


Microsoft Defender for Cloud and Sweet Security compete in the cloud security category. Microsoft Defender for Cloud appears to have the upper hand due to its integration with Azure and Microsoft products, enhancing threat detection and compliance management.
Features: Microsoft Defender for Cloud offers extensive integration with Azure services, robust security recommendations, and compliance management capabilities in line with ISO 27001 and HIPAA. It is valued for its AI-driven threat detection and seamless integration with Microsoft 365. Sweet Security provides real-time cloud environment visibility, integrates well with AWS, and offers detailed security insights with customizable reporting features.
Room for Improvement: Microsoft Defender for Cloud could improve in managing false positives and automation. Users face challenges with policy configurations across multiple subscriptions and desire more intuitive dashboards. Sweet Security could enhance its UI design and automation capabilities, offering improved customization in alerts and analyses. Expanding features related to code management and infrastructure would also benefit users.
Ease of Deployment and Customer Service: Microsoft Defender for Cloud integrates well with Azure but users report inconsistent support quality. Extensive documentation is available, yet navigating support can be challenging. Sweet Security offers effective AWS deployment with personalized support and customizable service engagements, with more streamlined response times compared to Microsoft.
Pricing and ROI: Microsoft Defender for Cloud is considered costly, with complex licensing, while its integration with Microsoft products can justify costs for some users. Pricing concerns arise in comparison to competing solutions. Sweet Security offers competitive pricing and strong ROI, replacing multiple tools while maintaining cost-effectiveness, appealing to SMBs seeking robust security solutions without high costs.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
It has saved us more than 50% of our time.
Defender proactively indexes and analyzes documents, identifying potential threats even when inactive, enhancing preventative security.
Identifying potential vulnerabilities has helped us avoid costly data losses.
Compared to not having Microsoft Defender for Cloud in place, we definitely saw an advantage by not having downtime due to a security threat.
The ROI is that we are not waiting for a breach but being proactive rather than reactive.
Having a reliable team ready and willing to assist with any issues is essential.
Throughout the migration, they remained available for several hours without complaint, providing assistance at every step.
In my experience, I have never encountered a junior person or someone without knowledge coming into support from SentinelOne.
Since security is critical, we prefer a quicker response time.
The support team was very responsive to queries.
They understand their product, but much like us, they struggle with the finer details, especially with new features.
They are there immediately, providing us with the best technical people, solving any issue we had.
They gave me a trial period, did multiple follow-ups, and were reviewing themselves the findings to actually understand how their product is performing.
I would rate customer support a nine out of ten because they maintain a competitive price, offer trial periods, provide follow-up, are very responsive, and are effectively hands-on in assisting and offering prompt service and support.
The SentinelOne Singularity Cloud exhibits high scalability.
We've automated in our MDM so any device that we start in our MDM automatically installs SentinelOne.
It is scalable. I would rate it a ten out of ten for scalability.
As we have reduced our on-premises infrastructure, it is about how we can migrate workloads to the cloud to make it easier, and then having everything fully encompassed and secured within that area makes it much easier for us to scale as needed and grow.
We are using infrastructure as a code, so we do not have any scalability issues with Microsoft Defender for Cloud implementation because our cloud automatically does it.
It has multiple licenses and features, covering infrastructures from a hundred to five hundred virtual machines, without any issues.
We don't need to scale it since it's all SaaS.
We are a robust enterprise with thousands of assets in the cloud or tens of thousands.
The user interface that I see doesn't make me very confident that I will be able to extract information in case I had hundreds or thousands of Kubernetes clusters or hundreds or thousands of hosts.
SentinelOne Singularity Cloud is incredibly reliable.
The only downtime we had was when switching from V1 to V2 but it was smooth.
I would rate it a ten out of ten for stability.
Defender's stability has been flawless for us.
I have not experienced any crashes or downtime.
Microsoft Defender for Cloud is very stable.
I would rate the stability of Sweet Security a ten out of ten.
We have never had any issues with stability.
Sweet Security is stable, as I find that user experience does not tend to reveal many production problems, and when they do occur, they are resolved quickly.
If notifications are available, then it will be more helpful, easy, and time-saving.
Alerts should be directly tied to compliance standards and have a clear role in the overall compliance process.
The Infrastructure as Code service available in PingSafe and the services available in AWS cloud security can be merged so that we can get the security data directly from AWS cloud in PingSafe.
Microsoft, in general, could significantly improve its communication and support.
It would be beneficial to streamline recommendations to avoid unnecessary alerts and to refine the severity of alerts based on specific environments or environmental attributes.
The artificial intelligence features could be expanded to allow the system to autonomously manage security issues without needing intervention from admins.
The next great thing that Sweet Security can do is to turn toward IAC, how it is handled and enforced, to tackle potential breaches of policy before they really happen.
Maybe they can just show the actual signal and not show that there is a lot of vulnerabilities, but indicate which are important.
The main areas for improvement are related to how Sweet Security needs to be customized.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
If you want to buy just EDR, the price is less. XDR is a little bit more expensive.
It should not be based on subscription. It should be based on the number of servers that I am scanning.
Security has essentially no cost when compared to the cost of a breach.
Every time we consider expanding usage, we carefully evaluate the necessity due to cost concerns.
We appreciate the licensing approach based on employee count rather than a big enterprise license.
They're not cheap, but they're not as expensive compared to other companies.
Sweet Security contains very similar features at a much better pricing.
Sweet Security's pricing is quite fair and cost-effective by many users.
This tool has been helpful for us. It allows us to search for vulnerabilities and provides evidence directly on the screen.
The cloud misconfiguration feature gave us almost zero false positives.
PingSafe has sped up the process by 80% to 90%.
The most valuable feature for me is the variety of APIs available.
This feature significantly aids in threat detection and enhances the user experience by streamlining security management.
The most valuable feature is the recommendations provided on how to improve security.
Sweet Security's reporting tools enhance our insights into potential vulnerabilities and threats as they serve as our eyes and ears inside AWS, telling us what we are doing wrong so we can fix it.
Sweet Security enabled teams to see each detection of activity upon every request made from the application level towards the infrastructure, making it much easier and reducing the time for an analyst to understand what is really happening.
I really love the feature within Sweet Security platform that allows you to visualize the specific packages or functions that are being loaded to the memory and are actually being executed by the operational system.
| Product | Mindshare (%) |
|---|---|
| SentinelOne Singularity Cloud Security | 6.4% |
| Microsoft Defender for Cloud | 8.1% |
| Sweet Security | 1.5% |
| Other | 84.0% |

| Company Size | Count |
|---|---|
| Small Business | 52 |
| Midsize Enterprise | 23 |
| Large Enterprise | 58 |
| Company Size | Count |
|---|---|
| Small Business | 30 |
| Midsize Enterprise | 12 |
| Large Enterprise | 49 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 3 |
| Large Enterprise | 3 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?
What benefits should users expect from SentinelOne Singularity Cloud Security?
SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Microsoft Defender for Cloud is a comprehensive security platform offering integration with Microsoft services, multi-cloud capability, AI-driven threat detection, compliance, and unified visibility for improved security operations.
Microsoft Defender for Cloud manages security operations by integrating with Microsoft services and supporting multi-cloud environments. Its features include AI-driven threat detection, compliance oversight, and advanced threat protection. It simplifies processes with unified visibility, threat intelligence, and automated workflows, enhancing security posture across various workloads. Despite its robust capabilities, improvements are needed in third-party tool integration, comprehensive AI-driven remediation, and a more intuitive dashboard. Users report complexity in licensing, inadequate documentation, and high costs, with room for enhancements in compliance reporting and multi-cloud support.
What are the key features of Microsoft Defender for Cloud?Industries leverage Microsoft Defender for Cloud for security posture management and endpoint protection. Many companies integrate it with Office 365 for enhanced functionality. It provides comprehensive security overviews by monitoring cloud vulnerabilities, limiting unauthorized access, and replacing existing tools with its extensive capabilities from network security to compliance checks, securing Azure infrastructure, and enhancing client security.
Sweet Security offers advanced cybersecurity measures designed to protect enterprise-level networks from complex threats, providing efficient monitoring and robust protection capabilities.
Focused on sophisticated threat detection and network security, Sweet Security provides an enterprise-grade solution for cybersecurity challenges. It integrates seamlessly with existing systems, offering real-time analytics and threat intelligence. Its comprehensive approach ensures high-level data protection and security management, allowing organizations to focus on core functionalities.
What features make Sweet Security stand out?Implementation of Sweet Security across industries like finance, healthcare, and e-commerce demonstrates its versatility and effectiveness. In finance, it safeguards sensitive financial data; in healthcare, it ensures patient data privacy; and in e-commerce, it protects online transactions from fraud, making it an invaluable asset in today's digital landscape.
We monitor all Cloud-Native Application Protection Platforms (CNAPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.