Cloud Engineer at a construction company with 5,001-10,000 employees
Real User
Top 20
2024-10-21T08:13:00Z
Oct 21, 2024
I would recommend this solution. I find it very user-friendly, and the documentation is also good enough to give solutions, which is very important. In addition to notifications, we also get solutions. I would rate Singularity Cloud Security a nine out of ten.
I would rate SentinelOne Cloud Security a nine out of ten. They are bringing all the pieces together, and once the Purple AI can interact with all the different components and correlate across them, I think that's where its real power will come from. SentinelOne CNAP was extremely helpful and chosen for three primary reasons: their responsive and efficient team facilitated a rapid deployment; the technology itself proved to be very robust and effective; and the platform's configurability allowed for seamless integration with our specific business needs. For those evaluating SentinelOne CNAP, it is advised to engage with their team for potential configuration changes. The tool offers comprehensive insights, providing productive usage from day one for penetration testers and security engineers.
IT Security Director at Athletic & Therapeutic Institute of Naperville, LLC
Real User
Top 20
2024-10-17T00:12:00Z
Oct 17, 2024
I would rate SentinelOne Singularity Cloud Security nine out of ten. Currently, our cloud workload protection system is deployed for visibility only, without blocking capabilities or enforced policies. While we are not yet utilizing its full protection potential, this proactive approach allows our development, IT, and quality teams to gradually transition to containerized workloads over the next few years. SentinelOne's cloud workload protection tools provide the necessary functionality to secure our environment as teams adopt modern serverless methodologies. Although full implementation is an ongoing effort, having these tools in place ensures we can confidently secure our evolving infrastructure. We've thoroughly enjoyed our four-year partnership with SentinelOne. Their account management and readily available engineering support have been exemplary, setting a high standard for customer service. While escalations can sometimes experience delays, their responsiveness has been the best we've encountered. The entire organization, from account managers and engineers to the managed detection response service, operates cohesively. Cloud security is challenging, especially in multi-cloud environments, but as we use a single cloud provider, we leverage native security tools for detection and visibility. While we initially considered cloud-native protection unnecessary, we realized the limitations of relying solely on our provider's knowledge and visibility. Their data is inherently limited by their own experience. SentinelOne, with its global customer base across various cloud providers, offers broader threat intelligence. Learning from attacks across all cloud platforms, like Amazon, Azure, and Google, is crucial for a comprehensive security posture. By partnering with SentinelOne, we gain access to this wider threat landscape and benefit from a learned security environment. Our organization relies on Azure services. A key advantage of SentinelOne is its ability to serve customers across various data centers, including those hosted by Azure and Amazon. I recommend colleagues and professionals in information security give SentinelOne a try, as they will quickly see the benefits, especially if not working with modern cloud-based solutions. SentinelOne's capabilities in visibility and detection make it a valuable addition to any security strategy. SentinelOne's openness to customer feedback is impressive. I've served on other customer advisory boards, even for competitors, but SentinelOne stands out. They actively involve customers in shaping their products, including the user interface, detection rules, and Singularity AI Cloud components. This customer-centric approach fosters a mutually beneficial relationship where customer feedback directly enhances the security solutions. I encourage all SentinelOne customers to explore opportunities like beta testing, advisory boards, or UX feedback programs. The company's success translates to improved security for organizations like mine, and the close collaboration builds a strong, valuable partnership. Seeing our feedback implemented in their products is truly remarkable.
I would rate SentinelOne Singularity Cloud Security nine out of ten. The partnership between SentinelOne and AWS, particularly the Singularity Cloud integrations, provides streamlined access to actionable information from AWS. I would tell anybody considering Singularity Cloud Security to absolutely proceed. SentinelOne has been phenomenal to work with, and I am looking forward to a continued partnership as they innovate and integrate AI, consistently rolling out new features.
VP of DevOps and Product Support at a recruiting/HR firm with 1,001-5,000 employees
Real User
Top 20
2024-08-13T12:17:00Z
Aug 13, 2024
We are not using Singularity Cloud Native Security's Offensive Security Engine. We used the Infrastructure as Code (IaC) Scanning initially. When the demo was given, we had to use that scanning, but it is not something that we keep running on a regular basis. Overall, I would rate it a nine out of ten. I am quite happy with the service and the value that it provides. The one point that I am not giving is because of the pricing model. If it had a more flexible pricing model, I would rate it a ten out of ten.
Sr. Security Engineer at a energy/utilities company with 10,001+ employees
Real User
Top 20
2024-07-22T19:58:00Z
Jul 22, 2024
I would rate SentinelOne Singularity Cloud Security eight out of ten. Sometimes, Singularity incorrectly flags legitimate files as malware or suspicious, which can disrupt the work of some project users. However, we understand the importance of protecting against potential threats and appreciate Singularity's proactive approach. We can easily whitelist false positives, minimizing productivity impact and ensuring our system remains secure. SentinelOne Singularity Cloud Security is a valuable tool for organizations with the budget to invest in it. It offers robust protection for servers and endpoints, which are primary targets for security breaches. Given the critical nature of endpoint security, this software should not be overlooked. SentinelOne has a strong reputation, provides rapid response times, and includes features such as deep visibility into malicious files, enabling security administrators to isolate threats in the cloud through sandboxing directly. The only maintenance required is for agent upgrades.
Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
My company is a reseller of SentinelOne. It is one of the top solutions as per Gartner's Magic Quadrants. I am always interested in everything that comes from SentinelOne. I have watched the recent webinars about the latest launch of SentinelOne. There is going to be Purple AI. They have a new console, and we are waiting for it. What we see here is that companies or customers want more features. The gap between EDR and XDR is too large. XDR includes cloud workloads of the systems and network and not only the endpoints. SentinelOne EDR is a very good solution. You do not need to monitor the Windows operating system. SentinelOne can do this for you. For example, the registry of Windows is the most important part of the operating system. SentinelOne EDR can see what happens in the registry. It can warn about any modification in the registry. The Singularity ecosystem is very powerful. SentinelOne is very focused on expanding the reach of Singularity and making it a more comprehensive solution. SentinelOne is doing a very good job to get there. We believe that there will be a consolidation of the market, and SentinelOne will survive this consolidation because SentinelOne Singularity is a very powerful and very good solution. I would rate SentinelOne Singularity Complete a nine out of ten. We have a very good relationship with SentinelOne.
Cloud Engineer at a construction company with 5,001-10,000 employees
Real User
Top 20
2024-05-13T11:38:00Z
May 13, 2024
I would rate Singularity Cloud Security by SentinelOne nine out of ten. Singularity Cloud Security is deployed in multiple departments and we have five users. Singularity Cloud Security occasionally requires scheduled downtime for maintenance, which allows our technicians to identify and address any potential problems. I recommend Singularity Cloud Security. It's streamlined our operations by reducing manual work and simplifying problem-solving. The user interface is intuitive, allowing even new hires to become proficient after just a few weeks of training.
Jr. Cloud Engineer at a construction company with 5,001-10,000 employees
Real User
Top 20
2024-05-10T09:02:00Z
May 10, 2024
I would rate Singularity Cloud Security by SentinelOne eight out of ten. There are ten users in our organization. No maintenance is required from our end. I recommend Singularity Cloud Security. After using the solution for a year and a half, our organization has found it valuable in identifying vulnerabilities within our environment.
IT Engineer at a construction company with 5,001-10,000 employees
Real User
Top 20
2024-05-09T12:55:00Z
May 9, 2024
I rate SentinelOne Singularity Cloud Security nine out of 10. I would recommend the tool to others. It's a convenient and cost-effective tool for identifying security breaches. You get everything in one place, saving you time and costs.
I would rate PingSafe ten out of ten. Our organization has over 35 members across various teams, each utilizing PingSafe according to their specific needs. No maintenance is required on our end. I recommend PingSafe to others. It has done a great job of improving our security posture.
IT Engineer at a manufacturing company with 10,001+ employees
Real User
Top 20
2024-05-03T07:06:00Z
May 3, 2024
I would rate PingSafe seven out of ten. We have around 20,000 users and have PingSafe deployed in multiple locations. While PingSafe does require maintenance, our engineering team prioritizes keeping it up-to-date to ensure the accuracy and security of the data that underpins our cloud security posture. I recommend PingSafe to others.
I would rate PingSafe nine out of ten. We have under 50 PingSafe users within our organization and it is deployed in one location. No maintenance is required on our end. I recommend PingSafe to others.
Cloud Engineer at a tech services company with 201-500 employees
Real User
Top 20
2024-04-26T16:50:00Z
Apr 26, 2024
You should be a little familiar with cloud security. Otherwise, you might face a few difficulties in accessing the PingSafe console. If you are a little familiar, it will be very easy for you. A completely new user without a technical background can get a bit confused by the naming conventions in the GUI. I would recommend PingSafe to others. Overall, I would rate PingSafe an eight out of ten.
Cloud Security & Architecture Specialist at a insurance company with 10,001+ employees
Real User
Top 20
2024-04-25T10:01:00Z
Apr 25, 2024
I would rate PingSafe eight out of ten. We have PingSafe accessible in multiple departments with a total of 20 users. There is no maintenance required from our end. While PingSafe advertises itself as a Cloud-Native Application Protection Platform solution, it offers some CNAPP functionalities but doesn't provide a fully comprehensive picture of your cloud security posture. In essence, it has some CNAPP capabilities, but it's not a complete CNAPP solution yet.
Senior Software Engineer at a consultancy with 51-200 employees
Real User
Top 20
2024-04-24T09:30:00Z
Apr 24, 2024
PingSafe regularly sends us messages on Slack for cloud security monitoring if it finds a certain security threat. If the area revolving around the security threat is something my company wants to look into, we just quickly check the product to see if there is a quick fix, and if there are no solutions, then we find a way to deal with it. A person from our company's team regularly tries to fix all the issues raised by PingSafe so that it is ISO compatible, and right now, my company is close to achieving it. Speaking about the issues my company was trying to resolve by implementing PingSafe in our environment, I would say that whatever issues the tool has raised till now are related to certain policies that we might not have implemented in our IAM. There should only be certain roles that can access certain resources. The aforementioned area consists of the types of issues my company is currently trying to resolve so that we stay up to the mark. In my company, we don't have any regular threats that come up, but they are mainly used in regard to policies. Considering how much I have used it to date, I can say that it is an easy-to-use product. However, I have not used the product in-depth, so I can't comment much about it. If I assess the evidence-based reporting for helping prioritize and solve important cloud security issues, I would say that the concerns raised by the product are valid ones, and it is important to deal with them. Though I am not sure what the question entails, I feel that the issues raised by the product are proper, and they should be resolved before actually implementing its features. I think it is very important for the solution to include proof of exploitability in evidence-based reporting. You have to know what things might go wrong if an issue is not resolved, and it makes it easier for us to assess key issues and to decide which areas should be taken into priority, considering what potential issues might crop up in the long run or short term. In general, PingSafe is a quite helpful tool. The most valuable feature of the tool in terms of real-time threat detection stems from the alerts my company receives via Slack. I think the alert feature is something I have majorly looked into, but I haven't explored many of PingSafe's features. Whether the compliance monitoring capabilities of the tool have benefited our organization or not is something that we will get to know soon via its results in the next two or three months. My company is very close to getting ISO certification with PingSafe's help. I think if it gave our company a demo compliance feature, it could be helpful. The product's UI is good if I speak about the impact of its ease of use on security operations. The UI is very easy to navigate. Basically, I was able to navigate through the tool's dashboard. Overall, the tool's UI structure looks good. My company has rarely had to deal with an incident involving a false positive with PingSafe in place, and I believe that it happened at the end of the previous year. After that, my company didn't need to deal with any false positives. With PingSafe, the chances of seeing a false positive are rare. In terms of risk posture, after going through the recommendations provided by PingSafe during the implementation phase, I feel that my solution has helped my company get better and more secure because now we are less vulnerable to attacks. Overall, I think that the product is good for improving an organization's risk posture. In my company, we don't have any doubts about using the product since everything feels right with it. The tool has reduced the mean time to detect risks since, with the use of the tool, it has become faster as it is now done automatically. In my company, I operate in a very small team where we don't have a specific person or department giving us insights about a particular tool. The tool has reduced the mean time to detect risks by more than 50 percent. My company never scanned our own infrastructure until PingSafe did. Until my company had it in mind that we wanted to get an ISO certification, we never scanned our infrastructure. The mean time required to remediate is an area that has improved a lot. My company has never tried to resolve any issues since we have never detected any problems. The mean time to remediate has improved by more than 50 percent. The product can make the collaboration between cloud security application developers and AppSec teams better. In my company, we only have one team, and we don't have a few departments. The product has helped my company save a lot of engineering time because we don't have to put up physical resources to do many things, as they are managed automatically. In my company, we just have to employ one engineer to resolve everything. My company doesn't actually have to spend time detecting issues and then solving them as the tool solves them for us. I have not integrated the tool with the existing solutions in my company's infrastructure or workflows. I use it as a standalone product in my company. The product is used in just one location. I don't think that the product requires any maintenance. I don't think that my company does any maintenance for PingSafe. I recommend the product to those who plan to use it. I think the tool has a very good alerting system. The tool also gives a proper description of resources and alerts. I think that the tool is very good for meeting the certification compliance requirements. I rate the overall tool a 9 out of 10.
Lead Dev Ops Engineer at a recruiting/HR firm with 1,001-5,000 employees
Real User
Top 20
2024-04-23T15:00:00Z
Apr 23, 2024
The solution is very user-friendly in terms of ease of use. I do not use the product's reporting feature because another team in my company handles it. I know that my company uses the product's reporting feature to extract reports on a weekly, bi-weekly, and monthly basis, but I don't deal with it. I don't use the product's agentless vulnerability scanning. I check the reports that come to me, as I need to further check the resource tests attached to them, especially whatever resources are affected as per the reports. In general, I just go with the report and complete the task. I have not used Pingsafe's Offensive Security Engine. Pingsafe's IaC Scanning is a great functionality that is built into the product. It is one of the major functionalities that my company's team uses. With Pingsafe's IaC Scanning, it is easy to monitor and observe areas in a good way. Pingsafe's IaC Scanning role in identifying pre-production issues in IaC templates or container configuration files is helpful because when in my company, we configure IaC Scanning in our production environment, it gives a brief detail about what the resources and security groups or whatever resources are the most vulnerable, after which they get sorted into four categories, namely, low, medium, high and severe. The tool sorts out the resources into four categories before you go to the production phase, ensuring that they are good and secure. The main benefit of the use of the product in our company stems from the fact that it provides a vulnerability scanning report, which helps us to maintain the resources mainly, an area for which my team and organization use it. I experienced the benefits attached to the solution from the first day of using it, and before its use, I was not able to identify the issues in the resources. PingSafe gave me the value and the reports that helped me to identify the issues in resources. PingSafe's use has helped reduce the false positive rate. In the initial stages, my company had more than 100 severe cases, but within a month, we were able to reduce that to below 10 percent. With PingSafe, the mean time to detect has reduced because initially, for detection, I had to observe resources end to end. Now, the tool provides me with a regular report because of which I don't need to observe everything inside the resources. I just need to go to a particular resource and check what is stated in the ticket to see which ports are vulnerable, after which it can be changed, so I can directly go and check it, owing to which the tool definitely reduces the mean time to detect vulnerabilities. With PingSafe, the mean time to remediate is a maximum of twenty-four hours. Initially, in my company, we had to identify the problem and then proceed with remediation, but now we can do it directly since the report is already available. PingSafe has affected and helped me a bit to deal with the collaboration between cloud security application developers and AppSec teams because it helps me to keep my resources and tell the developers that we cannot expose them to the extent where the application will become vulnerable to attacks. In general, the tool is helpful since it reduces the time needed to connect DevOps and developers. I found the product to be pretty useful. I directly onboarded the product and started to use it. I did not find any difficulties with the tool. I rate the tool an 8 out of 10.
Works at a comms service provider with 1-10 employees
Real User
Top 20
2024-04-22T14:22:00Z
Apr 22, 2024
I'm a PingSafe customer. I'd rate the solution 8 out of 10. If someone is looking for a CPSM tool, they should look into PingSafe's capabilities to see if they match what a company needs.
Senior Devops Engineer at a financial services firm with 51-200 employees
Real User
Top 10
2024-04-22T09:59:00Z
Apr 22, 2024
I would rate PingSafe 9 out of 10. We have around five people in our organization who utilize PingSafe. We are all in the same location except for our consultant. PingSafe does not require maintenance from our end. I recommend PingSafe to others. It is compatible with most major cloud platforms. However, we did encounter some issues when using it with lesser-known cloud providers, such as Oracle.
I would rate PingSafe 5 out of 10. Our organization primarily relies on our internal scanning tool for IaC security. While many industry tools utilize open-source IaC scanning solutions under the hood, we haven't found significant value in adopting PingSafe's specific IaC offering. This solution might be more beneficial for organizations lacking dedicated SecOps teams, but its additional cost is a factor to consider. It should transition from an agent-based system to an agentless one. This is crucial because many industry tools are moving in this direction, and PingSafe should follow suit. They should also introduce more features, improve security compliance, and place greater focus on Kubernetes, RBAC systems, and visualization. If they do choose to maintain an agent-based system, they should significantly improve their metric collection capabilities. This would be beneficial because currently, customer response times seem to be slow. By addressing these requirements, PingSafe can ensure continued growth.
Senior Dev Ops Engineer at a computer software company with 51-200 employees
Real User
Top 20
2024-04-19T15:15:00Z
Apr 19, 2024
I rate PingSafe 8 out of 10 based on the features I have used. I haven't used all the features, but I give the vulnerability and compliance features 8 out of 10. I can recommend PingSafe for vulnerability scanning and compliance. There are many competitors, but I find PingSafe quite good, which is why we haven't switched to something else for the past 2 years.
Sr Security Analyst at a computer software company with 201-500 employees
Real User
Top 20
2024-04-19T11:12:00Z
Apr 19, 2024
The tool is easy to use. Compared to other products, PingSafe is the most easy to use. There are different severity categories, such as critical, high, medium, and low. We get notifications for critical things. Critical issues have the highest priority. The ability to prioritize the issues is helpful for us. Overall, I rate the product an eight out of ten.
The product is easy to use. My colleague provided me with a KT of the tool. I could learn to use it in two to three days. I understood how to check and resolve issues and segregate them into different severities. The ease of use is very helpful. Overall, I rate the tool a ten out of ten.
Suppose we find a volume not attached to any EC2 instance during scanning. PingSafe detects such vulnerabilities, and we try to resolve them. PingSafe is an easy-to-use solution. Everybody in my team works with PingSafe to monitor any vulnerabilities it detects. PingSafe is a good tool for security and vulnerability detection for me and my team. The solution is easy to use, and we are very familiar with the dashboard, which shows the criticality of particular problems. It also shows the link to a particular vulnerability or problem so that we can directly go to that particular problem. Through the solution's dashboard, we can see problems and detect vulnerabilities. Then, we assign each problem to another and try to resolve it. In the pre production environment, we used to try a blue/green deployment. If we try to get any alerts from that particular dashboard, PingSafe will detect them. PingSafe has improved our risk posture by 50% to 60%. Earlier, we couldn't identify the things created by mistake during production. If something is created by mistake or if we are unable to detect mistakes in the production environment, PingSafe scans and alerts us of any vulnerabilities. PingSafe takes approximately 4-5 hours to detect an issue. We conducted a test by creating one issue, which was highlighted in the PingSafe dashboard within four to five hours. The issue was still present in the PingSafe scan after we resolved it, and it was removed after four to five hours. PingSafe has helped reduce our mean time to remediate, and we immediately take action on the issue. In my opinion, PingSafe is really collaborative, and other teams use it at the utmost level. The solution is really helpful for us regarding system security. PingSafe has helped us save around 30% to 40% of engineering time. We just see the PingSafe dashboard for issues it has detected and try to resolve them as soon as possible. PingSafe has helped us save approximately 30% to 40% of our resources, time, and money. PingSafe is integrated with the AWS tool our team uses to detect vulnerabilities. PingSafe is a SaaS (Software as a service) solution. We have five to six accounts on PingSafe and use them in multiple locations. The solution does not require any maintenance. I would recommend the solution to other users. Overall, I rate PingSafe a 9 out of 10.
Senior DevOps Engineer at a tech services company with 501-1,000 employees
Real User
Top 20
2024-04-18T07:25:00Z
Apr 18, 2024
I rate PingSafe 7 out of 10. PingSafe isn't a unique solution. Other solutions have the same features, but I like PingSafe because it's simpler to use. It doesn't require any maintenance and the scalability is good. However, I think other solutions can give the same level of detail and insight.
Cloud Engineer at a tech services company with 201-500 employees
Real User
Top 20
2024-04-17T18:17:00Z
Apr 17, 2024
I would rate PingSafe 10 out of 10. No maintenance is required for PingSafe. Once you've acquired PingSafe, it's essential to review all your existing organizational policies. If these policies are compatible with your infrastructure, you can proceed without modifications. However, if there are any incompatibilities, you'll need to make adjustments to ensure your infrastructure triggers accurate alerts. Skipping this step can lead to a flood of false positives.
I would rate PingSafe 8 out of 10. We're planning to integrate PingSafe with our CI/CD pipeline and Slack. Currently, our only integration is with an email system, which means we receive alerts and notifications via email. We're evaluating the effectiveness of this approach. Integrating with tools like Jira or Slack could help manage the issue of false positives and notification overload, which currently requires the manual closing of alerts. We're still assessing the best course of action, but integration with Jira is a strong possibility. Around 15 people from our security and DevOps teams use PingSafe. PingSafe is a SaaS that is integrated with our main company and all our acquisitions. PingSafe does not require maintenance from our end. I recommend PingSafe to others for its cloud security capabilities. I particularly appreciate its offensive security approach. Coming from an offensive security background, I find PingSafe excels at identifying real threats that we can address immediately. This proactive approach is a major advantage of PingSafe. While the defensive side might involve some assumptions and possibilities, I believe the offensive capabilities are the key reason we use PingSafe.
Security Engineer at a venture capital & private equity firm with 1,001-5,000 employees
Real User
Top 20
2024-04-17T10:03:00Z
Apr 17, 2024
I would rate PingSafe 9 out of 10. For our organization, PingSafe must include evidence of exploitability in its evidence-based reporting and it does. We have 6 people in our organization that utilize PingSafe. PingSafe does not require maintenance from our end. I recommend PingSafe to others because it offers several advantages. One key benefit is that it saves a significant amount of manpower. This frees up our security engineers to focus on other assigned tasks. PingSafe is a valuable tool for automating tasks.
IT Architect at a tech services company with 10,001+ employees
Real User
Top 20
2024-04-17T08:59:00Z
Apr 17, 2024
I would rate PingSafe 7 out of 10. Four people in our organization utilize PingSafe. No maintenance is required from our end. I recommend PingSafe to others for CSPM.
To those evaluating PingSafe, I would advise understanding PingSafe's licensing metrics. You should understand how PingSafe calculates. That is very important because it is not straightforward. You should understand that, and you can talk to the support people. They are very good. They clearly explain it. The person who is dealing with it should have a technical background. He cannot be a business analyst. Make sure that you put in all the configurations on day one. You will find it difficult to compare if you keep building on top of it. Overall, I would rate PingSafe a 7 out of 10.
Cloud Security Engineer at eSec Forte® Technologies
Real User
Top 20
2024-04-16T16:15:00Z
Apr 16, 2024
We have not used PingSafe's agentless vulnerability scanning. We are trying to onboard all the features and enable them in our tenant. Currently, there are a few features that we have not enabled because we have onboarded some of the accounts as a single account. We are trying to onboard all the accounts at the org level, but we are facing some issues. We are communicating with the SentinelOne team. We are trying to get it done as soon as possible. We have done a PoC of IaC for some of the projects. In a couple of months, we will start with this feature. It is quite a good feature because we get to the issues in our code before deploying it. It is very good for developers and the Infra team. They do not have to worry after the deployment of the application. Overall, I would rate PingSafe a 10 out of 10. It is helpful. It is easy to use and easy to understand. It makes it easy to explain things to the customers.
SDE II/ Senior SRE at a computer software company with 1,001-5,000 employees
Real User
Top 20
2024-04-16T15:21:00Z
Apr 16, 2024
I would advise doing a PoC with all the similar tools and then making a decision based on the capabilities, features, and price. Overall, I would rate PingSafe a 9 out of 10.
Senior Director, Global Systems and Cyber Security at a tech services company with 5,001-10,000 employees
Real User
Top 10
2024-04-16T14:16:00Z
Apr 16, 2024
I would advise evaluating PingSafe based on the use cases. You should know what is required and how PingSafe can support that. If PingSafe is able to fulfill your cases, it will be good. A thorough evaluation and mapping of the organization's objective should be done before buying PingSafe. I would rate PingSafe an 8 out of 10. It is good.
Based on the things that we have tested, it does a pretty good job of alerting and reporting. If you have a highly scaled environment with 50 to 60 AWS clusters and you are looking for a tool that simplifies getting security logs, PingSafe is the perfect solution. It does the job. I would recommend PingSafe to others. PingSafe has an auto-remediation feature, but we are not using that because we have to give a lot of access to PingSafe for that. We are not willing to do so. That is why we do not use the auto-remediation offered by PingSafe. We just get the alerts, and then we act on them. We also do not use agentless vulnerability scanning, IaC scanning, and PingSafe's Offensive Security Engine. Overall, I would rate PingSafe an 8 out of 10.
We're a customer and end-user. I'm a DevOps engineer. I'd recommend the solution to others. I would rate it 10 out of 10 as it currently meets all of our requirements. I can't speak to other companies that may have different requirements.
Solution Cloud Architect at a insurance company with 501-1,000 employees
Real User
Top 20
2024-04-16T10:06:00Z
Apr 16, 2024
I'm a customer and end-user. It's a 100% available solution. It covers most of our cloud security requirements and has a nice interface. Support could be faster, though. When we're dealing with security, we don't want lots of time between responses. I'd rate the solution 7 out of 10.
Cloud Security Engineer & Consultant at a financial services firm with 10,001+ employees
Consultant
Top 20
2024-04-16T08:30:00Z
Apr 16, 2024
I'm a partner. The solution is cost-efficient, yet it needs more support accessibility. However, I would recommend this solution to others. I'd rate the product 5 out of 10 overall.
Application Security Manager at a tech company with 1,001-5,000 employees
Real User
Top 20
2024-04-15T19:37:00Z
Apr 15, 2024
We are a PingSafe customer. I'd rate the solution 9 out of 10. Overall, the tool is good. New users should be ready for a lot of issues that will come onto their dashboard. They'll need a team of three to four at the outset to analyze the dashboard and work through reported vulnerabilities.
I'd rate the solution 8 out of 10. There are a lot of options. It's a good idea to have a team member arrange on at least a quarterly basis, a review so that new team members can get up to speed on the product and everyone stays on the same page. This will help new team members understand the product.
I rate PingSafe 9 out of 10. I recommend that new users onboard as many features as possible. Don't just stick to the cloud security part. Integrate the cloud security with your containers and GitHub or Bitbucket repositories. Perform all the integrations whether you need them or not, and it will take care of everything on the back end for you.
I rate PingSafe 9 out of 10. I would recommend PingSafe to anyone. It saves time, makes your environment more secure, and improves compliance. PingSafe helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security.
Security Engineering Manager at a media company with 51-200 employees
Real User
Top 10
2024-04-15T08:13:00Z
Apr 15, 2024
I rate PingSafe 8 out of 10. I would recommend PingSafe to any company looking for a cloud security solution. It's more than a CSPM. It provides visibility into application security vulnerabilities and container security.
Engineering Security Manager at a recreational facilities/services company with 201-500 employees
Real User
Top 10
2024-04-15T06:58:00Z
Apr 15, 2024
I rate PingSafe 8 out of 10. PingSafe will meet all your requirements if you're looking for a cloud tool that covers IoC scanning, cloud misconfiguration, secret scanning, integration into the DevOps pipeline, and cloud-image scanning. It's a one-stop solution for all these requirements. It's a user-friendly tool that's easy to handle, and the support is excellent.
I would rate PingSafe nine out of ten. PingSafe requires monthly updates. Preparing for PingSafe is fairly straightforward, especially if you're familiar with cloud security posture management tools. However, if this is your first time using such a tool, be prepared for a significant number of findings. PingSafe will uncover security issues that manual efforts might miss.
Lead Data & Cloud Security Engineer at a media company with 501-1,000 employees
Real User
Top 20
2024-04-12T13:29:00Z
Apr 12, 2024
I would rate PingSafe eight out of ten. We initially considered the agentless vulnerability scanning as a cloud security management tool, not a host-based security solution. Therefore, we opted against installing agents. Instead, we simply connected our AWS accounts through IAM, allowing the scanner to comprehensively scan all necessary resources and gather the required information. The maintenance is taken care of by PingSafe directly. Before deploying PingSafe, it's important to fully understand all its capabilities. While we're currently using one specific feature, PingSafe offers a wide range of functionalities. Gaining a clear internal understanding of your specific needs for PingSafe will help you determine the optimal model. Focusing solely on features without a defined purpose can lead to unnecessary costs. It's more efficient to obtain a quote for the model that aligns with your current needs. As your requirements evolve, you can then expand functionality by integrating additional modules.
I would rate PingSafe eight out of ten. We have 15 people in our organization that use it. PingSafe is responsible for the maintenance. It is a sophisticated and fast-growing product with great services.
Cyber Defence Analyst at a media company with 51-200 employees
Real User
Top 10
2024-04-11T19:45:00Z
Apr 11, 2024
I would rate PingSafe nine out of ten. PingSafe does not require maintenance. It is easy to use, but it works best when you have established organizational practices in place. If you feel this is critical, don't hesitate to address it directly. Integrating PingSafe is straightforward, so there's no need to worry about that. It's a ready-made solution that can be integrated with just a click. You can then address the specific issues you find most important. Ideally, integrate all your relevant sources during onboarding, such as GitHub or any cloud accounts you use. This ensures you capture everything from the start and get the best possible results.
I'm an end-user. I'd rate the solution 9 out of 10. It's pretty easy to use. Integration with cloud infrastructure may require a bit of help in the initial stages. However, once you are up and running, finding vulnerabilities is simple and reporting is good.
CISO at a computer software company with 201-500 employees
Real User
Top 20
2024-03-12T15:37:00Z
Mar 12, 2024
I would rate PingSafe 8 out of 10. While components like cloud configuration, central security, and management volume boast zero maintenance, we do encounter situations with Kubernetes. Occasionally, security issues or container-specific security problems might cause the cluster to disconnect. In these cases, we need to manually intervene by running a batch script to re-onboard the cluster. This is the only instance of internal maintenance required. Before implementing PingSafe, organizations should consider the specific security challenges they're facing. For organizations that are at least 80 percent cloud-based, a CSPM solution becomes essential. Even for hybrid organizations with on-premises and cloud components, cloud security offers advantages in terms of maintenance ease, reliability, and cost-effectiveness. Key Considerations When Choosing a Security Solution: * Use Case: What specific security risks are you trying to mitigate? * Objectives: What are your security goals? * Incident Response Needs: Do you require detailed event logging and extensive incident response capabilities? Matching Use Cases to Solutions: * Customization: PingSafe excels in customization and can be tailored to meet specific needs. It's ideal for teams lacking extensive cloud security expertise to establish and refine security policies. While some organizations, including both large and small ones, might not require this level of control, it remains a valuable use case for others. * Targeted Security Features: Different use cases call for different security features. Container security or vulnerability management might be your primary concern. In some cases, PingSafe's vulnerability management can be used as a complementary solution alongside a more comprehensive primary tool. Ultimately, the decision comes down to your specific needs and deployment model. Don't get caught in the trap of seeking a one-size-fits-all solution. Consider your security team's capabilities and whether PingSafe can truly replace them or if it would function best as a complementary tool.
Cloud Security Specialist at a insurance company with 10,001+ employees
Real User
Top 20
2024-03-12T12:15:00Z
Mar 12, 2024
I would rate PingSafe 9 out of 10. Our primary cloud security monitoring solution is Prisma Cloud by Palo Alto Networks, with PingSafe as a secondary control measure. We have 19 users overall in our cloud security team that utilize PingSafe. The only maintenance required is for updates. I would recommend PingSafe to others.
I would recommend PingSafe as a cloud security solution. They are doing an excellent job of providing the features that we require for cloud security posture management. I would rate PingSafe a 10 out of 10.
I would advise integrating your Kubernetes clusters for extra features. Overall, I would rate the solution a nine out of ten because I'm happy with PingSafe overall. The number of features PingSafe offered with just a small team was phenomenal. Give them another six months to a year, and it could be one of the best tools out there.
SentinelOne Singularity Cloud Security protects cloud workloads, offering advanced threat detection and automated response. It integrates seamlessly with cloud environments and secures containerized applications and virtual machines against vulnerabilities.
SentinelOne Singularity Cloud Security is renowned for its efficiency in mitigating threats in real-time. The platform integrates effortlessly with existing cloud environments, ensuring robust cloud security management with minimal...
I would recommend this solution. I find it very user-friendly, and the documentation is also good enough to give solutions, which is very important. In addition to notifications, we also get solutions. I would rate Singularity Cloud Security a nine out of ten.
I would rate SentinelOne Cloud Security a nine out of ten. They are bringing all the pieces together, and once the Purple AI can interact with all the different components and correlate across them, I think that's where its real power will come from. SentinelOne CNAP was extremely helpful and chosen for three primary reasons: their responsive and efficient team facilitated a rapid deployment; the technology itself proved to be very robust and effective; and the platform's configurability allowed for seamless integration with our specific business needs. For those evaluating SentinelOne CNAP, it is advised to engage with their team for potential configuration changes. The tool offers comprehensive insights, providing productive usage from day one for penetration testers and security engineers.
I would rate SentinelOne Singularity Cloud Security nine out of ten. Currently, our cloud workload protection system is deployed for visibility only, without blocking capabilities or enforced policies. While we are not yet utilizing its full protection potential, this proactive approach allows our development, IT, and quality teams to gradually transition to containerized workloads over the next few years. SentinelOne's cloud workload protection tools provide the necessary functionality to secure our environment as teams adopt modern serverless methodologies. Although full implementation is an ongoing effort, having these tools in place ensures we can confidently secure our evolving infrastructure. We've thoroughly enjoyed our four-year partnership with SentinelOne. Their account management and readily available engineering support have been exemplary, setting a high standard for customer service. While escalations can sometimes experience delays, their responsiveness has been the best we've encountered. The entire organization, from account managers and engineers to the managed detection response service, operates cohesively. Cloud security is challenging, especially in multi-cloud environments, but as we use a single cloud provider, we leverage native security tools for detection and visibility. While we initially considered cloud-native protection unnecessary, we realized the limitations of relying solely on our provider's knowledge and visibility. Their data is inherently limited by their own experience. SentinelOne, with its global customer base across various cloud providers, offers broader threat intelligence. Learning from attacks across all cloud platforms, like Amazon, Azure, and Google, is crucial for a comprehensive security posture. By partnering with SentinelOne, we gain access to this wider threat landscape and benefit from a learned security environment. Our organization relies on Azure services. A key advantage of SentinelOne is its ability to serve customers across various data centers, including those hosted by Azure and Amazon. I recommend colleagues and professionals in information security give SentinelOne a try, as they will quickly see the benefits, especially if not working with modern cloud-based solutions. SentinelOne's capabilities in visibility and detection make it a valuable addition to any security strategy. SentinelOne's openness to customer feedback is impressive. I've served on other customer advisory boards, even for competitors, but SentinelOne stands out. They actively involve customers in shaping their products, including the user interface, detection rules, and Singularity AI Cloud components. This customer-centric approach fosters a mutually beneficial relationship where customer feedback directly enhances the security solutions. I encourage all SentinelOne customers to explore opportunities like beta testing, advisory boards, or UX feedback programs. The company's success translates to improved security for organizations like mine, and the close collaboration builds a strong, valuable partnership. Seeing our feedback implemented in their products is truly remarkable.
I would rate SentinelOne Singularity Cloud Security nine out of ten. The partnership between SentinelOne and AWS, particularly the Singularity Cloud integrations, provides streamlined access to actionable information from AWS. I would tell anybody considering Singularity Cloud Security to absolutely proceed. SentinelOne has been phenomenal to work with, and I am looking forward to a continued partnership as they innovate and integrate AI, consistently rolling out new features.
We are not using Singularity Cloud Native Security's Offensive Security Engine. We used the Infrastructure as Code (IaC) Scanning initially. When the demo was given, we had to use that scanning, but it is not something that we keep running on a regular basis. Overall, I would rate it a nine out of ten. I am quite happy with the service and the value that it provides. The one point that I am not giving is because of the pricing model. If it had a more flexible pricing model, I would rate it a ten out of ten.
I would rate SentinelOne Singularity Cloud Security eight out of ten. Sometimes, Singularity incorrectly flags legitimate files as malware or suspicious, which can disrupt the work of some project users. However, we understand the importance of protecting against potential threats and appreciate Singularity's proactive approach. We can easily whitelist false positives, minimizing productivity impact and ensuring our system remains secure. SentinelOne Singularity Cloud Security is a valuable tool for organizations with the budget to invest in it. It offers robust protection for servers and endpoints, which are primary targets for security breaches. Given the critical nature of endpoint security, this software should not be overlooked. SentinelOne has a strong reputation, provides rapid response times, and includes features such as deep visibility into malicious files, enabling security administrators to isolate threats in the cloud through sandboxing directly. The only maintenance required is for agent upgrades.
My company is a reseller of SentinelOne. It is one of the top solutions as per Gartner's Magic Quadrants. I am always interested in everything that comes from SentinelOne. I have watched the recent webinars about the latest launch of SentinelOne. There is going to be Purple AI. They have a new console, and we are waiting for it. What we see here is that companies or customers want more features. The gap between EDR and XDR is too large. XDR includes cloud workloads of the systems and network and not only the endpoints. SentinelOne EDR is a very good solution. You do not need to monitor the Windows operating system. SentinelOne can do this for you. For example, the registry of Windows is the most important part of the operating system. SentinelOne EDR can see what happens in the registry. It can warn about any modification in the registry. The Singularity ecosystem is very powerful. SentinelOne is very focused on expanding the reach of Singularity and making it a more comprehensive solution. SentinelOne is doing a very good job to get there. We believe that there will be a consolidation of the market, and SentinelOne will survive this consolidation because SentinelOne Singularity is a very powerful and very good solution. I would rate SentinelOne Singularity Complete a nine out of ten. We have a very good relationship with SentinelOne.
I would rate Singularity Cloud Security by SentinelOne nine out of ten. Singularity Cloud Security is deployed in multiple departments and we have five users. Singularity Cloud Security occasionally requires scheduled downtime for maintenance, which allows our technicians to identify and address any potential problems. I recommend Singularity Cloud Security. It's streamlined our operations by reducing manual work and simplifying problem-solving. The user interface is intuitive, allowing even new hires to become proficient after just a few weeks of training.
I would rate Singularity Cloud Security by SentinelOne eight out of ten. We have over 400 users in our organization.
I would rate Singularity Cloud Security by SentinelOne eight out of ten. There are ten users in our organization. No maintenance is required from our end. I recommend Singularity Cloud Security. After using the solution for a year and a half, our organization has found it valuable in identifying vulnerabilities within our environment.
I rate SentinelOne Singularity Cloud Security nine out of 10. I would recommend the tool to others. It's a convenient and cost-effective tool for identifying security breaches. You get everything in one place, saving you time and costs.
I would rate PingSafe ten out of ten. Our organization has over 35 members across various teams, each utilizing PingSafe according to their specific needs. No maintenance is required on our end. I recommend PingSafe to others. It has done a great job of improving our security posture.
I would rate PingSafe eight out of ten. I recommend PingSafe to others.
I would rate PingSafe nine out of ten. We have around five people working with PingSafe. No maintenance is required for PingSafe.
I would rate PingSafe seven out of ten. We have around 20,000 users and have PingSafe deployed in multiple locations. While PingSafe does require maintenance, our engineering team prioritizes keeping it up-to-date to ensure the accuracy and security of the data that underpins our cloud security posture. I recommend PingSafe to others.
I would rate PingSafe nine out of ten. We have under 50 PingSafe users within our organization and it is deployed in one location. No maintenance is required on our end. I recommend PingSafe to others.
I rate PingSafe 10 out of 10.
You should be a little familiar with cloud security. Otherwise, you might face a few difficulties in accessing the PingSafe console. If you are a little familiar, it will be very easy for you. A completely new user without a technical background can get a bit confused by the naming conventions in the GUI. I would recommend PingSafe to others. Overall, I would rate PingSafe an eight out of ten.
I would rate PingSafe eight out of ten. We have PingSafe accessible in multiple departments with a total of 20 users. There is no maintenance required from our end. While PingSafe advertises itself as a Cloud-Native Application Protection Platform solution, it offers some CNAPP functionalities but doesn't provide a fully comprehensive picture of your cloud security posture. In essence, it has some CNAPP capabilities, but it's not a complete CNAPP solution yet.
PingSafe regularly sends us messages on Slack for cloud security monitoring if it finds a certain security threat. If the area revolving around the security threat is something my company wants to look into, we just quickly check the product to see if there is a quick fix, and if there are no solutions, then we find a way to deal with it. A person from our company's team regularly tries to fix all the issues raised by PingSafe so that it is ISO compatible, and right now, my company is close to achieving it. Speaking about the issues my company was trying to resolve by implementing PingSafe in our environment, I would say that whatever issues the tool has raised till now are related to certain policies that we might not have implemented in our IAM. There should only be certain roles that can access certain resources. The aforementioned area consists of the types of issues my company is currently trying to resolve so that we stay up to the mark. In my company, we don't have any regular threats that come up, but they are mainly used in regard to policies. Considering how much I have used it to date, I can say that it is an easy-to-use product. However, I have not used the product in-depth, so I can't comment much about it. If I assess the evidence-based reporting for helping prioritize and solve important cloud security issues, I would say that the concerns raised by the product are valid ones, and it is important to deal with them. Though I am not sure what the question entails, I feel that the issues raised by the product are proper, and they should be resolved before actually implementing its features. I think it is very important for the solution to include proof of exploitability in evidence-based reporting. You have to know what things might go wrong if an issue is not resolved, and it makes it easier for us to assess key issues and to decide which areas should be taken into priority, considering what potential issues might crop up in the long run or short term. In general, PingSafe is a quite helpful tool. The most valuable feature of the tool in terms of real-time threat detection stems from the alerts my company receives via Slack. I think the alert feature is something I have majorly looked into, but I haven't explored many of PingSafe's features. Whether the compliance monitoring capabilities of the tool have benefited our organization or not is something that we will get to know soon via its results in the next two or three months. My company is very close to getting ISO certification with PingSafe's help. I think if it gave our company a demo compliance feature, it could be helpful. The product's UI is good if I speak about the impact of its ease of use on security operations. The UI is very easy to navigate. Basically, I was able to navigate through the tool's dashboard. Overall, the tool's UI structure looks good. My company has rarely had to deal with an incident involving a false positive with PingSafe in place, and I believe that it happened at the end of the previous year. After that, my company didn't need to deal with any false positives. With PingSafe, the chances of seeing a false positive are rare. In terms of risk posture, after going through the recommendations provided by PingSafe during the implementation phase, I feel that my solution has helped my company get better and more secure because now we are less vulnerable to attacks. Overall, I think that the product is good for improving an organization's risk posture. In my company, we don't have any doubts about using the product since everything feels right with it. The tool has reduced the mean time to detect risks since, with the use of the tool, it has become faster as it is now done automatically. In my company, I operate in a very small team where we don't have a specific person or department giving us insights about a particular tool. The tool has reduced the mean time to detect risks by more than 50 percent. My company never scanned our own infrastructure until PingSafe did. Until my company had it in mind that we wanted to get an ISO certification, we never scanned our infrastructure. The mean time required to remediate is an area that has improved a lot. My company has never tried to resolve any issues since we have never detected any problems. The mean time to remediate has improved by more than 50 percent. The product can make the collaboration between cloud security application developers and AppSec teams better. In my company, we only have one team, and we don't have a few departments. The product has helped my company save a lot of engineering time because we don't have to put up physical resources to do many things, as they are managed automatically. In my company, we just have to employ one engineer to resolve everything. My company doesn't actually have to spend time detecting issues and then solving them as the tool solves them for us. I have not integrated the tool with the existing solutions in my company's infrastructure or workflows. I use it as a standalone product in my company. The product is used in just one location. I don't think that the product requires any maintenance. I don't think that my company does any maintenance for PingSafe. I recommend the product to those who plan to use it. I think the tool has a very good alerting system. The tool also gives a proper description of resources and alerts. I think that the tool is very good for meeting the certification compliance requirements. I rate the overall tool a 9 out of 10.
The solution is very user-friendly in terms of ease of use. I do not use the product's reporting feature because another team in my company handles it. I know that my company uses the product's reporting feature to extract reports on a weekly, bi-weekly, and monthly basis, but I don't deal with it. I don't use the product's agentless vulnerability scanning. I check the reports that come to me, as I need to further check the resource tests attached to them, especially whatever resources are affected as per the reports. In general, I just go with the report and complete the task. I have not used Pingsafe's Offensive Security Engine. Pingsafe's IaC Scanning is a great functionality that is built into the product. It is one of the major functionalities that my company's team uses. With Pingsafe's IaC Scanning, it is easy to monitor and observe areas in a good way. Pingsafe's IaC Scanning role in identifying pre-production issues in IaC templates or container configuration files is helpful because when in my company, we configure IaC Scanning in our production environment, it gives a brief detail about what the resources and security groups or whatever resources are the most vulnerable, after which they get sorted into four categories, namely, low, medium, high and severe. The tool sorts out the resources into four categories before you go to the production phase, ensuring that they are good and secure. The main benefit of the use of the product in our company stems from the fact that it provides a vulnerability scanning report, which helps us to maintain the resources mainly, an area for which my team and organization use it. I experienced the benefits attached to the solution from the first day of using it, and before its use, I was not able to identify the issues in the resources. PingSafe gave me the value and the reports that helped me to identify the issues in resources. PingSafe's use has helped reduce the false positive rate. In the initial stages, my company had more than 100 severe cases, but within a month, we were able to reduce that to below 10 percent. With PingSafe, the mean time to detect has reduced because initially, for detection, I had to observe resources end to end. Now, the tool provides me with a regular report because of which I don't need to observe everything inside the resources. I just need to go to a particular resource and check what is stated in the ticket to see which ports are vulnerable, after which it can be changed, so I can directly go and check it, owing to which the tool definitely reduces the mean time to detect vulnerabilities. With PingSafe, the mean time to remediate is a maximum of twenty-four hours. Initially, in my company, we had to identify the problem and then proceed with remediation, but now we can do it directly since the report is already available. PingSafe has affected and helped me a bit to deal with the collaboration between cloud security application developers and AppSec teams because it helps me to keep my resources and tell the developers that we cannot expose them to the extent where the application will become vulnerable to attacks. In general, the tool is helpful since it reduces the time needed to connect DevOps and developers. I found the product to be pretty useful. I directly onboarded the product and started to use it. I did not find any difficulties with the tool. I rate the tool an 8 out of 10.
I'm a customer. I'd rate the solution 8 out of 10. It's important to learn about the solution first. However, it is easy to use and quick to pick up.
I'm a PingSafe customer. I'd rate the solution 8 out of 10. If someone is looking for a CPSM tool, they should look into PingSafe's capabilities to see if they match what a company needs.
I would rate PingSafe 9 out of 10. We have around five people in our organization who utilize PingSafe. We are all in the same location except for our consultant. PingSafe does not require maintenance from our end. I recommend PingSafe to others. It is compatible with most major cloud platforms. However, we did encounter some issues when using it with lesser-known cloud providers, such as Oracle.
I would rate PingSafe 5 out of 10. Our organization primarily relies on our internal scanning tool for IaC security. While many industry tools utilize open-source IaC scanning solutions under the hood, we haven't found significant value in adopting PingSafe's specific IaC offering. This solution might be more beneficial for organizations lacking dedicated SecOps teams, but its additional cost is a factor to consider. It should transition from an agent-based system to an agentless one. This is crucial because many industry tools are moving in this direction, and PingSafe should follow suit. They should also introduce more features, improve security compliance, and place greater focus on Kubernetes, RBAC systems, and visualization. If they do choose to maintain an agent-based system, they should significantly improve their metric collection capabilities. This would be beneficial because currently, customer response times seem to be slow. By addressing these requirements, PingSafe can ensure continued growth.
I rate PingSafe 8 out of 10 based on the features I have used. I haven't used all the features, but I give the vulnerability and compliance features 8 out of 10. I can recommend PingSafe for vulnerability scanning and compliance. There are many competitors, but I find PingSafe quite good, which is why we haven't switched to something else for the past 2 years.
The tool is easy to use. Compared to other products, PingSafe is the most easy to use. There are different severity categories, such as critical, high, medium, and low. We get notifications for critical things. Critical issues have the highest priority. The ability to prioritize the issues is helpful for us. Overall, I rate the product an eight out of ten.
The product is easy to use. My colleague provided me with a KT of the tool. I could learn to use it in two to three days. I understood how to check and resolve issues and segregate them into different severities. The ease of use is very helpful. Overall, I rate the tool a ten out of ten.
Suppose we find a volume not attached to any EC2 instance during scanning. PingSafe detects such vulnerabilities, and we try to resolve them. PingSafe is an easy-to-use solution. Everybody in my team works with PingSafe to monitor any vulnerabilities it detects. PingSafe is a good tool for security and vulnerability detection for me and my team. The solution is easy to use, and we are very familiar with the dashboard, which shows the criticality of particular problems. It also shows the link to a particular vulnerability or problem so that we can directly go to that particular problem. Through the solution's dashboard, we can see problems and detect vulnerabilities. Then, we assign each problem to another and try to resolve it. In the pre production environment, we used to try a blue/green deployment. If we try to get any alerts from that particular dashboard, PingSafe will detect them. PingSafe has improved our risk posture by 50% to 60%. Earlier, we couldn't identify the things created by mistake during production. If something is created by mistake or if we are unable to detect mistakes in the production environment, PingSafe scans and alerts us of any vulnerabilities. PingSafe takes approximately 4-5 hours to detect an issue. We conducted a test by creating one issue, which was highlighted in the PingSafe dashboard within four to five hours. The issue was still present in the PingSafe scan after we resolved it, and it was removed after four to five hours. PingSafe has helped reduce our mean time to remediate, and we immediately take action on the issue. In my opinion, PingSafe is really collaborative, and other teams use it at the utmost level. The solution is really helpful for us regarding system security. PingSafe has helped us save around 30% to 40% of engineering time. We just see the PingSafe dashboard for issues it has detected and try to resolve them as soon as possible. PingSafe has helped us save approximately 30% to 40% of our resources, time, and money. PingSafe is integrated with the AWS tool our team uses to detect vulnerabilities. PingSafe is a SaaS (Software as a service) solution. We have five to six accounts on PingSafe and use them in multiple locations. The solution does not require any maintenance. I would recommend the solution to other users. Overall, I rate PingSafe a 9 out of 10.
I rate PingSafe 7 out of 10. PingSafe isn't a unique solution. Other solutions have the same features, but I like PingSafe because it's simpler to use. It doesn't require any maintenance and the scalability is good. However, I think other solutions can give the same level of detail and insight.
I would rate PingSafe 10 out of 10. No maintenance is required for PingSafe. Once you've acquired PingSafe, it's essential to review all your existing organizational policies. If these policies are compatible with your infrastructure, you can proceed without modifications. However, if there are any incompatibilities, you'll need to make adjustments to ensure your infrastructure triggers accurate alerts. Skipping this step can lead to a flood of false positives.
I would rate PingSafe 8 out of 10. We're planning to integrate PingSafe with our CI/CD pipeline and Slack. Currently, our only integration is with an email system, which means we receive alerts and notifications via email. We're evaluating the effectiveness of this approach. Integrating with tools like Jira or Slack could help manage the issue of false positives and notification overload, which currently requires the manual closing of alerts. We're still assessing the best course of action, but integration with Jira is a strong possibility. Around 15 people from our security and DevOps teams use PingSafe. PingSafe is a SaaS that is integrated with our main company and all our acquisitions. PingSafe does not require maintenance from our end. I recommend PingSafe to others for its cloud security capabilities. I particularly appreciate its offensive security approach. Coming from an offensive security background, I find PingSafe excels at identifying real threats that we can address immediately. This proactive approach is a major advantage of PingSafe. While the defensive side might involve some assumptions and possibilities, I believe the offensive capabilities are the key reason we use PingSafe.
I would rate PingSafe 9 out of 10. For our organization, PingSafe must include evidence of exploitability in its evidence-based reporting and it does. We have 6 people in our organization that utilize PingSafe. PingSafe does not require maintenance from our end. I recommend PingSafe to others because it offers several advantages. One key benefit is that it saves a significant amount of manpower. This frees up our security engineers to focus on other assigned tasks. PingSafe is a valuable tool for automating tasks.
I would rate PingSafe 7 out of 10. Four people in our organization utilize PingSafe. No maintenance is required from our end. I recommend PingSafe to others for CSPM.
I would recommend PingSafe to others. Overall, I would rate PingSafe a 9 out of 10.
To those evaluating PingSafe, I would advise understanding PingSafe's licensing metrics. You should understand how PingSafe calculates. That is very important because it is not straightforward. You should understand that, and you can talk to the support people. They are very good. They clearly explain it. The person who is dealing with it should have a technical background. He cannot be a business analyst. Make sure that you put in all the configurations on day one. You will find it difficult to compare if you keep building on top of it. Overall, I would rate PingSafe a 7 out of 10.
We have not used PingSafe's agentless vulnerability scanning. We are trying to onboard all the features and enable them in our tenant. Currently, there are a few features that we have not enabled because we have onboarded some of the accounts as a single account. We are trying to onboard all the accounts at the org level, but we are facing some issues. We are communicating with the SentinelOne team. We are trying to get it done as soon as possible. We have done a PoC of IaC for some of the projects. In a couple of months, we will start with this feature. It is quite a good feature because we get to the issues in our code before deploying it. It is very good for developers and the Infra team. They do not have to worry after the deployment of the application. Overall, I would rate PingSafe a 10 out of 10. It is helpful. It is easy to use and easy to understand. It makes it easy to explain things to the customers.
I would advise doing a PoC with all the similar tools and then making a decision based on the capabilities, features, and price. Overall, I would rate PingSafe a 9 out of 10.
I would advise evaluating PingSafe based on the use cases. You should know what is required and how PingSafe can support that. If PingSafe is able to fulfill your cases, it will be good. A thorough evaluation and mapping of the organization's objective should be done before buying PingSafe. I would rate PingSafe an 8 out of 10. It is good.
Based on the things that we have tested, it does a pretty good job of alerting and reporting. If you have a highly scaled environment with 50 to 60 AWS clusters and you are looking for a tool that simplifies getting security logs, PingSafe is the perfect solution. It does the job. I would recommend PingSafe to others. PingSafe has an auto-remediation feature, but we are not using that because we have to give a lot of access to PingSafe for that. We are not willing to do so. That is why we do not use the auto-remediation offered by PingSafe. We just get the alerts, and then we act on them. We also do not use agentless vulnerability scanning, IaC scanning, and PingSafe's Offensive Security Engine. Overall, I would rate PingSafe an 8 out of 10.
We're a customer and end-user. I'm a DevOps engineer. I'd recommend the solution to others. I would rate it 10 out of 10 as it currently meets all of our requirements. I can't speak to other companies that may have different requirements.
I'm a customer and end-user. It's a 100% available solution. It covers most of our cloud security requirements and has a nice interface. Support could be faster, though. When we're dealing with security, we don't want lots of time between responses. I'd rate the solution 7 out of 10.
I'm a partner. The solution is cost-efficient, yet it needs more support accessibility. However, I would recommend this solution to others. I'd rate the product 5 out of 10 overall.
I'd recommend the solution to other users. Overall, I'd rate the product 8 out of 10.
We are a PingSafe customer. I'd rate the solution 9 out of 10. Overall, the tool is good. New users should be ready for a lot of issues that will come onto their dashboard. They'll need a team of three to four at the outset to analyze the dashboard and work through reported vulnerabilities.
I'd rate the solution 8 out of 10. There are a lot of options. It's a good idea to have a team member arrange on at least a quarterly basis, a review so that new team members can get up to speed on the product and everyone stays on the same page. This will help new team members understand the product.
I'd rate the solution 9 out of 10. The usability is very good. Both their new and mature products are good in terms of their overall usability.
I rate PingSafe 9 out of 10. I recommend that new users onboard as many features as possible. Don't just stick to the cloud security part. Integrate the cloud security with your containers and GitHub or Bitbucket repositories. Perform all the integrations whether you need them or not, and it will take care of everything on the back end for you.
I rate PingSafe 9 out of 10 and would recommend it to others. It's easy to use.
I rate PingSafe 9 out of 10. This is the best solution on the market. They are doing an excellent job.
I rate PingSafe 9 out of 10. I would recommend PingSafe to anyone. It saves time, makes your environment more secure, and improves compliance. PingSafe helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security.
I rate PingSafe 8 out of 10. I would recommend PingSafe to any company looking for a cloud security solution. It's more than a CSPM. It provides visibility into application security vulnerabilities and container security.
I rate PingSafe 8 out of 10. PingSafe will meet all your requirements if you're looking for a cloud tool that covers IoC scanning, cloud misconfiguration, secret scanning, integration into the DevOps pipeline, and cloud-image scanning. It's a one-stop solution for all these requirements. It's a user-friendly tool that's easy to handle, and the support is excellent.
I would rate PingSafe nine out of ten. PingSafe requires monthly updates. Preparing for PingSafe is fairly straightforward, especially if you're familiar with cloud security posture management tools. However, if this is your first time using such a tool, be prepared for a significant number of findings. PingSafe will uncover security issues that manual efforts might miss.
I would rate PingSafe eight out of ten. We initially considered the agentless vulnerability scanning as a cloud security management tool, not a host-based security solution. Therefore, we opted against installing agents. Instead, we simply connected our AWS accounts through IAM, allowing the scanner to comprehensively scan all necessary resources and gather the required information. The maintenance is taken care of by PingSafe directly. Before deploying PingSafe, it's important to fully understand all its capabilities. While we're currently using one specific feature, PingSafe offers a wide range of functionalities. Gaining a clear internal understanding of your specific needs for PingSafe will help you determine the optimal model. Focusing solely on features without a defined purpose can lead to unnecessary costs. It's more efficient to obtain a quote for the model that aligns with your current needs. As your requirements evolve, you can then expand functionality by integrating additional modules.
I would rate PingSafe eight out of ten. We have 15 people in our organization that use it. PingSafe is responsible for the maintenance. It is a sophisticated and fast-growing product with great services.
I would rate PingSafe nine out of ten. PingSafe does not require maintenance. It is easy to use, but it works best when you have established organizational practices in place. If you feel this is critical, don't hesitate to address it directly. Integrating PingSafe is straightforward, so there's no need to worry about that. It's a ready-made solution that can be integrated with just a click. You can then address the specific issues you find most important. Ideally, integrate all your relevant sources during onboarding, such as GitHub or any cloud accounts you use. This ensures you capture everything from the start and get the best possible results.
I'm an end-user. I'd rate the solution 9 out of 10. It's pretty easy to use. Integration with cloud infrastructure may require a bit of help in the initial stages. However, once you are up and running, finding vulnerabilities is simple and reporting is good.
I would rate PingSafe 9 out of 10. 10 people in our organization use PingSafe. I recommend PingSafe to others.
I would rate PingSafe 8 out of 10. While components like cloud configuration, central security, and management volume boast zero maintenance, we do encounter situations with Kubernetes. Occasionally, security issues or container-specific security problems might cause the cluster to disconnect. In these cases, we need to manually intervene by running a batch script to re-onboard the cluster. This is the only instance of internal maintenance required. Before implementing PingSafe, organizations should consider the specific security challenges they're facing. For organizations that are at least 80 percent cloud-based, a CSPM solution becomes essential. Even for hybrid organizations with on-premises and cloud components, cloud security offers advantages in terms of maintenance ease, reliability, and cost-effectiveness. Key Considerations When Choosing a Security Solution: * Use Case: What specific security risks are you trying to mitigate? * Objectives: What are your security goals? * Incident Response Needs: Do you require detailed event logging and extensive incident response capabilities? Matching Use Cases to Solutions: * Customization: PingSafe excels in customization and can be tailored to meet specific needs. It's ideal for teams lacking extensive cloud security expertise to establish and refine security policies. While some organizations, including both large and small ones, might not require this level of control, it remains a valuable use case for others. * Targeted Security Features: Different use cases call for different security features. Container security or vulnerability management might be your primary concern. In some cases, PingSafe's vulnerability management can be used as a complementary solution alongside a more comprehensive primary tool. Ultimately, the decision comes down to your specific needs and deployment model. Don't get caught in the trap of seeking a one-size-fits-all solution. Consider your security team's capabilities and whether PingSafe can truly replace them or if it would function best as a complementary tool.
I would rate PingSafe 9 out of 10. Our primary cloud security monitoring solution is Prisma Cloud by Palo Alto Networks, with PingSafe as a secondary control measure. We have 19 users overall in our cloud security team that utilize PingSafe. The only maintenance required is for updates. I would recommend PingSafe to others.
I would recommend PingSafe as a cloud security solution. They are doing an excellent job of providing the features that we require for cloud security posture management. I would rate PingSafe a 10 out of 10.
I would rate PingSafe ten out of ten. We have a large number of users of PingSafe in our organization. I recommend PingSafe to others.
I would advise integrating your Kubernetes clusters for extra features. Overall, I would rate the solution a nine out of ten because I'm happy with PingSafe overall. The number of features PingSafe offered with just a small team was phenomenal. Give them another six months to a year, and it could be one of the best tools out there.
I would rate it 8 out of 10.