Try our new research platform with insights from 80,000+ expert users

CrowdStrike Falcon Cloud Security vs Trend Vision One - Cloud Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
8.0
SentinelOne Singularity Cloud Security boosts efficiency by improving visibility, reducing costs, and decreasing time for threat detection and resolution.
Sentiment score
8.2
CrowdStrike Falcon is highly valued for proactive threat detection, cybersecurity protection, and aiding compliance and risk mitigation efforts.
Sentiment score
8.3
Trend Vision One enhances security and ROI through flexibility, customizable modules, and seamless integration, reducing costs and downtime.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Cloud Native Security does offer ROI.
More than 12 million vulnerabilities have been identified and resolved while working with CrowdStrike Falcon Cloud Security over the past 10 years.
It is an expense we are willing to pay to conform to Cyber Essentials Plus and demonstrate responsibility in protecting our data and that of our partners.
The product has proven to be reliable and compatible with our network infrastructure.
 

Customer Service

Sentiment score
7.8
SentinelOne Singularity Cloud Security's customer support is highly rated for responsiveness and effective issue resolution, ensuring smooth collaboration.
Sentiment score
7.3
CrowdStrike's customer service is responsive and expert, despite some delays, maintaining a strong reputation for helpfulness.
Sentiment score
7.3
Trend Vision One - Cloud Security support is mostly praised for expertise and quick response, despite some communication issues.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
Based on my experience with CrowdStrike Falcon Cloud Security's technical support, I would rate them a solid 10 out of 10.
Technical support is quite good.
I have contacted customer service, and they are fast.
 

Scalability Issues

Sentiment score
8.2
SentinelOne Singularity Cloud Security excels in scalability, smoothly integrating accounts and auto-scaling, despite separate account management challenges.
Sentiment score
6.4
CrowdStrike Falcon Cloud Security is highly scalable, easily deployable, and adaptable, handling extensive data across various environments.
Sentiment score
8.3
Trend Vision One - Cloud Security is praised for scalability, flexible integration, and elasticity, though may incur higher costs.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
I would rate the scalability of PingSafe 10 out of 10.
It is deployed across multiple departments and multiple locations.
CrowdStrike Falcon Cloud Security is indeed highly scalable, ideally for enterprises with a minimum of 2,000 servers to ensure cost efficiency and easier setup.
 

Stability Issues

Sentiment score
8.2
SentinelOne Singularity Cloud Security is highly stable but experiences minor UI glitches and occasional agent-related issues.
Sentiment score
7.0
CrowdStrike Falcon Cloud Security is praised for stability and reliability, despite some reports of recent instability and high CPU usage.
Sentiment score
8.2
Trend Vision One - Cloud Security is stable, reliable, meets security needs, with minimal bugs and low technical support required.
No lag, no crashing, no downtime.
It's a reliable solution that the organization is increasingly adopting for its robust features and security.
We contacted Cloud Native Security, and they addressed it in a day.
Occasionally, when the workload increases, it slows down considerably and sometimes becomes unresponsive.
When evaluating the stability of CrowdStrike Falcon Cloud Security, their partnerships with all major cloud service providers ensure their servers are optimally positioned.
 

Room For Improvement

SentinelOne Singularity Cloud needs enhanced features, stability, better reporting, integration, and support for improved user experience and efficiency.
CrowdStrike Falcon Cloud Security users report challenges with pricing, customer support, integration issues, slow infrastructure, and insufficient documentation.
Trend Vision One seeks better cloud security pricing, automation, multi-cloud support, enhanced features, and user-friendly improvements across platforms.
If I had to ask for anything to make it easier, it would be signed images that are GPG signed and a public repository where we can get the bits from.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
If CrowdStrike Falcon Cloud Security could implement pushing out remediation from the sensor installed on machines, that would be beneficial.
The user interface needs improvement as it's sometimes difficult to locate specific dashboards or reports.
Another issue is the lack of proper documentation.
An integrated appliance from Trend Micro would streamline the process, providing customers with a pre-configured solution and removing dependencies on external hardware.
 

Setup Cost

SentinelOne Singularity Cloud offers competitive pricing and value, with flexibility and discounts available, though costly for large deployments.
CrowdStrike Falcon Cloud Security is pricey yet valued for its integration, scalability, and ease of use despite the high cost.
Trend Vision One - Cloud Security offers moderate pricing with flexible plans, though complexity in credits and feature costs may confuse users.
Covering our 50,000 endpoints would have nearly bankrupted most security programs, even well-funded ones like ours.
I believe the enterprise version costs around $55 per user per year.
There are some tools that are double the cost of Cloud Native Security.
The pricing for CrowdStrike Falcon Cloud Security is reasonable, especially for small companies with limited budgets.
No additional cost for maintenance or support; it's all included in the quotation.
However, the main point is that even though it is expensive, it provides a huge capability to the organization.
The Trend Vision One pricing is reasonable.
 

Valuable Features

SentinelOne Singularity Cloud's ease, AI detection, and seamless integration enhance IT efficiency, risk management, and forensic visibility.
CrowdStrike Falcon Cloud Security provides cloud-based, AI-driven protection with threat detection, low resource usage, and centralized management.
Trend Vision One - Cloud Security offers efficient multi-cloud protection with user-friendly dashboards, real-time threat prevention, and excellent performance.
For example, we can set up an automation alert so that if a threat is detected on an endpoint, we can automatically take action on our Okta or AD environment, such as locking the account that was signed in or forcing a password reset.
This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.
The infrastructure-as-code feature is helpful for discovering open ports in some of the modules.
It automatically blocks duplication and activities that could result in data loss, effectively preventing unintended copying of data to personal devices.
The threat detection capability of CrowdStrike Falcon Cloud Security has always been the major seller, and it works effectively.
The most effective feature is the machine learning aspect, which detects unauthorized scripts and potential data exfiltration.
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Ranking in Cloud Security Posture Management (CSPM)
3rd
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
3rd
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
115
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (2nd), Compliance Management (2nd)
CrowdStrike Falcon Cloud Se...
Ranking in Container Security
4th
Ranking in Cloud Workload Protection Platforms (CWPP)
5th
Ranking in Cloud Security Posture Management (CSPM)
7th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
6th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
30
Ranking in other categories
Application Security Tools (12th), Cloud Infrastructure Entitlement Management (CIEM) (2nd), Application Security Posture Management (ASPM) (4th)
Trend Vision One - Cloud Se...
Ranking in Container Security
14th
Ranking in Cloud Workload Protection Platforms (CWPP)
7th
Ranking in Cloud Security Posture Management (CSPM)
9th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
9th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
22
Ranking in other categories
Vulnerability Management (13th), Hybrid Cloud Computing Platforms (5th), Extended Detection and Response (XDR) (13th), Attack Surface Management (ASM) (10th), Cloud Infrastructure Entitlement Management (CIEM) (3rd), Cloud Detection and Response (CDR) (4th)
 

Featured Reviews

Mike Bulyk - PeerSpot reviewer
Custom correlation searches enhance threat detection efficiency
Singularity Cloud Security significantly reduced our organization's threat detection time by providing immediate data visibility. This allows our team to analyze telemetry in real-time, query it, and identify anomalies or potential threats using the Singularity platform. We can create rules that automatically trigger alerts based on this real-time data, enabling immediate response. This instant threat detection and response capability is a major improvement over our previous reliance on multiple tools with delayed data flows. Singularity Cloud Security eliminates those delays, saving valuable time in incident response scenarios. MTTR and MTTD are critical metrics for incident response processes. They measure the time it takes to fully address an incident, from initial detection to complete remediation. Minimizing these times is crucial to limit damage, as attackers can quickly exploit vulnerabilities and compromise additional systems. Rapid detection and response are essential to disrupt attackers and prevent further progression within the attack chain. Singularity Cloud helps reduce false positives by allowing engineers direct access to data. This access enables querying, validation, and the creation of correlation searches for improved data analysis. Instead of a black box approach, Singularity provides full visibility into the code and syntax used, increasing confidence in the results. Ultimately, Singularity offers greater control over correlation searches, detection rules, and response scenarios due to the enhanced engagement and control it provides. Singularity's ability to create custom correlation searches significantly reduces noise by avoiding reliance on generic, pre-built searches that often lead to false positives in diverse organizational environments. This targeted approach results in a high positive rate and efficacy, allowing for focused detection and response. By designing and running custom searches, Singularity minimizes the need to sift through irrelevant alerts, unlike systems using default rules that inundate analysts with noise. This translates to a very low noise-to-efficacy ratio, enabling efficient and accurate incident response. Singularity Cloud offers valuable data and capabilities extending beyond security, benefiting various business units. For example, it helped troubleshoot a newly introduced service with limited telemetry. My team created custom correlation searches to track specific event types, confirming the software's functionality. This success garnered positive feedback throughout the company, reaching even the CIO and CSR, as it enabled the business to showcase the software's effectiveness in a way that was previously impossible. SentinelOne improves our regulatory compliance by fulfilling the endpoint detection and response requirements of various frameworks. Many federal regulations require businesses to meet specific security standards, including those related to endpoint, identity, and cloud security. SentinelOne enables us to meet these requirements and assure potential partners that we have a robust security posture. This strengthens our partnerships and streamlines procurement processes, demonstrating how SentinelOne contributes to our compliance efforts. SentinelOne's evidence-based reporting, particularly the CNS reports, fosters trust due to the transparency of the data source and the ability to understand the underlying mechanisms. Knowing the search criteria, data types, and information gathering process, especially when customized for detection engineering, creates confidence in the product and the relationship with SentinelOne. This transparency and customization allow users to delve into the mechanics of the reporting, understand its functionality, and ultimately trust the evidence provided. AI is a crucial consideration for security strategies. While some view AI as a potential replacement for human analysts, others see it as a powerful tool to enhance their capabilities. The latter approach emphasizes AI's ability to accelerate incident response, improve threat detection, and provide valuable insights to analysts. This perspective suggests that AI should be used to augment human expertise, enabling analysts to make faster and more informed decisions, particularly in prioritizing threats and developing a sixth sense for identifying malicious activity. By integrating AI as an enabler, organizations can empower their security teams to become more efficient and effective, ultimately strengthening their overall security posture.
Chethan R - PeerSpot reviewer
Has improved threat detection accuracy and helped monitor endpoints across hybrid environments
The most valuable capabilities of CrowdStrike Falcon Cloud Security relate to preventing attacks caused by human error, such as when someone plugs in a USB device or downloads something without caution. It automatically blocks duplication and activities that could result in data loss, effectively preventing unintended copying of data to personal devices. Deduplication prevention is definitely the most valuable feature. CrowdStrike Falcon Cloud Security excels in threat detection with a vast investigation structure, allowing us to verify suspicious activities to identify root causes. It helps us trace back to the origin and fix issues, making it a user-friendly tool for this kind of detection. CrowdStrike Falcon Cloud Security is built on AI and ML technology, enabling it to detect various threats and block suspicious activities immediately, which is particularly effective compared to traditional AVs and EDRs. The analytics provided by CrowdStrike Falcon Cloud Security is key for maintaining a proactive security posture. Its AI and ML foundations offer extensive information on threats and suspicious activities, making it renowned for analysis in the industry.
Brett Tatum - PeerSpot reviewer
We can quickly deploy cloud conformity, provides good visibility, and control
I am satisfied with the protection that Trend Vision One - Cloud Security provides for our multi-cloud environment. I need a single pane of glass that will give me the information I need quickly and easily. I set up Trend Vision One - Cloud Security in one afternoon, which I have done before. With one person, it only takes a day or so. Now, it is so simple to get it into any cloud and give it a small permission set to go in there and read our infrastructure, and then get some valuable insights very quickly. Trend Vision One - Cloud Security provides us with contextual data, which is especially useful when we are acquiring a company or when I take on a new role and need to quickly understand what they have. Trend Vision One - Cloud Security also helps me to quickly correlate information in the DevSec process, as it protects everything. There are three times when a security vulnerability can be caught: when we write the code, when we deploy the code, or when the code is running. If a vulnerability is not caught until the code is running, we probably made a mistake. We can then go back and look at the first two steps to see where we should have caught the issue. I am 100 percent satisfied with the context provided by Trend Vision One - Cloud Security. Trend Vision One - Cloud Security protects my cloud workloads. If an attack gets past the first two layers, I still need a way to protect the endpoints, whether they're EC2 instances, virtual machines in Azure, or even on-premises servers. I need a single pane of glass to see all of my endpoints. And let's say there's a zero-day attack, something that no one knew about and couldn't have caught. With Workload Security, I don't need to patch it immediately, even if it's a Windows update. Workload Security can patch it for me and put security tools around it. So we use it for patching and filtering, as well as other security needs. It sits on our virtual machines and whatever cloud we use. The biggest benefit of Trend Vision One - Cloud Security is its single pane of glass view. Other cloud providers, such as AWS and Azure, offer similar features, but they require multiple dashboards and reports. With Trend Vision One - Cloud Security, I have a single pane of glass view of my entire infrastructure. We also use Trend Vision One - Cloud Security for many security needs, including endpoint protection and Office 365 protection. This gives me a single vendor, a single pane of glass, and a single console to manage the security of all of my platforms. Trend Vision One - Cloud Security gives us full visibility and control of our cloud environments. When I am asked difficult questions, or when I am going through an audit or other process, I use its reporting and dashboarding capabilities to get all the information I need in one place. This saves me from having to correlate data from different sources, and it helps me to resolve audit and compliance workflows more quickly. Visibility helps us resolve complexity in our environment by providing quick snapshots of an account. This is especially useful when I'm trying to get an overview of a new workload or a new company, as it allows us to take a snapshot of the environment to make it easier to ingest. We buy our subscriptions through the marketplace because it's easier. I don't want to buy credits, because I can use the marketplace as needed. It also allows us to quickly bill the subscriptions to our existing account, so I don't have to set up another vendor or billing terms. I can just quickly use the marketplace, choose the subscriptions I want, and pay as I go. It's perfect. Conformity would give me a good overview of what infrastructure we are using and where we can potentially save costs by emphasizing the infrastructure that we do not necessarily need. Trend Vision One - Cloud Security protects me in the cloud, protects my registry, and protects my DevOps pipeline. It is not necessary for Trend Vision One - Cloud Security to protect all of these things. Additionally, Trend Vision in general also protects our Office 365 infrastructure, including SharePoint, Teams, and Outlook. Protecting all the data across our environment is extremely important these days. No matter what industry we're in, it's crucial to understand our data security protocols, where our data is stored, how it's protected, and how it's accessed. This information gives us a single, overarching view of our data security posture, which helps us to identify and remediate misconfigurations and quickly respond to zero-day attacks or compromises. The sooner we know about a security incident, the fewer repercussions we're likely to experience.
report
Use our free recommendation engine to learn which Cloud Infrastructure Entitlement Management (CIEM) solutions are best for your needs.
868,759 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
15%
Manufacturing Company
10%
Government
6%
Computer Software Company
14%
Financial Services Firm
14%
Manufacturing Company
7%
Healthcare Company
5%
Computer Software Company
16%
Manufacturing Company
9%
Financial Services Firm
6%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise21
Large Enterprise53
By reviewers
Company SizeCount
Small Business13
Midsize Enterprise6
Large Enterprise12
By reviewers
Company SizeCount
Small Business11
Midsize Enterprise6
Large Enterprise7
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is wor...
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs ...
What do you like most about CrowdStrike Falcon Cloud Security?
It's easy to gather insights and conduct analysis about existing threats.
What is your experience regarding pricing and costs for CrowdStrike Falcon Cloud Security?
It's an expensive product. The solution costs around $60 for a single user on a yearly basis. I would rate the pricin...
What needs improvement with CrowdStrike Falcon Cloud Security?
I am not part of the current monitoring team, so I do not know how they feel about the tool. I am sharing information...
What do you like most about Trend Micro Cloud One Container Security?
Vision One is versatile and can be integrated with many SIEMs. You're not limited to only one SIEM, such as Microsoft...
What needs improvement with Trend Micro Cloud One Container Security?
Currently, we must procure and configure the server hardware independently, as we obtain the software separately from...
 

Also Known As

PingSafe
CrowdStrike Falcon ASPM
Trend Micro Cloud One , Cloud One Workload Security, Trend Micro Cloud One Container Security, Trend Micro Cloud One Application Security, Cloud One File Storage Security, Cloud One Network Security, Cloud One Conformity
 

Overview

Find out what your peers are saying about CrowdStrike Falcon Cloud Security vs. Trend Vision One - Cloud Security and other solutions. Updated: September 2025.
868,759 professionals have used our research since 2012.