Lead Dev Ops Engineer at a recruiting/HR firm with 1,001-5,000 employees
Real User
Top 20
2024-04-23T15:00:00Z
Apr 23, 2024
The solution's most valuable features are its ability to detect vulnerabilities inside AWS resources and its ability to rescan after a specific duration set by the administrator.
Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
Senior DevOps Engineer at a tech services company with 501-1,000 employees
Real User
Top 10
2024-04-18T07:25:00Z
Apr 18, 2024
PingSafe can integrate all your cloud accounts and resources you create in the AWS account, We have set it up to scan the AWS transfer services, EC2, security groups, and GitHub.
Cloud Engineer at a construction company with 5,001-10,000 employees
Real User
Top 20
2024-04-17T07:16:00Z
Apr 17, 2024
It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature.
Cloud Security Engineer at eSec Forte® Technologies
Real User
Top 20
2024-04-16T16:15:00Z
Apr 16, 2024
The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well.
Senior Director, Global Systems and Cyber Security at a tech services company with 5,001-10,000 employees
Real User
Top 10
2024-04-16T14:16:00Z
Apr 16, 2024
The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue.
The multi-cloud support is valuable. They are expanding to different clouds. It is not restricted to only AWS. It allows us to have different clouds on one platform.
PingSafe released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. PingSafe's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue.
We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment.
It saves time, makes your environment more secure, and improves compliance. PingSafe helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security.
Security Engineering Manager at a media company with 51-200 employees
Real User
Top 10
2024-04-15T08:13:00Z
Apr 15, 2024
As a frequently audited company, we value PingSafe's compliance monitoring features. They give us a report with a compliance score for how well we meet certain regulatory standards, like HIPAA. We can show our compliance as a percentage. It's also a way to show that we are serious about security.
The most valuable feature of PingSafe is its integration with most of our technology stack, specifically all of our cloud platforms and ticketing software.
I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us.
Lead Security Engineer at Reward360 Global Services Pvt Ltd.
Real User
Top 20
2024-03-04T09:00:00Z
Mar 4, 2024
PingSafe's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities.
Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.
SentinelOne Singularity Cloud Security protects cloud workloads, offering advanced threat detection and automated response. It integrates seamlessly with cloud environments and secures containerized applications and virtual machines against vulnerabilities.
SentinelOne Singularity Cloud Security is renowned for its efficiency in mitigating threats in real-time. The platform integrates effortlessly with existing cloud environments, ensuring robust cloud security management with minimal...
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features.
The solution's most valuable features are its ability to detect vulnerabilities inside AWS resources and its ability to rescan after a specific duration set by the administrator.
The solution is a good alerting tool.
It's positively affected the communication between cloud security, application developers, and AppSec teams.
PingSafe's most valuable feature is its unified console.
The user interface is well-designed and easy to navigate.
We like PingSafe's vulnerability assessment and management features, and its vulnerability databases.
PingSafe has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability.
PingSafe can integrate all your cloud accounts and resources you create in the AWS account, We have set it up to scan the AWS transfer services, EC2, security groups, and GitHub.
The cloud misconfiguration is the most valuable feature.
The UI is responsive and user-friendly.
PingSafe's graph explorer is a valuable tool that lets us visualize all connected services.
All the features we use are equal and get the job done.
It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature.
It is very straightforward. It is not complicated. For the information that it provides, it does a pretty good job.
The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well.
We liked the search bar in PingSafe. It is a global search. We were able to get some insights from there.
The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue.
The multi-cloud support is valuable. They are expanding to different clouds. It is not restricted to only AWS. It allows us to have different clouds on one platform.
Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful.
We use the infrastructure as code scanning, which is good.
The UI is very good.
There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring.
We noted immediate benefits from using the solution.
The mean time to detect has been reduced.
The agentless vulnerability scanning is great.
PingSafe released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. PingSafe's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue.
With PingSafe, it's easy to onboard new accounts.
We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment.
It saves time, makes your environment more secure, and improves compliance. PingSafe helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security.
As a frequently audited company, we value PingSafe's compliance monitoring features. They give us a report with a compliance score for how well we meet certain regulatory standards, like HIPAA. We can show our compliance as a percentage. It's also a way to show that we are serious about security.
PingSafe's integration is smooth. They are highly customer-oriented, and the integration went well for us.
The most valuable feature of PingSafe is its integration with most of our technology stack, specifically all of our cloud platforms and ticketing software.
The most valuable features of PingSafe are the asset inventory and issue indexing.
PingSafe offers comprehensive security posture management.
PingSafe offers an intuitive user interface that lets us navigate quickly and easily.
It is fairly simple. Anybody can use it.
PingSafe offers three key features: vulnerability management notifications, cloud configuration assistance, and security scanning.
PingSafe offers attack path analysis.
PingSafe offers a valuable tool called an offensive search engine.
I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us.
PingSafe's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities.
Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.
It is advantageous in terms of time-saving and cost reduction.