

FortiCNAPP and SentinelOne Singularity Identity compete in the security solutions market. FortiCNAPP often has an advantage in pricing and integration, while SentinelOne stands out in threat detection capabilities.
Features: FortiCNAPP is known for its network segmentation, automated policy recommendations, and SIEM integrations. SentinelOne Singularity Identity's standout features include dynamic threat detection, behavioral analysis, and providing a unified view of incidents.
Room for Improvement: FortiCNAPP can improve on user interface intuitiveness and IAM security controls, as well as data governance. SentinelOne's high pricing, complexity in endpoint management, and customer support are areas for enhancement.
Ease of Deployment and Customer Service: FortiCNAPP is versatile with cloud platform deployment and integrates well with DevOps tools, while SentinelOne supports both cloud and on-premises deployment, with strong customer service and continuous improvement efforts.
Pricing and ROI: FortiCNAPP provides strong ROI within the Fortinet ecosystem at competitive pricing. SentinelOne, though more expensive, offers comprehensive security insights that balance its higher cost for many users.
FortiCNAPP is a competitive and robust solution, the only one in the IT sphere that addresses all quadrants in the Gartner Quadrants.
My technical teams do utilize integration with DevOps tools, as it performs significantly with automation regarding sophisticated challenges.
Technical support from Fortinet is good; I get feedback and responses quickly.
They have been responsive to our needs as integrators and those of the client.
For complex large customers, global deployments, or large public sector customers, the process can take longer.
They respond within the service level agreements and are proactive in their approach.
The solution could be more user-friendly and intuitive.
The vulnerability part is not systematically organized; it is all clumsy in the web UI, and it is not user-friendly.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
It functions as a proactive tool, enabling me to identify threats quickly and automate responses.
The machine learning capability in Lacework FortiCNAPP is used for threat detection.
With visibility into endpoint telemetry, SentinelOne does provide useful information to find threat actors and empowers those who are in the business of threat hunting.
| Product | Market Share (%) |
|---|---|
| SentinelOne Singularity Identity | 0.9% |
| FortiCNAPP | 1.7% |
| Other | 97.4% |


| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 4 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
FortiCNAPP is a comprehensive cloud security platform focusing on ease of use and machine learning-driven anomaly detection. It offers robust compliance reporting, seamless integration, and continuous monitoring, making it an essential tool for organizations managing multi-cloud environments and security configurations.
FortiCNAPP provides significant capabilities in cloud security, compliance, and vulnerability management. Designed for organizations needing efficient monitoring, it enables detection of anomalies across cloud infrastructures while optimizing security posture and ensuring compliance with environments like AWS and GCP. The platform offers in-depth insights through scanning of IAC scripts, host systems, and cloud configurations. Recognized for effectively managing security posture, it safeguards Kubernetes and container environments, providing comprehensive threat detection and response. However, some areas like visibility, IAM security controls, and compliance metrics need improvement. Users face challenges with alert setup and lack intuitive design, alongside issues like FedRAMP authorization absence and complexity in the data model.
What are the key features of FortiCNAPP?FortiCNAPP is implemented extensively by industries needing reliable cloud security, such as finance, healthcare, and technology sectors. It supports organizations in enhancing cloud infrastructure protection, ensuring compliance, and strengthening vulnerability management. By integrating with platforms like AWS and GCP, businesses can optimize security posture in their cloud deployments.
Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.
Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.
Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.
By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.