


Cisco Secure Workload and CrowdStrike Falcon Cloud Security are competitors in the cloud security market. Users generally favor the features of CrowdStrike for its proactive threat detection capabilities.
Features: Cisco Secure Workload is noted for strong analytics, visibility in hybrid environments, and integration with existing infrastructure. CrowdStrike Falcon is recognized for comprehensive threat intelligence, ease of scalability, and advanced threat detection, which users rate highly.
Room for Improvement: Cisco Secure Workload users often mention the need for easier setup processes, enhanced reporting, and better usability optimization. CrowdStrike Falcon feedback highlights the need to reduce resource consumption and suggestions to improve usability and efficiency.
Ease of Deployment and Customer Service: CrowdStrike Falcon is favored for its seamless deployment process, being less complex compared to Cisco Secure Workload. Cisco offers robust customer support, but CrowdStrike's automated deployment and operational readiness are seen as advantages in the initial stages.
Pricing and ROI: Cisco Secure Workload is considered competitively priced, attracting cost-conscious buyers. Although CrowdStrike Falcon Cloud Security is more expensive, users believe its long-term ROI justifies this cost due to advanced security capabilities and market-leading threat intelligence.
| Product | Mindshare (%) |
|---|---|
| SentinelOne Singularity Cloud Security | 4.9% |
| CrowdStrike Falcon Cloud Security | 4.0% |
| Cisco Secure Workload | 2.2% |
| Other | 88.9% |



| Company Size | Count |
|---|---|
| Small Business | 52 |
| Midsize Enterprise | 23 |
| Large Enterprise | 58 |
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 3 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 14 |
| Midsize Enterprise | 6 |
| Large Enterprise | 15 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?
What benefits should users expect from SentinelOne Singularity Cloud Security?
SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Cisco Secure Workload offers advanced auditing, micro-segmentation, and network visibility, automating policy presentation for improved security. It enhances application dependency mapping and provides comprehensive telemetry with strategic policy enforcement.
Cisco Secure Workload specializes in automating micro-segmentation, data center management, and traffic analysis. Its capabilities facilitate application dependency mapping and enhance internal micro-segmentation, providing invaluable network visibility. Users find its automation in policy presentation and strategic enforcement beneficial, along with granular control and scalability, despite needing improvements in scalability and integration capabilities. Enhanced notification features, troubleshooting options, and an efficient interface are desired for seamless deployment, along with stronger multi-tenancy, redundancy, and monitoring functions. Broader platform support and integrated cloud connectivity are desired for unified management across tools.
What are the most important features?Entities in finance, gas, and oil sectors utilize Cisco Secure Workload for networking site management and compliance maintenance. It integrates into extensive Cisco infrastructure, aiding routers, switches, and endpoints, thus supporting auditors in network synchronization and auditing needs.
CrowdStrike Falcon Cloud Security is a sophisticated platform emphasizing threat detection, real-time response, and automatic blocking, using AI and ML technologies. It effectively integrates with AWS, providing seamless cloud-based management and monitoring.
Falcon Cloud Security leverages AI and ML for comprehensive threat detection and prevention, boasting lightweight resource consumption. Its user-friendly dashboard enhances security management across environments, avoiding data duplication and promoting integration with AWS. Users highlight its effectiveness in protecting endpoints and cloud workloads, assessing configurations, and managing vulnerabilities. While its strategic incorporation of AI enhances security measures, improvements in pricing, integration, and reporting are necessary. Users also report that support services require faster response times. Documentation could be more comprehensive, and enhancements in remediation, Linux capabilities, and multi-cloud visibility would gain value. Users point out navigation issues in the dashboard, affecting user experience.
What are CrowdStrike Falcon Cloud Security's key features?Organizations across various industries utilize Falcon Cloud Security for endpoint and cloud workload protection. It is primarily employed for anomaly detection, network activity monitoring, and threat response, integrating with tools like Splunk to amplify security measures. By identifying and blocking threats such as malware and viruses, it supports security strategies, incident responses, and compliance objectives.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.