Try our new research platform with insights from 80,000+ expert users
Jesse McClure - PeerSpot reviewer
Intern SOC Analyst at a tech services company with 51-200 employees
Real User
Good visibility and vulnerability scanning with very good reliability
Pros and Cons
  • "It gives me the information I need."
  • "A few YouTube videos could be helpful. There isn't a lot of information out there to look at."

What is our primary use case?

I'm taking a look and digging into applications. I use it for general analysis. 

What is most valuable?

The visibility is very good. It allows me to go deeper into my investigations. It gives me the information I need. 

I do use the vulnerability scanning every day. It's excellent. I have no complaints. 

We do get false positives, however, it can be from downloading from dodgy sites or whatever the case may be. 

The mean time to detect is good. It's very fast.

What needs improvement?

It's good as is. From a beginner's perspective, while it's not necessarily complicated, it can be confusing. However, once you get the gist of it, it's pretty clear. For example, when you first go on it, you don't know what's going on. A few YouTube videos could be helpful. There isn't a lot of information out there to look at. 

For how long have I used the solution?

I've been using the solution for roughly six to seven months. 

Buyer's Guide
SentinelOne Singularity Cloud Security
February 2025
Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

What do I think about the stability of the solution?

The stability of the solution is good. There is no lagging, crashing or downtime. This year we haven't had any downtime with the solution. 

What do I think about the scalability of the solution?

The solution is very scalable. 

How are customer service and support?

I've never contacted technical support. 

Which solution did I use previously and why did I switch?

I did not previously use a different solution. 

How was the initial setup?

When I joined the company, it was already being used; I did not set up the solution.

It doesn't need ongoing maintenance, although there are occasional agent updates. 

What's my experience with pricing, setup cost, and licensing?

I don't know about the pricing or licensing. 

What other advice do I have?

I'm an end-user.

I've never used the evidence-based reporting or the offensive or infrastructure-as-code scanning yet. 

I'd rate the solution nine out of ten. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
IT Security Specialist at Tailor Security Tech
Real User
Top 20
Precise, integrates well, and helps consolidate security solutions
Pros and Cons
  • "It integrates very well. We sell different products from different vendors. We know that the SentinelOne Singularity platform can be integrated with several different solutions from different vendors."
  • "The application module focuses on the different codes and libraries that can be run on the machines. It is very important for Singularity EDR to detect what type of codes and what type of libraries can run in the machine. If they can implement a white list or a black list of codes or libraries that can be used in the machine, it would be very helpful. They can focus more on the application module."

What is our primary use case?

We are a channel partner of SentinelOne in Brazil. We have a distributor that we use to sell SentinelOne. We are very happy and very proud to represent SentinelOne here.

How has it helped my organization?

SentinelOne Singularity Complete helps consolidate security solutions. There is a hot discussion about the future of the Security Operations Center. Security Operations Centers generally use SIEM and SOAR, but SentinelOne Singularity XDR can also help there because you can see what is happening not only on the endpoints but also in the network. In other words, you can replace the NDR solution. We also see it going all the way to include all the clouds. This ecosystem is very important to us. In the near future, we see it being used for all the problems related to detection and response in cybersecurity.

Our customers use the Ranger functionality. There are two Ranger versions. There is Ranger AD, and there is Ranger Pro. SentinelOne Singularity platform has its own security ecosystem. You do not have the need to buy other solutions. For example, we sell a ZTNA solution. If you have ZTNA, you do not need to buy a PAM solution. You do not need to buy a NAC solution. The ZTNA technology has replaced all the other solutions. It is the same thing with Singularity. If you buy the ecosystem of Singularity, you do not need to buy several different technologies.

Ranger can do all the hardware inventory. It can point out the versions of the operating systems and then you can apply patching to update the versions of the operating systems. You can use Ranger in different ways. For a security professional, it is a very powerful tool.

It sends you alerts and warnings about possible incidents, but you do not get too many false positives. It is precise. You get real information about an incident.

It is very important to have good hygiene of your endpoints and your network. The uptime of the endpoints and networks is very important. SentinelOne Singularity Complete provides a good uptime. Incident identification is very important and having fewer false positives is also important. The SOC staff knows that if SentinelOne Singularity points out an incident, they have to pay attention to the threat. It is a very good checker.

SentinelOne Singularity Complete reduces the organization's risk.

What is most valuable?

ITDR or Ranger AD is an important feature for me.

It integrates very well. We sell different products from different vendors. We know that the SentinelOne Singularity platform can be integrated with several different solutions from different vendors. We sell products of a Spanish company, and they support the integration of logs produced by SentinelOne into their platform. We see the capacity to integrate SentinelOne with the solutions of other vendors. It is very important because you can get not only a more integrated ecosystem but also a more powerful ecosystem.

What needs improvement?

All EDRs are made of different modules. There is a firewall module, an IPS module, and an application module. The application module focuses on the different codes and libraries that can be run on the machines. It is very important for Singularity EDR to detect what type of codes and what type of libraries can run in the machine. If they can implement a white list or a black list of codes or libraries that can be used in the machine, it would be very helpful. They can focus more on the application module.

For how long have I used the solution?

It is a short duration because we started to be a channel partner of SentinelOne two months ago, but we are very focused on SentinelOne.

How are customer service and support?

Their technical support for me is good. I am not involved in the deployment of the solution, but I have not heard any kind of complaint about the support. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We are currently using McAfee in our company, but we are going to move to SentinelOne.

I am a very experienced security professional. I have got the CISSP certification and other specific certifications. I see too many different products. I have good experience with Trend Micro, but I find SentinelOne Singularity more comprehensive.

We are trying to replace the solutions from other vendors. Customers are trying to use more powerful tools such as CrowdStrike or SentinelOne. We do not believe that Microsoft has a very good solution. There are a lot of people who speak about problems with Microsoft Defender and other components of the Microsoft ecosystem. The technical side is not the only factor. Price too is important, but we are trying to replace it. We have some good prospects to replace EDRs or other malware detection tools with SentinelOne Singularity.

How was the initial setup?

I am a security architect. I am not involved in the deployment of the solution. Some other guys in the technical area are involved in the deployment, but from what I hear, there is no problem. You have to do some configurations.

The deployment duration depends on the customer. If you have an SMB customer, it takes less time than to deploy it for a big customer.

What about the implementation team?

We have a team of technicians who are specialized in different kinds of companies. They are specialized in the cloud and other things. We have about 10 people. They take care of the deployment and configuration of the solution. We can also count on the specialist from the distributor for support and vendor support.

What was our ROI?

You get good support. You get a good product and you are going to be protected. The technology can be integrated with different tools. This is important. We do not live alone in this world. There are other vendors, so the capability to integrate is very important. Singularity Complete is going in the right way.

What's my experience with pricing, setup cost, and licensing?

The price depends on the extension of the solution that you want to buy. If you want to buy just EDR, the price is less. XDR is a little bit more expensive. There are going to be different add-ons for Singularity. This is important for customers because they can add some new features. They do not need to change the product. They can simply add a new feature.

What other advice do I have?

My company is a reseller of SentinelOne. It is one of the top solutions as per Gartner's Magic Quadrants. I am always interested in everything that comes from SentinelOne. I have watched the recent webinars about the latest launch of SentinelOne. There is going to be Purple AI. They have a new console, and we are waiting for it.

What we see here is that companies or customers want more features. The gap between EDR and XDR is too large. XDR includes cloud workloads of the systems and network and not only the endpoints. SentinelOne EDR is a very good solution. You do not need to monitor the Windows operating system. SentinelOne can do this for you. For example, the registry of Windows is the most important part of the operating system. SentinelOne EDR can see what happens in the registry. It can warn about any modification in the registry.

The Singularity ecosystem is very powerful. SentinelOne is very focused on expanding the reach of Singularity and making it a more comprehensive solution. SentinelOne is doing a very good job to get there. We believe that there will be a consolidation of the market, and SentinelOne will survive this consolidation because SentinelOne Singularity is a very powerful and very good solution.

I would rate SentinelOne Singularity Complete a nine out of ten. We have a very good relationship with SentinelOne.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Buyer's Guide
SentinelOne Singularity Cloud Security
February 2025
Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
Nilesh Jadhav - PeerSpot reviewer
Cloud Engineer at ACC Limited
Real User
Top 20
Improves security posture, reduces false positives, and speeds up remediation time
Pros and Cons
  • "The most valuable aspects of PingSafe are its alerting system and the remediation guidance it provides."
  • "In addition to the console alerts, I would like PingSafe to also send email notifications."

What is our primary use case?

Our infrastructure is on AWS and we integrate PingSafe with our enterprise accounts to identify misconfiguration on the Cloud.

How has it helped my organization?

The offensive security engine helps us visualize any potential attacks.

PingSafe helps us maintain and improve our security posture.

It has helped reduce the number of false positives.

We have improved our mean time to detection with PingSafe.

PingSafe has improved our mean time to remediation. The alerts provided included details that help us address the issues quickly.

What is most valuable?

The most valuable aspects of PingSafe are its alerting system and the remediation guidance it provides. This combination helps us identify misconfigurations and vulnerabilities in our systems and swiftly address them.

What needs improvement?

In addition to the console alerts, I would like PingSafe to also send email notifications.

For how long have I used the solution?

I have been using PingSafe for one and a half years.

What do I think about the stability of the solution?

PingSafe is stable.

What do I think about the scalability of the solution?

PingSafe is scalable.

How are customer service and support?

The technical support is helpful and responds quickly to our requests.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used AWS Security but switched to PingSafe because of its wider scanning range and centralized console for maintenance.

How was the initial setup?

The initial deployment was straightforward and took one month to complete.

What about the implementation team?

We completed the implementation in-house with the help of PingSafe.

What other advice do I have?

I would rate PingSafe eight out of ten.

I recommend PingSafe to others.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
Manisha Kumari - PeerSpot reviewer
Senior Dev Ops Engineer at a computer software company with 51-200 employees
Real User
Top 10
The compliance assessment features help us during audits
Pros and Cons
  • "We like PingSafe's vulnerability assessment and management features, and its vulnerability databases."
  • "The categorization of the results from the vulnerability assessment could be improved."

What is our primary use case?

We primarily use PingSafe for compliance purposes because we work with banks and the fintech industry, so we must follow some standards like PCI DSS.

How has it helped my organization?

We use PingSafe for compliance and security purposes, and it has helped a lot. We face many audits, and during each audit, we must conduct a vulnerability assessment. PingSafe gives us a list of vulnerabilities that we remediate to raise our compliance score. It's our only tool for vulnerability assessments. The benefits are mostly immediate. PingSafe helped reduce the number of false positives, which has been difficult.

What is most valuable?

We like PingSafe's vulnerability assessment and management features, and its vulnerability databases. The interface isn't too complex. It's quite easy to use. The agentless vulnerability scan is the feature we use the most.

What needs improvement?

The categorization of the results from the vulnerability assessment could be improved. 

For how long have I used the solution?

We have used PingSafe for 2 years. 

What do I think about the stability of the solution?

I have never faced any downtime.

What do I think about the scalability of the solution?

PingSafe's scalability is quite good. We have multiple projects, and scalability isn't an issue. 

What other advice do I have?

I rate PingSafe 8 out of 10 based on the features I have used. I haven't used all the features, but I give the vulnerability and compliance features 8 out of 10. I can recommend PingSafe for vulnerability scanning and compliance. There are many competitors, but I find PingSafe quite good, which is why we haven't switched to something else for the past 2 years. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Shashank N - PeerSpot reviewer
Security Engineer-DevSecOps at a computer software company with 51-200 employees
Real User
Top 5Leaderboard
Offers a wide range of security features, including misconfiguration detection and easy to set up and use
Pros and Cons
  • "Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
  • "Maybe container runtime security could be improved."

What is our primary use case?

It's a cloud-based SaaS tool. It's a cloud security partnership management tool. It gives you an overview of misconfigurations, Kubernetes security, Docker security, vulnerability scanning, and secret scanning.

What is most valuable?

Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.

What needs improvement?

Maybe container runtime security could be improved. But with the acquisition by a bigger company, things might roll out faster, potentially including this feature.

For how long have I used the solution?

I have been using it for six months. 

What do I think about the stability of the solution?

It's been stable in my experience. 

What do I think about the scalability of the solution?

Since it's a managed service, Cloud Native Security handles scalability. There are around 15 end users in my company using it.

How are customer service and support?

We could just contact the CEO directly with any questions. It was a small team back then, but I don't think that's the case anymore since they've been acquired.

Previously, it was just a 50-person team, and the CEO would hop on the call to solve the problem. 

How was the initial setup?

The initial setup is super easy! It's a SaaS portal, so no deployment is needed. Just configuration that takes about half an hour.

What's my experience with pricing, setup cost, and licensing?

It was reasonable pricing for me. The costing model might have changed now since they have been acquired. 

What other advice do I have?

I would advise integrating your Kubernetes clusters for extra features.

Overall, I would rate the solution a nine out of ten because I'm happy with Cloud Native Security overall.

The number of features Cloud Native Security offered with just a small team was phenomenal. Give them another six months to a year, and it could be one of the best tools out there.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Rick Bosworth S1 - PeerSpot reviewer
Rick Bosworth S1Cloud Security (CNAPP, CSPM, CWPP) at SentinelOne
Top 20Real User

Shashank, thanks for your kind words. Allow me to assure you, we here at SentinelOne are relentlessly focused on our customers' success every day. And we are so happy to have welcomed the team in joining us. Sincerely, Rick

Specialist Information Security at Ujjivan Small Finance Bank
Real User
User-friendly and provides good monitoring features
Pros and Cons
  • "Cloud Native Security is a tool that has good monitoring features."
  • "After closing an alert in Cloud Native Security, it still shows as unresolved."

What is most valuable?

Cloud Native Security is a tool that has good monitoring features. We get multiple misconfigurations from the monitoring on a daily basis. Cloud Native Security detects misconfigurations in real-time, like open ports.

What needs improvement?

If our team closes a particular alert triggered in Cloud Native Security, it should also be closed in Cloud Native Security. After closing an alert in Cloud Native Security, it still shows as unresolved.

For how long have I used the solution?

I have been using Cloud Native Security for one and a half years.

What do I think about the stability of the solution?

We haven’t faced any issues with the solution’s stability.

How are customer service and support?

The technical support of the solution is good.

How would you rate customer service and support?

Positive

What other advice do I have?

Cloud Native Security is a user-friendly solution. If you log in to the console, you'll get all the misconfigurations, and the solution has recently integrated CI/CD. Sometimes, we get false positive alerts. Our team closely observes if there are any misconfigurations. If it is closed for a particular resource, it must also be closed from the monitoring dashboard, which is not happening. We have already raised this issue to the support team.

The solution's proof of exploitability gives complete data from the console regarding the issue, description, resolution, proof of concept, and closing of alerts. The main benefit of Cloud Native Security is that it detects multiple misconfigurations in our environment. If there are any unwanted port openings or any publicly accessible EC2, we will get to know about them easily from the monitoring tool.

Cloud Native Security is deployed on the cloud in our organization. Cloud Native Security has new monthly updates. We are continuously in touch with the Cloud Native Security team for anything that needs to be changed or modified or if there are any new requirements.

Overall, I rate the solution a 9 out of 10.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Naveen Veligeti - PeerSpot reviewer
Enterprise Account Manager at Ninth Dimension IT Solutions (P) Ltd
Reseller
Top 10
Offers advanced components to safeguard your multi-cloud environment
Pros and Cons
  • "It is advantageous in terms of time-saving and cost reduction."
  • "There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."

What is our primary use case?

Cloud Native Security offers the flexibility to create a customized solution that fits our specific needs. It's a comprehensive tool encompassing the central elements—PSC, PPP, and more.

What is most valuable?

It is advantageous in terms of time-saving and cost reduction.

What needs improvement?

There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security.

For how long have I used the solution?

I have been using Cloud Native Security for the past six months.

What do I think about the stability of the solution?

I'd rate it an eight. It's a reliable solution that the organization is increasingly adopting for its robust features and security.

What do I think about the scalability of the solution?

It is quite scalable. I would rate it an eight out of ten. 

How are customer service and support?

They are helpful.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Prisma Cloud seemed limited in its solutions and had to acquire other companies for broader offerings, while Cloud Native Security provided more comprehensive and tailor-made solutions, especially in terms of authentic security features.

How was the initial setup?

The setup isn’t easy because it doesn't support Azure. It's something on the roadmap. It doesn't limit itself to a particular hypervisor.

What about the implementation team?

For now, we don't handle the maintenance. It's all managed by the vendor for our customers.

What's my experience with pricing, setup cost, and licensing?

It's not expensive. The product is in its initial growth stages and appears more competitive compared to others. It comes in different variants, and I believe the enterprise version costs around $55 per user per year. I would rate the pricing a five, somewhere fairly moderate.

What other advice do I have?

I would rate it 8 out of 10. 

Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros sharing their opinions.