platform do you recommend?