We have one client, and we need a portal to manage security. We use Singularity to provide security information and identify vulnerabilities or malicious scripts that need to be fixed. It also provides recommendations about each of the vulnerabilities that are helpful.
IT Engineer at a construction company with 5,001-10,000 employees
Evidence-based reporting shows all the findings and severity, helping us to prioritize issues
Pros and Cons
- "We're monitoring several cloud accounts with Singularity. It is convenient to identify issues or security failures in any account. It's nice to have all the details we need to solve these issues."
- "We repeatedly get alerts on the tool dashboard that we've already solved on our end, but they still appear. That is somewhat irritating."
What is our primary use case?
How has it helped my organization?
We provide cloud services on our site using AWS. Singularity detects flaws that we must close for security reasons. We use Singularity to observe those findings and fix things based on the customer's requirements. Previously, we used to segregate issues and look after them. Singularity helped us secure our infrastructure. We've significantly reduced our potential security breaches to a minimum.
It has improved how we operate on a larger scale. We set up the platform, onboarded the info, and then gradually moved further. Over time, it helped us slowly resolve those issues. We were using the cloud platforms' native security tools, but those were unhelpful. Now, we rely on this more than those services.
Singularity reduced our false positive rate by about 60 percent. We've had even better results in terms of our risk posture. We can rely on this tool to improve our security conditions on a broader scale. If I gave our security posture a percent rating, I would give it 89 percent.
The solution saves time by giving us everything in one place. You don't need to manually check every account. It tells us a lot. Singularity reduces our detection time by about 60 percent.
Singularity has improved collaboration among cloud security, application developers, and AppSec teams. Previously, it would take around a week for engineers to address issues. Now that we use this tool, we resolve issues in one or two days.
What is most valuable?
We're monitoring several cloud accounts with Singularity. It is convenient to identify issues or security failures in any account. It's nice to have all the details we need to solve these issues. Singularity is easy and convenient to use. It is extremely easy for a novice to understand what the dashboard is trying to say and the terminology's meanings.
Evidence-based reporting is excellent for auditing. It shows all the findings and severity: low, high, medium, or critical. We solve the low-level and medium issues. Next, we resolve high-level and critical problems. It's easy to fix the security breaches.
What needs improvement?
We repeatedly get alerts on the tool dashboard that we've already solved on our end, but they still appear. That is somewhat irritating.
Buyer's Guide
SentinelOne Singularity Cloud Security
February 2025

Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
For how long have I used the solution?
We have used Singularity Cloud Security for about six months.
What do I think about the stability of the solution?
I rate Singularity nine out of 10 for stability.
What do I think about the scalability of the solution?
I rate Singularity eight out of 10 for scalability.
How are customer service and support?
I rate SentinelOne support nine out of 10.
How would you rate customer service and support?
Positive
How was the initial setup?
Singularity took about a week to deploy. A team of 40 to 50 people was involved.
What other advice do I have?
I rate SentinelOne Singularity Cloud Security nine out of 10. I would recommend the tool to others. It's a convenient and cost-effective tool for identifying security breaches. You get everything in one place, saving you time and costs.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Jun 4, 2024
Flag as inappropriate
Software Developer at a tech services company with 11-50 employees
Good code scanning and evidence reporting with helpful support services
Pros and Cons
- "There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
- "There is a bit of a learning curve for new users."
What is our primary use case?
We use the solution for monitoring the security of our infrastructure. It helps us identify all the vulnerabilities.
How has it helped my organization?
We had code and infrastructure, and we just weren't sure of all the vulnerabilities within them. This knowledge has helped protect us from security loopholes.
What is most valuable?
It's integrated with all of our cloud services on our accounts. It automatically fetches all the resources, scans through the code, and reports back on our vulnerabilities. It helps with all of our overall security standards as per the industry, and it can give us a rating. If I go to the compliance section, it gives me an idea of how I'm performing with respect to compliance metrics.
There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring.
It's fairly easy to use. I'd rate the ease of use 7 out of 10. There is a learning curve around the initial issues. However, we can look at issue descriptions and what to do. It gives us a lot of details about an issue, so that helps.
Evidence-based reporting helps prioritize and solve our cloud security issues.
PingSafe includes proof of exploitability in evidence-based reporting. It's really important. If we did have any proof, it would be harder to pinpoint false positives. I like that it gives proof.
The code scanning is helpful. Whenever somebody commits a recent code, it helps identify that immediately and check vulnerabilities.
It has positively affected our exposure. Before we implemented it, we were having lots of issues, and now, with PingSafe, we're up to 87% compliance with respect to all security metrics. It's been a gradual process, however, we're getting better and better.
We've been able to reduce mean time to detect. It's gotten a bit faster. If you have a solution like this, you can take a more proactive approach. When a vulnerability happens, you can act immediately. Our mean time to detect has improved by about 80%.
It's also helped us with our mean time to remediate. It shows recommended actions and helps tell us what could possibly remediate the issue.
The product has positively affected collaboration among our cloud security, application developers, and AppSec teams. PingSafe, however, is more centered around our infrastructure security and doesn't impact developer productivity much.
The compliance monitoring capabilities are helpful. We're a venture product, so we need to be compliant with everything. When we get a report, we can see what we need to do for compliance, and it helps us identify issues and mitigate them effectively to increase compliance.
What needs improvement?
There is a bit of a learning curve for new users. The ease of use could be better.
We've had an issue where we muted a false positive, however, when we made some changes to a cloud configuration, it popped up again. So it hasn't really reduced false positives; you just need to manually ignore them.
For how long have I used the solution?
I've used the solution for one year.
What do I think about the stability of the solution?
The solution has been stable throughout.
What do I think about the scalability of the solution?
We have three to four users that are actively using PingSafe. They are admins and engineers.
So far, we haven't had any scalability issues.
How are customer service and support?
They have great technical support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We didn't use a different solution previously.
How was the initial setup?
The initial deployment was pretty quick. When you integrate any of your cloud service providers, it doesn't take long. We had it implemented in a few days. One of our reps can just work with the team to get it ready.
It's not integrated with any other security tools, however, it is integrated within our infrastructure.
No maintenance is required.
What's my experience with pricing, setup cost, and licensing?
I don't have any visibility on the pricing of PingSafe.
Which other solutions did I evaluate?
We have not evaluated other solutions.
What other advice do I have?
I'd recommend the solution to other users. Overall, I'd rate the product 8 out of 10.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
SentinelOne Singularity Cloud Security
February 2025

Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
DevOps Engineer at a computer software company with 51-200 employees
Nice UI and features with helpful support
Pros and Cons
- "Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful."
- "There should be more documentation about the product."
What is our primary use case?
We have multiple AWS accounts and we use it for our products and deployments, et cetera, and they are being monitored by PingSafe for best practices and good security. In the past, we've had code exposed to the internet, and PingSafe has been able to catch such instances. Basically, it is for security and monitoring purposes.
How has it helped my organization?
We've been able to integrate PingSafe with out AWS and deployed their agents to Kubernetes. For production and compliance purposes, it allows us to monitor actively for issues from one place.
What is most valuable?
The solution reduces notifications.
We mainly use it for monitoring and security guidelines only. It's been really useful for us in terms of the developer accounts. If any have been exposed, we get notified and we can take care of issues before anything happens.
We haven't seen any server downtime. It's always been available when we've needed it.
The UI is very nice, and feature-wise, it's very good.
It has very good documentation.
Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful.
The solution is very easy to use. We have not had to spend much time customizing or integrating items. We were able to integrate all four AWS accounts in order to centrally monitor everything.
There is evidence-based reporting which can help prioritize and solve cloud security issues. We haven't actively used it or set it up.
We use the infrastructure as code scanning feature. It's good for identifying pre-production issues.
About six months ago, there was a major upgrade. We can see the containers running and which vulnerabilities appear, et cetera.
We haven't seen any increase in false positives since using the solution.
It's helped us improve our risk posture. We're more confident now that things aren't happening and getting missed. We're on the right track to adapting proper security rules.
More than saving engineering time, this solution has helped promote confidence is the security of our cloud accounts. We're more sure of our configurations and security posture. Since we don't have a cloud expertise team that might identify issues, it has helped us gain confidence in SQL deployments.
What needs improvement?
There should be more documentation about the product. Sometimes we have to go to customer support to get clarification.
For how long have I used the solution?
I've been using the solution for 1.5 years.
What do I think about the stability of the solution?
The solution is stable. I have not seen any downtime.
What do I think about the scalability of the solution?
We have around 15 users leveraging PingSafe. They are mainly admins and engineers.
How are customer service and support?
Technical support is very helpful. However, the documentation needs to be better.
They tend to resolve issues within an hour or so. With most issues, they are very helpful
Which solution did I use previously and why did I switch?
We have a different pipeline product working in parallel to this solution that is also helping us reduce vulnerabilities. Something else, for example, monitors compliance for us. PingSafe is more of an additional tool than our main solution. We have been using open-source tools for scanning.
How was the initial setup?
The development was just one configuration, and we were able to implement PingSafe in about an hour.
The solution does not require any maintenance.
What was our ROI?
We have noted an ROI based on the amount of confidence we've gained having visibility into our vulnerabilities. I do not have specific metrics on hand to illustrate that, however.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable.
What other advice do I have?
We're a customer and end-user. I'm a DevOps engineer.
I'd recommend the solution to others. I would rate it 10 out of 10 as it currently meets all of our requirements. I can't speak to other companies that may have different requirements.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
IT Developer at a construction company with 5,001-10,000 employees
Achieve enhanced threat detection and protection with continuous monitoring
Pros and Cons
- "For Singularity, the task capability is easy to use and it has a very intuitive dashboard, which streamlines the processes."
- "I recommend SentinelOne due to its high-security capabilities, which are essential to safeguard data and systems from potential threats."
- "The area of improvement is the cost, which is high compared to other traditional endpoint protections."
- "The area of improvement is the cost, which is high compared to other traditional endpoint protections."
What is our primary use case?
I use it for security purposes, and it is deployed on the cloud. It helps me look into potential threats and resolve issues.
What is most valuable?
For Singularity, the task capability is easy to use and it has a very intuitive dashboard, which streamlines the processes. It provides user-friendly privacy protection, 24/7 threat detection monitoring, and managed services for continuous monitoring and threat hunting. It also offers ransomware protection with excellent defense mechanisms, rollback features, and extended detection and response features.
What needs improvement?
The area of improvement is the cost, which is high compared to other traditional endpoint protections. Additionally, it has limited legacy system support and may not fully support older operating systems or legacy environments.
For how long have I used the solution?
I have been using SentinelOne for one year.
What do I think about the stability of the solution?
I rate the stability nine out of ten, indicating strong stability with limited bugs, glitches, or downtime.
What do I think about the scalability of the solution?
The solution is scalable, and I rate it nine out of ten.
How are customer service and support?
I rate technical support eight out of ten, indicating satisfaction with the support provided.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not personally use any other solution before using SentinelOne, however, I have heard about multiple products compared to SentinelOne.
How was the initial setup?
The initial setup was easy and completed in a couple of days, involving three people.
What about the implementation team?
Three people were involved in the deployment, working together to ensure the setup was successful.
What was our ROI?
Meantime to remediation improved from seven to eight minutes to two to three minutes, reducing time and money by 40% to 45%. Overall, time to detect is now in milliseconds.
What's my experience with pricing, setup cost, and licensing?
On a scale of one to ten, I would rate the pricing and setup costs an eight out of ten, indicating it leans towards the expensive side.
What other advice do I have?
I recommend SentinelOne due to its high-security capabilities, which are essential to safeguard data and systems from potential threats.
I would rate the overall solution nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Dec 16, 2024
Flag as inappropriateSecurity Administrator at a retailer with 10,001+ employees
It is user-friendly and helps reduce false positives, but the log search is limited to 14 days
Pros and Cons
- "The user-friendliness is the most valuable feature."
- "A two-month grace period for extended searches would be a valuable improvement."
What is our primary use case?
SentinelOne Singularity Cloud Security is deployed on all our servers except for user machines. When Singularity identifies a downloaded application as malicious, it triggers an alert sent to our SIEM console. We can then investigate the alert details, including associated logs, to determine if the malware is static or actively malicious. We can also investigate suspicious IP addresses or domains. Additionally, Singularity monitors process creation and can provide forensic data on security incidents, including information about backdoor connections and the applications involved, like Chrome or other browsers.
How has it helped my organization?
SentinelOne Singularity Cloud Security stands out for its user-friendliness compared to competitors like CrowdStrike, FireEye HX, and Microsoft Defender. Unlike these tools, which can be cumbersome for tasks like running queries or searching for logs, Singularity offers intuitive interfaces and delivers results in seconds, even for complex searches across various hash formats, like MD5, SHA256, etc., without needing conversion.
Our existing SIEM console allows us to analyze alerts triggered by the SOC team. We can investigate potential false positives or conduct tests directly within the console. Additionally, the console facilitates quick searches for IOCs to identify malicious communications. Furthermore, Singularity Cloud Security offers a central management console for automated machine reboots, containment, and even self-maintenance in response to high-severity security alerts. This eliminates the need for manual intervention.
We saw the benefits of SentinelOne Singularity Cloud Security within the first two months of transitioning from FireEye HX. Singularity was easy to manage, and we were able to identify vulnerabilities.
SentinelOne Singularity Cloud Security has helped reduce the false positives we receive by 15 percent compared to FireEye HX.
Singularity has helped reduce our mean time to detect. The automatic containment of the infected machine is done within the first ten seconds of detection.
Singularity has helped reduce our mean time to remediate.
What is most valuable?
The user-friendliness is the most valuable feature.
What needs improvement?
SentinelOne Singularity Cloud Security offers a custom search function with a default 14-day limit. Extending this period to 30 days requires an additional license. A two-month grace period for extended searches would be a valuable improvement. Additionally, enhancements to the threat-hunting capabilities of the hunter module are recommended.
For how long have I used the solution?
I have been using SentinelOne Singularity Cloud Security for two years.
How are customer service and support?
We had an incident in which they pushed a patch without notifying us and without testing, damaging all of our security controls.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used FireEye HX but shifted to Singularity because we saw the potential while the POC was going on. The top three endpoint security solutions are SentinelOne Singularity, Microsoft Defender, and CrowdStrike. FireEye HX is not one of them.
How was the initial setup?
The initial deployment's complexity was moderate. The entire deployment took six months to complete.
What about the implementation team?
The implementation was completed with the help of the vendor.
What other advice do I have?
I would rate SentinelOne Singularity Cloud Security seven out of ten. The lack of a 60-day search option for the log source lowers the overall score.
The endpoint security team does the maintenance.
SentinelOne Singularity Cloud Security is a good product that is easy to use.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Jul 14, 2024
Flag as inappropriateCloud Engineer at a tech services company with 201-500 employees
Good interface, helpful alerts, and timely support
Pros and Cons
- "We mostly use alerts. That has been pretty good. If we use the alert system from Amazon, it is much costlier to us, so we use PingSafe."
- "The Infrastructure as Code service available in PingSafe and the services available in AWS cloud security can be merged so that we can get the security data directly from AWS cloud in PingSafe. This way, all the data related to security will be in one single place. Currently, we have to check a couple of things on PingSafe, and we have to validate that same data on the AWS Cloud to be sure. If they can collaborate like that, it will be great."
What is our primary use case?
We have multiple applications in our AWS cloud environment. We have a private environment, and we do not disclose it to the Internet. We have configured multiple security alerts, such as for any incoming traffic from a public IP address.
We have also set up PingSafe alerts for key rotation of security credentials for the accounts.
How has it helped my organization?
PingSafe helps us to reduce the security overhead. We do not have to manage every small thing manually. They are taken care of by PingSafe.
We use vulnerability scanners for our AWS servers. If there is any vulnerability, we get a report on that. We close those open security points. I do not know the exact name of the scanners, but they work great.
We rarely get false positives. We usually get real-time, accurate data. Sometimes there is a mismatch between the actual data and the data we get from PingSafe, but that is negligible. It happens once in a thousand times.
PingSafe has reduced our mean time to remediate. It has saved about 60% of our time. It has helped us with that.
It has also reduced our mean time to detect. The time savings depend on the use case. On average, it saves ten to fifteen minutes per use case.
We do not use it at a large level for Infrastructure as Code scanning, but it saves us time. We do not have to click on the features in the GUI. We have set up some scripts with the Infrastructure as Code feature. We run them to generate reports and get the required output.
The Infrastructure as Code feature has helped us. We can integrate PingSafe with our cloud tools. It helps with the development part. For example, Lambda is an AWS feature. It is a code environment. We can directly connect these two. It helps with the run time of the processes.
What is most valuable?
We mostly use alerts. That has been pretty good. If we use the alert system from Amazon, it is much costlier to us, so we use PingSafe.
PingSafe's interface is quite good. It is beginner-friendly. If someone has even a little bit of idea about cloud security, they can learn it very easily.
What needs improvement?
I do not know if it is possible, but in AWS Cloud, there are multiple features or services, and if they can collaborate with them, it would be helpful. The Infrastructure as Code service available in PingSafe and the services available in AWS cloud security can be merged so that we can get the security data directly from AWS cloud in PingSafe. This way, all the data related to security will be in one single place. Currently, we have to check a couple of things on PingSafe, and we have to validate that same data on the AWS Cloud to be sure. If they can collaborate like that, it will be great. It will be an amazing tool.
For how long have I used the solution?
My organization has been using PingSafe for one and a half years, but I have been using it for the past three to four months for cloud security.
What do I think about the stability of the solution?
I have not faced any downtime. If they have any kind of maintenance, they let us know via email a week or two before. The maintenance is usually done once a quarter, and it is done out of business hours, so we do not have any concerns about that.
What do I think about the scalability of the solution?
I would rate it a seven out of ten for scalability. If they can collaborate with AWS services as well, it can be a 10 out of 10.
How are customer service and support?
I have contacted them quite a few times. They are pretty good. They are within their SLAs. I have never raised a support case with a very high severity. For the cases I raised, they have an SLA of about 24 hours, and they always meet that SLA.
I always get a perfect answer in the reply. If I have some major issue and I am unable to understand that via email, they also come on a Teams or Webex call. They provide a good service. I would rate them a nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
It is a cloud deployment. I believe they have an on-premise option as well, but we are not using that. We are completely on the cloud.
I was not involved in its deployment. Its deployment was done by the organization about a year and a half ago. I only manage operations, and I have been here only for about three months.
It does not require any maintenance as such. In the infrastructure code part, we update the code, but I am not sure if that comes under maintenance.
What other advice do I have?
You should be a little familiar with cloud security. Otherwise, you might face a few difficulties in accessing the PingSafe console. If you are a little familiar, it will be very easy for you. A completely new user without a technical background can get a bit confused by the naming conventions in the GUI.
I would recommend PingSafe to others. Overall, I would rate PingSafe an eight out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Jun 2, 2024
Flag as inappropriateCloud Engineer at a tech services company with 201-500 employees
Helps save time, improves collaboration, and identifies misconfigurations
Pros and Cons
- "The cloud misconfiguration is the most valuable feature."
- "I would like PingSafe to add real-time detection of vulnerabilities and cloud misconfigurations."
What is our primary use case?
I work for an insurance company whose infrastructure is on the cloud, so we use PingSafe for security management and vulnerability detection.
How has it helped my organization?
PingSafe is a valuable tool for managing infrastructure security. It offers advanced features like container security management, microservices security management, and Configuration Drift Remediation, which helps identify and address unauthorized configuration changes. These features are comprehensive and adaptable. Even for custom infrastructure modifications, such as XYZ, the PingSafe team can be contacted for guidance and policy adjustments to ensure a smooth adoption process.
Infrastructure as Code is valuable because the code itself defines the infrastructure. This means any vulnerabilities or misconfigurations in the IaC code will be deployed to our infrastructure. However, IaC tools can scan the code and alert us to potential problems before deployment, allowing us to fix them proactively.
We saw the benefits of PingSafe immediately.
It helped reduce the amount of false positives.
It has reduced our mean time to detection and remediation.
PingSafe improved collaboration between our cloud security developers and the application security teams.
The collaboration helped us save time, which is one of the reasons we have continued to use PingSafe.
What is most valuable?
The cloud misconfiguration is the most valuable feature. It highlights any misconfiguration that can make our infrastructure vulnerable.
What needs improvement?
I would like PingSafe to add real-time detection of vulnerabilities and cloud misconfigurations.
For how long have I used the solution?
I have been using PingSafe for almost 2 years.
What do I think about the stability of the solution?
I would rate the stability of PingSafe 10 out of 10.
What do I think about the scalability of the solution?
I would rate the scalability of PingSafe 10 out of 10.
How are customer service and support?
The technical support is good. They are knowledgeable and prompt.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment was straightforward. One person was required from our end.
What about the implementation team?
The implementation process itself was very smooth. The PingSafe team provided excellent assistance in integrating the solution with our existing infrastructure and account. This made the integration process hassle-free. We've also recently integrated a new CDR feature using PingSafe.
What other advice do I have?
I would rate PingSafe 10 out of 10.
No maintenance is required for PingSafe.
Once you've acquired PingSafe, it's essential to review all your existing organizational policies. If these policies are compatible with your infrastructure, you can proceed without modifications. However, if there are any incompatibilities, you'll need to make adjustments to ensure your infrastructure triggers accurate alerts. Skipping this step can lead to a flood of false positives.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
IT Manager at a sports company with 501-1,000 employees
Cost-effective, good support, and end-to-end coverage
Pros and Cons
- "It is pretty easy to integrate with this platform. When properly integrated, it monitors end-to-end."
- "We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks."
What is our primary use case?
I consider it a cloud security posture management tool. It is being used for the overall posture of the environment.
By implementing Cloud Native Security, we wanted to monitor end-to-end misconfigurations. That is why we started with it. We are now also using one other module for detection and response, but mainly, we are using it to monitor misconfiguration and benchmark compliance.
How has it helped my organization?
It is pretty good. It has good coverage and a good reporting system.
There has been tremendous improvement since implementing Cloud Native Security. Cloud Native Security reports any misconfiguration that is there in the infrastructure. We do not have to go and check each service individually. It has helped a lot.
For compliance management, we can find the benchmark compliance status in Cloud Native Security directly. We do not have to do anything. Many benchmarks that we are supposed to follow are added by default. It is pretty easy for us to showcase compliance to anyone.
Misconfiguration detection has been the most effective for threat detection in our cloud environment. We are mainly focusing on the misconfiguration. I can see any configuration-related issues in all the modules.
Because it covers all the modules, every single aspect of the compliance has improved. We were able to find out the critical issues related to cloud infrastructure. It is a real-time monitoring system, so, at any time, we can check and confirm.
Cloud Native Security provides information about the exact affected area. We can easily locate a resource in a particular account or service. It is very clear from the Cloud Native Security report where to look for a particular misconfiguration. They have also added a graphical representation.
The reports tell us what is the impact, how critical it is, and how to locate the issue. That helps to prioritize things and fix a critical issue on an urgent basis. It is easy to analyze things from our side.
After implementing Cloud Native Security, we were able to implement so many best practices. Initially, we were getting different types of issues. We learned from those issues, and we are now implementing best practices based on that. We are also able to do real-time monitoring.
It has helped reduce the number of false positives we deal with. We are hardly getting any false positives. Previously, if we had four false positives, we now have only one false positive.
Cloud Native Security's ease of use and precision in detection have improved our risk posture a lot.
Cloud Native Security has saved our mean time to detect. It has saved a lot of our time. It has saved almost 95% of the time because we cannot go and check all the services in AWS. It is very vast. Cloud Native Security gives us specific information. There is no manual effort.
Cloud Native Security has not helped reduce our mean time to remediate because remediation depends on so many factors. It has nothing to do with Cloud Native Security. We are getting the issues, and the team is responding to them. After fixing them, there is a lot of improvement in the number of issues.
What is most valuable?
It is pretty easy to integrate with this platform. When properly integrated, it monitors end-to-end. The other thing is the coverage. As far as I know, it has pretty good coverage.
It is very easy to use. I would rate it a nine out of ten for ease of use.
What needs improvement?
We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks.
For how long have I used the solution?
I have been using Cloud Native Security for around ten months.
What do I think about the stability of the solution?
It is stable. I would rate it a nine out of ten for stability.
What do I think about the scalability of the solution?
It is scalable. I would rate it a nine out of ten for scalability.
Overall, we have seven users of this solution, but at a time, we only have two active users. It is being used in a single location.
How are customer service and support?
Their support is good. Whenever we have doubts, we get proper support. We connect with them and resolve the issue. I would rate them a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use any other solution. This is the first one.
How was the initial setup?
It is on the cloud. The implementation phase varies. It can take a few months.
It does not require any maintenance.
What's my experience with pricing, setup cost, and licensing?
I am not involved in the pricing, but it is cost-effective.
What other advice do I have?
I would recommend Cloud Native Security to others. Overall, I would rate Cloud Native Security a nine out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Product Categories
Cloud-Native Application Protection Platforms (CNAPP) Vulnerability Management Cloud and Data Center Security Container Security Cloud Workload Protection Platforms (CWPP) Cloud Security Posture Management (CSPM) Compliance ManagementPopular Comparisons
Microsoft Defender for Cloud
Cortex Cloud by Palo Alto Networks
Zscaler Zero Trust Exchange Platform
CrowdStrike Falcon Cloud Security
Aqua Cloud Security Platform
Lacework FortiCNAPP
Check Point CloudGuard CNAPP
Trend Vision One - Cloud Security
Tenable Cloud Security
Google Cloud Security Command Center
Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Does SentinelOne have a Virtual Patching functionality?
- When evaluating Cloud-Native Application Protection Platforms (CNAPP), what aspect do you think is the most important to look for?
- Why is a CNAPP (Cloud-Native Application Protection Platform) important?
- What CNAPP solution do you recommend for a hybrid cloud?
- Why are Cloud-Native Application Protection Platforms (CNAPP) tools important for companies?
- When evaluating Cloud-Native Application Protection Platforms (CNAPP) solutions, what aspect do you think is the most important to look for?
- Why is Cloud-Native Application Protection Platforms (CNAPP) important for companies?
- What Cloud-Native Application Protection Platform do you recommend?