Our Cloud Native Security use cases depend on the type of SQL server we use. Currently, we need to check all cloud-based configurations directly. Cloud Native Security helps us identify SQL configurations on our local PCs.
Lead Security Engineer at Reward360 Global Services Pvt Ltd.
Helps improve our cloud security monitoring processes, streamline compliance management, and reduce detection time
Pros and Cons
- "Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities."
- "In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams."
What is our primary use case?
How has it helped my organization?
Cloud Native Security has improved our cloud security monitoring processes. We can now capture all issues and misconfigurations in real-time, allowing us to respond quickly.
It streamlined compliance management for our organization. They schedule a meeting with us every month to discuss any requirements on our end, such as updating the Cloud Native Security version. For example, one time they informed us that we needed to update to Cloud Native Security version four. We inquired with their customer support team, who were very approachable and requested them to implement the cloud version of Cloud Native Security version four into our Cloud Native Security dashboard. They implemented it within five to six days. We were happy to adopt the enhanced security controls of Cloud Native Security version four. The customer success team and the customer-facing teams were very helpful and provided us with the best solution. This is why we chose Cloud Native Security. They are a well-established CSPM company in India with a proven track record of assisting businesses with compliance requirements. By onboarding Cloud Native Security, we gained a cloud-based configuration management system for our workloads.
It's easy to use.
Our cloud security issues are already automated using a common subscription ticketing tool to capture them. Reports are then sent to both the internal DevOps team to identify potential false positives and the business team to assess if resolving the issue aligns with business requirements.
Cloud Native Security's event-based evidence reporting should include proof of exploitability. This would allow users to easily identify misconfigured areas in the graph and click on a provided link to conveniently be redirected to the cloud service provider management console page for more details.
Cloud Native Security's offensive security engine proved valuable recently. When an endpoint was mistakenly exposed, it automatically captured the unauthorized request in the cloud and sent an alert to our email address. This notification allowed us to take swift action and restrict access to the URL on our network.
The AI helps us handle the hundreds of audits each year helping to enhance our security posture.
Cloud Native Security's access to the IIM role in the cloud formation template significantly reduces false positives, thereby maximizing the number of true positives.
Cloud Native Security helps us improve our risk posture, failover capabilities, and compliance levels.
Cloud Native Security reduces our MTTD. We are alerted within seconds on the dashboard and email of the detection.
To assess our MTTR, we need to consult with the DevOps team and conduct an impact analysis. If the impact analysis reveals no disruption to the production application within the AWS network architecture, we can proceed with remediation immediately. However, if the analysis identifies a potential impact, obtaining management approval will add to the resolution timeframe.
Cloud Native Security improves collaboration between our cloud security application developers and AppSec teams. It's particularly helpful for AppSec because we can leverage cloud security controls directly from Cloud Native Security. This also allows us to mitigate cloud misconfigurations.
What is most valuable?
Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities.
What needs improvement?
In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams.
Buyer's Guide
SentinelOne Singularity Cloud Security
September 2025

Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Cloud Native Security for six months.
What do I think about the stability of the solution?
Cloud Native Security is stable.
What do I think about the scalability of the solution?
The scalability of Cloud Native Security is good.
How are customer service and support?
The technical support is the best. They can integrate our suggestions for security control into Cloud Native Security within three days.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment took one week. The deployment was completed by one person from our team along with a tech team from Cloud Native Security.
What's my experience with pricing, setup cost, and licensing?
Cloud Native Security is priced reasonably for our workload.
What other advice do I have?
I would rate Cloud Native Security ten out of ten.
We have a large number of users of Cloud Native Security in our organization.
I recommend Cloud Native Security to others.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
TechOps Manager at Nations Reliable Lending, LLC
Great automation and real-time detection with the ability to increase productivity
Pros and Cons
- "It's helped free up staff time so that they can work on other projects."
- "Some of the navigation and some aspects of the portal may be a little bit confusing."
What is our primary use case?
We were looking for an XDR solution that we could deploy to all of our computers since all of our users are mostly remote, and we previously had firewalls at branch locations. When workers went somewhere else, it wouldn't provide any protection. We wanted to make sure that they had protection no matter where they went.
How has it helped my organization?
We were trying to cover as many security bases as possible, mostly around malware. A lot of people focus on antivirus, and most of the problems that businesses face are ransomware or malware. I wanted to make sure we had something that was competitive against that.
It's improved the organization in the sense that it's taken a lot off of our plate as far as having to track down trace vulnerabilities and remediate different threats against our end users, especially when they're in different locations all the time. The product gives us peace of mind no matter where our users are. They're always going to be protected if they have the endpoint installed on their computers.
What is most valuable?
The automation is great. Not having to focus on it is helpful. The portal itself is very easy to use. The amount of granularity that can be configured is really wonderful. There are a lot of things that it can do, however, since we're a small IT team, having it able to automate and remediate different flaws and things like that is very, very helpful.
The real-time detection and response capabilities are excellent. That's pretty much what sold us on it. We had that done in the demo, and we were shown how ransomware can be immediately stopped in real-time. That was huge.
Its automated remediation is useful for us. As a small IT team, that's something that we needed. We don't have time to be able to go in and track down and investigate every time there's a vulnerability. Being able to have it auto-remediate for us and being able to see what's going on is extremely helpful.
The historical data record provided by the product is good. We've seen a few vulnerabilities come through, and it has shown us everything we need to see. I have a somewhat limited experience with the small amount of vulnerabilities we've seen. That said, it seemed to show us everything that we needed to see. It was very good.
It has helped to reduce our organization's mean time to detect by four or five hours. It could be even more, depending on what the vulnerability is. It's at least several hours at this point. The same is true with our organization's mean time to remediate.
It's helped free up staff time so that they can work on other projects. We're a very small IT team and most of us do everything and it's helped reduce our workload. On average it has likely saved two to three hours a day.
It's also positively affected productivity. Most security solutions can sometimes hold up files from being downloaded and things like that. So far, it's been great. It's been completely transparent to our end users as far as I know. And that those things that it has remediated have been done on the back end and it alerted us admins so as to not affect end users.
The interoperability with third-party solutions has been fine so far.
What needs improvement?
Some of the navigation and some aspects of the portal may be a little bit confusing. That could honestly be just due to the fact that we're not used to it yet.
We just have the cloud-based version. The complete version has some extra deep-dive stuff. There are some features that we don't have or that I would like to have in there, however, we just aren't able to afford that at this point.
For how long have I used the solution?
I've used the solution for probably two months at this point. We are fairly new to it.
What do I think about the stability of the solution?
The solution has been nothing but stable.
What do I think about the scalability of the solution?
The product is deployed across our company and we have 450 users coast to coast. Most of our remote workers are based out of Houston.
It is scalable. As soon as we need to add somebody, we just add them to NinjaOne, and then we have a script set up where it automatically deploys and adds them to whichever group we need.
We're in a high-turnover industry. It's easy to add or remove people, especially with NinjaOne.
How are customer service and support?
I have yet to use technical support.
Which solution did I use previously and why did I switch?
We didn't use an XDR solution. We used SonicWall firewalls and we had a Check Point antivirus for a short time, however, Check Point was very intrusive, and it was difficult to work with.
With this product, everything is centralized. We don't have to go to more than one place to detect or figure out what's going on.
How was the initial setup?
I was involved in the deployment. It was straightforward. We actually used another platform called NinjaOne. The process was very smooth.
We beta-tested the solution with about ten to 15 of our users and made sure it wasn't going to interfere with anything before we pushed it out completely. After testing for a week we pushed it out to the rest of the company.
We had three staff members who managed the deployment.
It does not require any maintenance.
What about the implementation team?
We did not use any third parties. We simply used NinjaOne to help with the deployment.
What was our ROI?
We have witnessed an ROI. So far, we've saved tons of time having to remediate and detect - things of that nature.
What's my experience with pricing, setup cost, and licensing?
The pricing was competitive. The price was very, very important to us, and it came down to the price when we were doing our evaluations WatchGuard and SentinelOne. They were similarly priced. SentinelOne seems like it's more mature. It was close enough to where it was worth it to go with the SentinelOne.
Which other solutions did I evaluate?
We also evaluated WatchGuard and a few other options. With this product and WatchGuard, there were not a lot of differences. That said, we did not use both in our production environment. This product seemed to be easier to navigate and was a little more user-friendly as far as finding remediation options, and vulnerabilities. We also had an easy experience with the licensing. WatchGuard's licensing seemed unnecessarily complicated.
What other advice do I have?
We haven't had to look into the forensic side yet. I did again see that in the demo, yet we haven't in the real world had to do that. Hopefully, we won't have to for a very long time. Therefore, I don't have much experience with that yet.
I'd ask someone who doesn't think that they need a workload protection platform if they have a continuous security monitoring solution in place if whatever they have detects and remediates in real-time. I'd be surprised if there was something else out there that can do what this solution does for cheaper.
It supports our ability to innovate. We don't have to worry about security aspects. We really get a chance to focus on other things. That's nice for a small department like ours.
I'd rate the solution nine out of ten. It's been a great fit for our company. There are other solutions out there. This solution, however, is hard to beat.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
SentinelOne Singularity Cloud Security
September 2025

Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Security Engineer-DevSecOps at a computer software company with 51-200 employees
Offers a wide range of security features, including misconfiguration detection and easy to set up and use
Pros and Cons
- "Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
- "Maybe container runtime security could be improved."
What is our primary use case?
It's a cloud-based SaaS tool. It's a cloud security partnership management tool. It gives you an overview of misconfigurations, Kubernetes security, Docker security, vulnerability scanning, and secret scanning.
What is most valuable?
Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.
What needs improvement?
Maybe container runtime security could be improved. But with the acquisition by a bigger company, things might roll out faster, potentially including this feature.
For how long have I used the solution?
I have been using it for six months.
What do I think about the stability of the solution?
It's been stable in my experience.
What do I think about the scalability of the solution?
Since it's a managed service, Cloud Native Security handles scalability. There are around 15 end users in my company using it.
How are customer service and support?
We could just contact the CEO directly with any questions. It was a small team back then, but I don't think that's the case anymore since they've been acquired.
Previously, it was just a 50-person team, and the CEO would hop on the call to solve the problem.
How was the initial setup?
The initial setup is super easy! It's a SaaS portal, so no deployment is needed. Just configuration that takes about half an hour.
What's my experience with pricing, setup cost, and licensing?
It was reasonable pricing for me. The costing model might have changed now since they have been acquired.
What other advice do I have?
I would advise integrating your Kubernetes clusters for extra features.
Overall, I would rate the solution a nine out of ten because I'm happy with Cloud Native Security overall.
The number of features Cloud Native Security offered with just a small team was phenomenal. Give them another six months to a year, and it could be one of the best tools out there.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Shashank, thanks for your kind words. Allow me to assure you, we here at SentinelOne are relentlessly focused on our customers' success every day. And we are so happy to have welcomed the team in joining us. Sincerely, Rick
Risk Analyst at a recreational facilities/services company with 1,001-5,000 employees
Helps free up SOC staff to work on other projects, detect threats and protect our assets
Pros and Cons
- "Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks."
- "It would be really helpful if the solution improves its agent deployment process."
How has it helped my organization?
Singularity Cloud Workload Security gave us the visibility we needed and freed up time to do other tasks. It narrows down the false positives that we got with the previous solution.
What is most valuable?
We use Singularity Cloud Workload Security to detect threats and protect our assets. We look at the threats that come in and whether they're being blocked. We use Singularity Cloud Workload Security as an anti-malware threat management product.
Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks.
What needs improvement?
We had a couple of issues with the solution's deployment. We had to deploy the agent, and sometimes there were issues. It feels like we're battling a version of the software when we have to deploy an agent over another agent. It would be really helpful if the solution improves its agent deployment process.
For how long have I used the solution?
I have been using Singularity Cloud Workload Security for over a year.
What do I think about the stability of the solution?
I haven't heard from our team about any stability issues with Singularity Cloud Workload Security. Singularity Cloud Workload Security is more stable than our previous solution.
What do I think about the scalability of the solution?
Singularity Cloud Workload Security handles anything we throw at it. The scalability is good.
How are customer service and support?
When we have an issue, an online engineer from their group helps us resolve it within an hour or two. I haven't heard anything negative about the solution's support from our team.
How would you rate customer service and support?
Positive
How was the initial setup?
I was involved in the selection and the proof of concept process. I wasn't on the call for the installation, but I overheard our two engineers involved in the solution's installation. The solution's deployment was pretty quick, and they installed it in one day.
What about the implementation team?
We implemented the solution with an in-house team.
What's my experience with pricing, setup cost, and licensing?
Singularity Cloud Workload Security's licensing and price were cheaper than the other solutions we looked at. One product was a little bit cheaper, but its functionality and the overall product weren't as good as Singularity Cloud Workload Security. One of the vendors' prices was almost double what we would get thus far. Talking to their engineer and salesperson put our minds at ease when we got it. We knew they would be there for support, and they have been really good.
What other advice do I have?
I'd ask users to take a good look at Singularity Cloud Workload Security because it brings a lot of value to the table. For its price, the solution does a good job compared to some other solutions.
Singularity Cloud Workload Security’s automated remediation works great.
The solution’s real-time detection and response capabilities work great for us. It frees up time, unlike our previous solution, where we had a lot of false positives.
It's granular, and you can take a deeper dive into something if you need to. You can analyze and get a verdict. It's easier to narrow it down and pinpoint it with more detail.
The solution helped reduce our organization’s mean time to detect. Singularity Cloud Workload Security is quicker than our previous solution. We are a small group of just five people, and we have to do instantaneous detection to stop things from coming in quickly. We like that part a lot.
The solution helped reduce our organization’s mean time to remediate. It lets us analyze an incident, report the status quicker, and escalate it quicker than our previous solution.
Singularity Cloud Workload Security helped free up SOC staff to work on other projects. It probably freed up 10 to 15 hours a week. Before, we spent a couple of hours a day sifting through events and trying to see if they were false positives. The solution freed up a lot of time.
We have seen an impact on our organization's productivity using Singularity Cloud Workload Security. With the freed-up time, we're able to do a lot of other work. We use other products and look at phishing emails. It frees up our time to study more than we did in the past.
I would have users look at their visibility across their environment. The solution's quick response to threats, ability to act on them, automated incident response, and forensic investigation capabilities are really good. The solution provides you with 24/7 threat monitoring detection.
We work eight hours a day when we have someone on call. It's nice to know someone else is also looking at our events. They're there to dive in with us when we need them to help increase our team. Even though they're not on our team, they're there to help us.
Overall, I rate Singularity Cloud Workload Security a nine out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
IT Support Specialist at a non-tech company with 201-500 employees
SentinelOne Singularity Cloud
Pros and Cons
- "The real-time detection and response capabilities overall are great."
- "Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time."
What is our primary use case?
We are a relatively smaller organization of roughly 250 people. We utilize SentinelOne for patch management, vulnerability assessments, and remediation. So whenever one of our users has an issue on their machine, we get an immediate notification to let us know what that intrusion, infection, malware, whatever it might be, where it is, what file may have caused it, and then we can immediately take action.
There are also default settings for ensuring the software that SentinelOne installs on all our client machines. The latest agent is up to date everywhere. They have a couple more insights, however, that's our main use case.
The big thing for us was just having optics on vulnerabilities, being able to ensure that we have a secure way to get month-over-month assessments of our security stats, and ensuring that there's something in place that can make sure that we're secure. We also wanted something that could keep up with current demands without having any sort of interference or impact on the user's end.
How has it helped my organization?
The biggest thing for us is the level of minimal intrusion on our user's experience. The previous EDR we were using, Sophos, was not ideal. Whenever an update came out, there would be different things that were affected. At one point, an update from Sophos had completely disabled public Wi-Fi for our users. And when dealing through their message boards, dealing with their support, they, unfortunately, did not have a resolution other than disabling security elements of their software. With SentinelOne, we have not seen a single instance of that. You can get down to the user level of tweaking different elements of their security system. You can even quickly add exclusions based on rules. Being able to tailor to our users and making sure that our users don't feel like something is running on their machine is the biggest advantage.
What is most valuable?
The remote shell and the remediation are the two that really stand out as valuable features. The remote shell function that it offers is something that I use almost daily. It allows us to quietly and discreetly sign in on a user's computer, but only as admin. It prevents any sort of security issues or security risks to a user, which would be probably our favorite.
The remediation is really nice as it gives a very clear understanding of where a file came from. For example, in our use of it, there are a couple of files that we had that we didn't even know that we had. There was software that no one was aware was installed on these machines more than three years ago; we actually learned about that software once SentinelOne was installed. The level of optics it gives you is just incredible.
With that software, as soon as we installed SentinelOne, there were a couple of different applications and software that were immediately flagged as tracking user information and things like that. We found out that there was actually some sort of remote surveillance software that the past iteration of the IT team had installed and tested that just never got removed. We ended up tracking down the vendor for that and getting their assurance that that was no longer being used.
The real-time detection and response capabilities overall are great. I've never used anything that was as fast as this. The software that we used to use, Sophos, was comparable, however, it had a noticeable impact on the user. The bigger thing for me is that there isn't an impact on my end users. When we are actually running a scan, let's say, if we find that there's an impact, it's very quick. We've tested it by throwing malicious software onto our test machines just to see how quickly SentinelOne actually picks it up. And it's literally within seconds. When you actually do a scan, you can scan your higher fleet, and it's done relatively quickly as long as those machines are powered on. And it will act the second that those machines power on and connect to the Internet again to get that signal. I've never used anything as quick, personally.
The forensic visibility into the Linux terminal is not something we use as we actually don't use any Linux machines ourselves, so I couldn't speak to that. As far as visibility goes, we're primarily a Mac organization, and we have ten percent of our users on PC. As far as Mac goes, the visibility is fantastic. Same with the PC side of things.
The historical data record, from what they had shown us in the demo, looks pretty incredible. We thankfully have not suffered an attack that required historical data.
In terms of our mean time to detect, I don't think we ever had it. Since we're a small organization, we haven't had any real issues with genuine malware attacks. I can't speak to a scenario where while we were on Sophos, we experienced one. When we've had security audits that have tried to pen test for us, we have not had any issues with SentinelOne whatsoever. Every time that we've attempted to see how accurate and how quickly it can detect an infection or intrusion, it's being caught immediately.
The same is true for mean time to remediate. Any remediation that we do, for example, as soon as we block off a file, the automatic remediations are nice. In the event that we want to have something behave differently on another machine, we can quickly change that once we see it in any incident log. Setting those permanent rules is very helpful since, if you know something's malicious, chances are you don't want it showing up anywhere else.
The product has helped free up your SOC staff to work on other projects or tasks. The work that we used to have to do with our previous provider in going through our vulnerability assessments on a monthly basis and in trying to track down the install path of different applications was a headache and a half. With SentinelOne, the application management, and vulnerability assessments, are easy. You can see directly to the file path. It cuts a significant enough time out of our day.
It's had a positive impact on our overall productivity. Being able to dig through and find applications faster has drastically cut down our vulnerability position. When we first started using Singularity, we were somewhere in the thousands. Within the first month of having used it for our vulnerability assessments, we were down to just 1600, and now we're sitting well under the 500 mark when it comes to critical vulnerabilities. It's been very drastic and exponential at that. Now, any time a vulnerability does pop up, it's very quick and easy for us to track down where it is and take immediate action.
The interoperability with third-party solutions is fine. We don't currently use Kubernetes in our organization, however, we do utilize a VPN and it has no issues with adapting to that VPN. We also utilize different storage, including cloud storage accounts. There are no issues there either.
They've been fantastic at supporting innovation. We've had their support; they're always very responsive and very quick to give us the right advice on how we can execute what we're looking to do. Making sure that you have access to the necessary system without interrupting your user and without your user feeling at risk of their privacy being invaded is huge.
What needs improvement?
Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time.
For how long have I used the solution?
I've been using the solution for nine to ten months.
What do I think about the stability of the solution?
I've had no stability issues at all. We have not experienced any performance decreases.
What do I think about the scalability of the solution?
As far as deploying to more devices, there's not a problem with scaling at all. We've automated in our MDM so any device that we start in our MDM automatically installs SentinelOne, and those devices immediately show up. If we spin up a new device on Mac OS, it shows within the set the SentinelOne console within seconds.
How are customer service and support?
Their support has been fantastic. They are quick to respond.
I've never had an issue with their support. What little time I did have one scenario where it was not something that they could help with, they'd been able to provide us with all the articles and information necessary to act on it on our own, which is really all you can ask for.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were previously using Sophos. The biggest issue that we had with them was the fact that we were a fully remote company, so a lot of our users would be traveling for client meetings or even traveling abroad for client meetings. Reliance on a secure public WiFi solution is a very big deal for us. When it comes to users on a VPN, Sophos with MacOS's more recent updates would completely cut off Wi-Fi - which was very difficult for us to work around as a remote company. Thankfully, with multiple different tests in multiple different scenarios, we've never had that issue with SentinelOne.
The other big thing is the capability to remove a device from the network. In the event that a significant intrusion or malware, malware, ransomware, whatever it might be, is detected the ability to just isolate that one user from internet access is huge. You would hope that that's how an EDR would behave instead of completely removing all internet no matter what.
How was the initial setup?
The initial setup was pretty straightforward. Our organization uses Kagi MDM. And in using that MDM solution, it was very easy for us to just quickly put together an automated installer and deploy it.
We have multiple different groups of users, including PC and Mac. With the smaller percentage of PC users, we were able to just change the group ID in the installer, and that ensured that they were placed into the proper place for their groups. Being able to tweak and ensure that from the back end within the SentinelOne console, we could ensure that everything is set up the way we want it to be once that user gets that package installed, makes life a lot easier. You don't need to worry about signing on with a user and changing any of those settings. The installer package that they get is going to be everything that they need. Once that installs, that's it. It was very seamless. If anything, removing Sophos was the hardest part of the installation process.
We were able to deploy using a team of three people. Hypothetically, one person could do it alone as long as they are well versed in MDM.
As far as the application itself is concerned, there was no need for maintenance. You can control everything from the console. When there is a new agent to install you receive a notification when you log in to the management console. You can control when that update gets deployed to your organization. You can break it up into different groups within your organization. For ourselves, we always test on a smaller number of users. And then once we see stability, we deploy to the rest. That's what little maintenance is involved. It's a drastic improvement versus other solutions that I've used.
What about the implementation team?
We were able to do the initial setup completely in-house. We were able to do that on our own. We were able to very, very quickly deploy SentinelOne to pretty much our entire fleet.
What was our ROI?
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider. Our users have less of a performance drain when attempting to use it. That's always huge when it comes to EDR. It pretty much checks every single box for us. It's the one software in our stack that we are happiest with.
What's my experience with pricing, setup cost, and licensing?
For us, the pricing is very fair. They were willing to meet our price point. With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
Which other solutions did I evaluate?
We reviewed quite a few solutions. The big selling point for this product was that they were willing to work with us on a price point as a smaller organization. That was a huge reason for us actually going with them. The fact that they were willing to work with us as far as the pricing goes was the main reason that we ended up going with them. It was nice to see that they work with the little teams.
What other advice do I have?
We're a customer and end-user.
We thought something as good as SentinelOne would be out of the question for an organization of our size. We assumed it would be something that's suited to larger organizations - money, obviously, being the main concern. However, the fact that they were willing to work with us changed that. Seeing that they're willing to work with smaller organizations is cool. I like that they actually give back to the tech sector that way.
I'd rate the stability ten out of ten.
I'd advise new users that they're going to need to invest a little bit of time upfront in order to make sure that their organization is set up for proper deployment. We probably spent about a week or two configuring everything and getting it to work the way we wanted. However, after that initial investment of time, the maintenance that you have to do is pretty minimal.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Assistant System Engineer at a consultancy with 10,001+ employees
Helps reduce false positives, improve risk posture, and MTTD
Pros and Cons
- "The user-friendly dashboard offers both convenience and security by providing quick access to solutions and keeping us informed of potential threats."
- "SentinelOne Singularity Cloud Security filtering has some areas that cause problems, and to achieve single sign-on functionality, a break-glass feature, which is currently unavailable, is necessary."
What is our primary use case?
Our cloud security posture is managed with SentinelOne Singularity Cloud Security, a tool that identifies and highlights potential security weaknesses in our systems.
How has it helped my organization?
It is user-friendly.
SentinelOne Singularity Cloud Security helps reduce the number of false positives by 20 percent.
In evidence-based reporting, demonstrating that a vulnerability can be exploited is crucial. This information allows us to directly address the issue through manual remediation.
SentinelOne Singularity Cloud Security has improved our risk posture and has reduced our mean time to detection by 50 percent.
SentinelOne Singularity Cloud Security has reduced our mean time to remediation by 30 percent.
What is most valuable?
The user-friendly dashboard offers both convenience and security by providing quick access to solutions and keeping us informed of potential threats.
What needs improvement?
SentinelOne Singularity Cloud Security filtering has some areas that cause problems, and to achieve single sign-on functionality, a break-glass feature, which is currently unavailable, is necessary.
For how long have I used the solution?
I have been using SentinelOne Singularity Cloud Security for one year.
What do I think about the stability of the solution?
I would rate the stability of SentinelOne Singularity Cloud Security nine out of ten.
What do I think about the scalability of the solution?
SentinelOne Singularity Cloud Security is scalable.
How are customer service and support?
The technical support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Prisma Cloud but when we would request a feature we had to wait until the next release. That is the advantage of SentinelOne Singularity Cloud Security.
How was the initial setup?
The deployment took a few weeks to complete.
What's my experience with pricing, setup cost, and licensing?
SentinelOne Singularity Cloud Security falls somewhere in the middle price range, neither particularly cheap nor expensive.
What other advice do I have?
I would rate SentinelOne Singularity Cloud Security nine out of ten.
We have around five people working with SentinelOne Singularity Cloud Security.
No maintenance is required for SentinelOne Singularity Cloud Security.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
Senior Dev Ops Engineer at a computer software company with 51-200 employees
The compliance assessment features help us during audits
Pros and Cons
- "We like SentinelOne Singularity Cloud Security's vulnerability assessment and management features, and its vulnerability databases."
- "The categorization of the results from the vulnerability assessment could be improved."
What is our primary use case?
We primarily use SentinelOne Singularity Cloud Security for compliance purposes because we work with banks and the fintech industry, so we must follow some standards like PCI DSS.
How has it helped my organization?
We use SentinelOne Singularity Cloud Security for compliance and security purposes, and it has helped a lot. We face many audits, and during each audit, we must conduct a vulnerability assessment. SentinelOne Singularity Cloud Security gives us a list of vulnerabilities that we remediate to raise our compliance score. It's our only tool for vulnerability assessments. The benefits are mostly immediate. SentinelOne Singularity Cloud Security helped reduce the number of false positives, which has been difficult.
What is most valuable?
We like SentinelOne Singularity Cloud Security's vulnerability assessment and management features, and its vulnerability databases. The interface isn't too complex. It's quite easy to use. The agentless vulnerability scan is the feature we use the most.
What needs improvement?
The categorization of the results from the vulnerability assessment could be improved.
For how long have I used the solution?
We have used SentinelOne Singularity Cloud Security for 2 years.
What do I think about the stability of the solution?
I have never faced any downtime.
What do I think about the scalability of the solution?
SentinelOne Singularity Cloud Security's scalability is quite good. We have multiple projects, and scalability isn't an issue.
What other advice do I have?
I rate SentinelOne Singularity Cloud Security 8 out of 10 based on the features I have used. I haven't used all the features, but I give the vulnerability and compliance features 8 out of 10. I can recommend SentinelOne Singularity Cloud Security for vulnerability scanning and compliance. There are many competitors, but I find SentinelOne Singularity Cloud Security quite good, which is why we haven't switched to something else for the past 2 years.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
Cloud Engineer at a tech services company with 201-500 employees
Helps save time, improves collaboration, and identifies misconfigurations
Pros and Cons
- "The cloud misconfiguration is the most valuable feature."
- "I would like SentinelOne Singularity Cloud Security to add real-time detection of vulnerabilities and cloud misconfigurations."
What is our primary use case?
I work for an insurance company whose infrastructure is on the cloud, so we use SentinelOne Singularity Cloud Security for security management and vulnerability detection.
How has it helped my organization?
SentinelOne Singularity Cloud Security is a valuable tool for managing infrastructure security. It offers advanced features like container security management, microservices security management, and Configuration Drift Remediation, which helps identify and address unauthorized configuration changes. These features are comprehensive and adaptable. Even for custom infrastructure modifications, such as XYZ, the SentinelOne Singularity Cloud Security team can be contacted for guidance and policy adjustments to ensure a smooth adoption process.
Infrastructure as Code is valuable because the code itself defines the infrastructure. This means any vulnerabilities or misconfigurations in the IaC code will be deployed to our infrastructure. However, IaC tools can scan the code and alert us to potential problems before deployment, allowing us to fix them proactively.
We saw the benefits of SentinelOne Singularity Cloud Security immediately.
It helped reduce the amount of false positives.
It has reduced our mean time to detection and remediation.
SentinelOne Singularity Cloud Security improved collaboration between our cloud security developers and the application security teams.
The collaboration helped us save time, which is one of the reasons we have continued to use SentinelOne Singularity Cloud Security.
What is most valuable?
The cloud misconfiguration is the most valuable feature. It highlights any misconfiguration that can make our infrastructure vulnerable.
What needs improvement?
I would like SentinelOne Singularity Cloud Security to add real-time detection of vulnerabilities and cloud misconfigurations.
For how long have I used the solution?
I have been using SentinelOne Singularity Cloud Security for almost 2 years.
What do I think about the stability of the solution?
I would rate the stability of SentinelOne Singularity Cloud Security 10 out of 10.
What do I think about the scalability of the solution?
I would rate the scalability of SentinelOne Singularity Cloud Security 10 out of 10.
How are customer service and support?
The technical support is good. They are knowledgeable and prompt.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment was straightforward. One person was required from our end.
What about the implementation team?
The implementation process itself was very smooth. The SentinelOne Singularity Cloud Security team provided excellent assistance in integrating the solution with our existing infrastructure and account. This made the integration process hassle-free. We've also recently integrated a new CDR feature using SentinelOne Singularity Cloud Security.
What other advice do I have?
I would rate SentinelOne Singularity Cloud Security 10 out of 10.
No maintenance is required for SentinelOne Singularity Cloud Security.
Once you've acquired SentinelOne Singularity Cloud Security, it's essential to review all your existing organizational policies. If these policies are compatible with your infrastructure, you can proceed without modifications. However, if there are any incompatibilities, you'll need to make adjustments to ensure your infrastructure triggers accurate alerts. Skipping this step can lead to a flood of false positives.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Cloud-Native Application Protection Platforms (CNAPP) Vulnerability Management Cloud and Data Center Security Container Security Cloud Workload Protection Platforms (CWPP) Cloud Security Posture Management (CSPM) Compliance ManagementPopular Comparisons
Microsoft Defender for Cloud
Prisma Cloud by Palo Alto Networks
Tenable Nessus
CrowdStrike Falcon Cloud Security
AWS Security Hub
Tenable Security Center
Akamai Guardicore Segmentation
Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Does SentinelOne have a Virtual Patching functionality?
- When evaluating Cloud-Native Application Protection Platforms (CNAPP), what aspect do you think is the most important to look for?
- Why is a CNAPP (Cloud-Native Application Protection Platform) important?
- What CNAPP solution do you recommend for a hybrid cloud?
- Why are Cloud-Native Application Protection Platforms (CNAPP) tools important for companies?
- When evaluating Cloud-Native Application Protection Platforms (CNAPP) solutions, what aspect do you think is the most important to look for?
- Why is Cloud-Native Application Protection Platforms (CNAPP) important for companies?
- What Cloud-Native Application Protection Platform do you recommend?
Thank you, Tanmay, for your kind words, feedback, and trust you place in us.