Our Cloud Native Security use cases depend on the type of SQL server we use. Currently, we need to check all cloud-based configurations directly. Cloud Native Security helps us identify SQL configurations on our local PCs.
Lead Security Engineer at Reward360 Global Services Pvt Ltd.
Helps improve our cloud security monitoring processes, streamline compliance management, and reduce detection time
Pros and Cons
- "Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities."
- "In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams."
What is our primary use case?
How has it helped my organization?
Cloud Native Security has improved our cloud security monitoring processes. We can now capture all issues and misconfigurations in real-time, allowing us to respond quickly.
It streamlined compliance management for our organization. They schedule a meeting with us every month to discuss any requirements on our end, such as updating the Cloud Native Security version. For example, one time they informed us that we needed to update to Cloud Native Security version four. We inquired with their customer support team, who were very approachable and requested them to implement the cloud version of Cloud Native Security version four into our Cloud Native Security dashboard. They implemented it within five to six days. We were happy to adopt the enhanced security controls of Cloud Native Security version four. The customer success team and the customer-facing teams were very helpful and provided us with the best solution. This is why we chose Cloud Native Security. They are a well-established CSPM company in India with a proven track record of assisting businesses with compliance requirements. By onboarding Cloud Native Security, we gained a cloud-based configuration management system for our workloads.
It's easy to use.
Our cloud security issues are already automated using a common subscription ticketing tool to capture them. Reports are then sent to both the internal DevOps team to identify potential false positives and the business team to assess if resolving the issue aligns with business requirements.
Cloud Native Security's event-based evidence reporting should include proof of exploitability. This would allow users to easily identify misconfigured areas in the graph and click on a provided link to conveniently be redirected to the cloud service provider management console page for more details.
Cloud Native Security's offensive security engine proved valuable recently. When an endpoint was mistakenly exposed, it automatically captured the unauthorized request in the cloud and sent an alert to our email address. This notification allowed us to take swift action and restrict access to the URL on our network.
The AI helps us handle the hundreds of audits each year helping to enhance our security posture.
Cloud Native Security's access to the IIM role in the cloud formation template significantly reduces false positives, thereby maximizing the number of true positives.
Cloud Native Security helps us improve our risk posture, failover capabilities, and compliance levels.
Cloud Native Security reduces our MTTD. We are alerted within seconds on the dashboard and email of the detection.
To assess our MTTR, we need to consult with the DevOps team and conduct an impact analysis. If the impact analysis reveals no disruption to the production application within the AWS network architecture, we can proceed with remediation immediately. However, if the analysis identifies a potential impact, obtaining management approval will add to the resolution timeframe.
Cloud Native Security improves collaboration between our cloud security application developers and AppSec teams. It's particularly helpful for AppSec because we can leverage cloud security controls directly from Cloud Native Security. This also allows us to mitigate cloud misconfigurations.
What is most valuable?
Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities.
What needs improvement?
In addition to our telecom and Slack channels, it would be helpful to receive Cloud Native Security security notifications in Microsoft Teams.
Buyer's Guide
SentinelOne Singularity Cloud Security
June 2025

Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
861,490 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Cloud Native Security for six months.
What do I think about the stability of the solution?
Cloud Native Security is stable.
What do I think about the scalability of the solution?
The scalability of Cloud Native Security is good.
How are customer service and support?
The technical support is the best. They can integrate our suggestions for security control into Cloud Native Security within three days.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment took one week. The deployment was completed by one person from our team along with a tech team from Cloud Native Security.
What's my experience with pricing, setup cost, and licensing?
Cloud Native Security is priced reasonably for our workload.
What other advice do I have?
I would rate Cloud Native Security ten out of ten.
We have a large number of users of Cloud Native Security in our organization.
I recommend Cloud Native Security to others.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Security Engineer-DevSecOps at a computer software company with 51-200 employees
Offers a wide range of security features, including misconfiguration detection and easy to set up and use
Pros and Cons
- "Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
- "Maybe container runtime security could be improved."
What is our primary use case?
It's a cloud-based SaaS tool. It's a cloud security partnership management tool. It gives you an overview of misconfigurations, Kubernetes security, Docker security, vulnerability scanning, and secret scanning.
What is most valuable?
Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.
What needs improvement?
Maybe container runtime security could be improved. But with the acquisition by a bigger company, things might roll out faster, potentially including this feature.
For how long have I used the solution?
I have been using it for six months.
What do I think about the stability of the solution?
It's been stable in my experience.
What do I think about the scalability of the solution?
Since it's a managed service, Cloud Native Security handles scalability. There are around 15 end users in my company using it.
How are customer service and support?
We could just contact the CEO directly with any questions. It was a small team back then, but I don't think that's the case anymore since they've been acquired.
Previously, it was just a 50-person team, and the CEO would hop on the call to solve the problem.
How was the initial setup?
The initial setup is super easy! It's a SaaS portal, so no deployment is needed. Just configuration that takes about half an hour.
What's my experience with pricing, setup cost, and licensing?
It was reasonable pricing for me. The costing model might have changed now since they have been acquired.
What other advice do I have?
I would advise integrating your Kubernetes clusters for extra features.
Overall, I would rate the solution a nine out of ten because I'm happy with Cloud Native Security overall.
The number of features Cloud Native Security offered with just a small team was phenomenal. Give them another six months to a year, and it could be one of the best tools out there.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Shashank, thanks for your kind words. Allow me to assure you, we here at SentinelOne are relentlessly focused on our customers' success every day. And we are so happy to have welcomed the team in joining us. Sincerely, Rick
Buyer's Guide
SentinelOne Singularity Cloud Security
June 2025

Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
861,490 professionals have used our research since 2012.
Senior Dev Ops Engineer at a computer software company with 51-200 employees
The compliance assessment features help us during audits
Pros and Cons
- "We like SentinelOne Singularity Cloud Security's vulnerability assessment and management features, and its vulnerability databases."
- "The categorization of the results from the vulnerability assessment could be improved."
What is our primary use case?
We primarily use SentinelOne Singularity Cloud Security for compliance purposes because we work with banks and the fintech industry, so we must follow some standards like PCI DSS.
How has it helped my organization?
We use SentinelOne Singularity Cloud Security for compliance and security purposes, and it has helped a lot. We face many audits, and during each audit, we must conduct a vulnerability assessment. SentinelOne Singularity Cloud Security gives us a list of vulnerabilities that we remediate to raise our compliance score. It's our only tool for vulnerability assessments. The benefits are mostly immediate. SentinelOne Singularity Cloud Security helped reduce the number of false positives, which has been difficult.
What is most valuable?
We like SentinelOne Singularity Cloud Security's vulnerability assessment and management features, and its vulnerability databases. The interface isn't too complex. It's quite easy to use. The agentless vulnerability scan is the feature we use the most.
What needs improvement?
The categorization of the results from the vulnerability assessment could be improved.
For how long have I used the solution?
We have used SentinelOne Singularity Cloud Security for 2 years.
What do I think about the stability of the solution?
I have never faced any downtime.
What do I think about the scalability of the solution?
SentinelOne Singularity Cloud Security's scalability is quite good. We have multiple projects, and scalability isn't an issue.
What other advice do I have?
I rate SentinelOne Singularity Cloud Security 8 out of 10 based on the features I have used. I haven't used all the features, but I give the vulnerability and compliance features 8 out of 10. I can recommend SentinelOne Singularity Cloud Security for vulnerability scanning and compliance. There are many competitors, but I find SentinelOne Singularity Cloud Security quite good, which is why we haven't switched to something else for the past 2 years.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
Cloud Engineer at a tech services company with 201-500 employees
Helps save time, improves collaboration, and identifies misconfigurations
Pros and Cons
- "The cloud misconfiguration is the most valuable feature."
- "I would like SentinelOne Singularity Cloud Security to add real-time detection of vulnerabilities and cloud misconfigurations."
What is our primary use case?
I work for an insurance company whose infrastructure is on the cloud, so we use SentinelOne Singularity Cloud Security for security management and vulnerability detection.
How has it helped my organization?
SentinelOne Singularity Cloud Security is a valuable tool for managing infrastructure security. It offers advanced features like container security management, microservices security management, and Configuration Drift Remediation, which helps identify and address unauthorized configuration changes. These features are comprehensive and adaptable. Even for custom infrastructure modifications, such as XYZ, the SentinelOne Singularity Cloud Security team can be contacted for guidance and policy adjustments to ensure a smooth adoption process.
Infrastructure as Code is valuable because the code itself defines the infrastructure. This means any vulnerabilities or misconfigurations in the IaC code will be deployed to our infrastructure. However, IaC tools can scan the code and alert us to potential problems before deployment, allowing us to fix them proactively.
We saw the benefits of SentinelOne Singularity Cloud Security immediately.
It helped reduce the amount of false positives.
It has reduced our mean time to detection and remediation.
SentinelOne Singularity Cloud Security improved collaboration between our cloud security developers and the application security teams.
The collaboration helped us save time, which is one of the reasons we have continued to use SentinelOne Singularity Cloud Security.
What is most valuable?
The cloud misconfiguration is the most valuable feature. It highlights any misconfiguration that can make our infrastructure vulnerable.
What needs improvement?
I would like SentinelOne Singularity Cloud Security to add real-time detection of vulnerabilities and cloud misconfigurations.
For how long have I used the solution?
I have been using SentinelOne Singularity Cloud Security for almost 2 years.
What do I think about the stability of the solution?
I would rate the stability of SentinelOne Singularity Cloud Security 10 out of 10.
What do I think about the scalability of the solution?
I would rate the scalability of SentinelOne Singularity Cloud Security 10 out of 10.
How are customer service and support?
The technical support is good. They are knowledgeable and prompt.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment was straightforward. One person was required from our end.
What about the implementation team?
The implementation process itself was very smooth. The SentinelOne Singularity Cloud Security team provided excellent assistance in integrating the solution with our existing infrastructure and account. This made the integration process hassle-free. We've also recently integrated a new CDR feature using SentinelOne Singularity Cloud Security.
What other advice do I have?
I would rate SentinelOne Singularity Cloud Security 10 out of 10.
No maintenance is required for SentinelOne Singularity Cloud Security.
Once you've acquired SentinelOne Singularity Cloud Security, it's essential to review all your existing organizational policies. If these policies are compatible with your infrastructure, you can proceed without modifications. However, if there are any incompatibilities, you'll need to make adjustments to ensure your infrastructure triggers accurate alerts. Skipping this step can lead to a flood of false positives.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
IT Manager at a sports company with 501-1,000 employees
Cost-effective, good support, and end-to-end coverage
Pros and Cons
- "It is pretty easy to integrate with this platform. When properly integrated, it monitors end-to-end."
- "We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks."
What is our primary use case?
I consider it a cloud security posture management tool. It is being used for the overall posture of the environment.
By implementing Cloud Native Security, we wanted to monitor end-to-end misconfigurations. That is why we started with it. We are now also using one other module for detection and response, but mainly, we are using it to monitor misconfiguration and benchmark compliance.
How has it helped my organization?
It is pretty good. It has good coverage and a good reporting system.
There has been tremendous improvement since implementing Cloud Native Security. Cloud Native Security reports any misconfiguration that is there in the infrastructure. We do not have to go and check each service individually. It has helped a lot.
For compliance management, we can find the benchmark compliance status in Cloud Native Security directly. We do not have to do anything. Many benchmarks that we are supposed to follow are added by default. It is pretty easy for us to showcase compliance to anyone.
Misconfiguration detection has been the most effective for threat detection in our cloud environment. We are mainly focusing on the misconfiguration. I can see any configuration-related issues in all the modules.
Because it covers all the modules, every single aspect of the compliance has improved. We were able to find out the critical issues related to cloud infrastructure. It is a real-time monitoring system, so, at any time, we can check and confirm.
Cloud Native Security provides information about the exact affected area. We can easily locate a resource in a particular account or service. It is very clear from the Cloud Native Security report where to look for a particular misconfiguration. They have also added a graphical representation.
The reports tell us what is the impact, how critical it is, and how to locate the issue. That helps to prioritize things and fix a critical issue on an urgent basis. It is easy to analyze things from our side.
After implementing Cloud Native Security, we were able to implement so many best practices. Initially, we were getting different types of issues. We learned from those issues, and we are now implementing best practices based on that. We are also able to do real-time monitoring.
It has helped reduce the number of false positives we deal with. We are hardly getting any false positives. Previously, if we had four false positives, we now have only one false positive.
Cloud Native Security's ease of use and precision in detection have improved our risk posture a lot.
Cloud Native Security has saved our mean time to detect. It has saved a lot of our time. It has saved almost 95% of the time because we cannot go and check all the services in AWS. It is very vast. Cloud Native Security gives us specific information. There is no manual effort.
Cloud Native Security has not helped reduce our mean time to remediate because remediation depends on so many factors. It has nothing to do with Cloud Native Security. We are getting the issues, and the team is responding to them. After fixing them, there is a lot of improvement in the number of issues.
What is most valuable?
It is pretty easy to integrate with this platform. When properly integrated, it monitors end-to-end. The other thing is the coverage. As far as I know, it has pretty good coverage.
It is very easy to use. I would rate it a nine out of ten for ease of use.
What needs improvement?
We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks.
For how long have I used the solution?
I have been using Cloud Native Security for around ten months.
What do I think about the stability of the solution?
It is stable. I would rate it a nine out of ten for stability.
What do I think about the scalability of the solution?
It is scalable. I would rate it a nine out of ten for scalability.
Overall, we have seven users of this solution, but at a time, we only have two active users. It is being used in a single location.
How are customer service and support?
Their support is good. Whenever we have doubts, we get proper support. We connect with them and resolve the issue. I would rate them a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use any other solution. This is the first one.
How was the initial setup?
It is on the cloud. The implementation phase varies. It can take a few months.
It does not require any maintenance.
What's my experience with pricing, setup cost, and licensing?
I am not involved in the pricing, but it is cost-effective.
What other advice do I have?
I would recommend Cloud Native Security to others. Overall, I would rate Cloud Native Security a nine out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
IT Security Specialist at Tailor Security Tech
Precise, integrates well, and helps consolidate security solutions
Pros and Cons
- "It integrates very well. We sell different products from different vendors. We know that the SentinelOne Singularity platform can be integrated with several different solutions from different vendors."
- "The application module focuses on the different codes and libraries that can be run on the machines. It is very important for Singularity EDR to detect what type of codes and what type of libraries can run in the machine. If they can implement a white list or a black list of codes or libraries that can be used in the machine, it would be very helpful. They can focus more on the application module."
What is our primary use case?
We are a channel partner of SentinelOne in Brazil. We have a distributor that we use to sell SentinelOne. We are very happy and very proud to represent SentinelOne here.
How has it helped my organization?
SentinelOne Singularity Complete helps consolidate security solutions. There is a hot discussion about the future of the Security Operations Center. Security Operations Centers generally use SIEM and SOAR, but SentinelOne Singularity XDR can also help there because you can see what is happening not only on the endpoints but also in the network. In other words, you can replace the NDR solution. We also see it going all the way to include all the clouds. This ecosystem is very important to us. In the near future, we see it being used for all the problems related to detection and response in cybersecurity.
Our customers use the Ranger functionality. There are two Ranger versions. There is Ranger AD, and there is Ranger Pro. SentinelOne Singularity platform has its own security ecosystem. You do not have the need to buy other solutions. For example, we sell a ZTNA solution. If you have ZTNA, you do not need to buy a PAM solution. You do not need to buy a NAC solution. The ZTNA technology has replaced all the other solutions. It is the same thing with Singularity. If you buy the ecosystem of Singularity, you do not need to buy several different technologies.
Ranger can do all the hardware inventory. It can point out the versions of the operating systems and then you can apply patching to update the versions of the operating systems. You can use Ranger in different ways. For a security professional, it is a very powerful tool.
It sends you alerts and warnings about possible incidents, but you do not get too many false positives. It is precise. You get real information about an incident.
It is very important to have good hygiene of your endpoints and your network. The uptime of the endpoints and networks is very important. SentinelOne Singularity Complete provides a good uptime. Incident identification is very important and having fewer false positives is also important. The SOC staff knows that if SentinelOne Singularity points out an incident, they have to pay attention to the threat. It is a very good checker.
SentinelOne Singularity Complete reduces the organization's risk.
What is most valuable?
ITDR or Ranger AD is an important feature for me.
It integrates very well. We sell different products from different vendors. We know that the SentinelOne Singularity platform can be integrated with several different solutions from different vendors. We sell products of a Spanish company, and they support the integration of logs produced by SentinelOne into their platform. We see the capacity to integrate SentinelOne with the solutions of other vendors. It is very important because you can get not only a more integrated ecosystem but also a more powerful ecosystem.
What needs improvement?
All EDRs are made of different modules. There is a firewall module, an IPS module, and an application module. The application module focuses on the different codes and libraries that can be run on the machines. It is very important for Singularity EDR to detect what type of codes and what type of libraries can run in the machine. If they can implement a white list or a black list of codes or libraries that can be used in the machine, it would be very helpful. They can focus more on the application module.
For how long have I used the solution?
It is a short duration because we started to be a channel partner of SentinelOne two months ago, but we are very focused on SentinelOne.
How are customer service and support?
Their technical support for me is good. I am not involved in the deployment of the solution, but I have not heard any kind of complaint about the support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are currently using McAfee in our company, but we are going to move to SentinelOne.
I am a very experienced security professional. I have got the CISSP certification and other specific certifications. I see too many different products. I have good experience with Trend Micro, but I find SentinelOne Singularity more comprehensive.
We are trying to replace the solutions from other vendors. Customers are trying to use more powerful tools such as CrowdStrike or SentinelOne. We do not believe that Microsoft has a very good solution. There are a lot of people who speak about problems with Microsoft Defender and other components of the Microsoft ecosystem. The technical side is not the only factor. Price too is important, but we are trying to replace it. We have some good prospects to replace EDRs or other malware detection tools with SentinelOne Singularity.
How was the initial setup?
I am a security architect. I am not involved in the deployment of the solution. Some other guys in the technical area are involved in the deployment, but from what I hear, there is no problem. You have to do some configurations.
The deployment duration depends on the customer. If you have an SMB customer, it takes less time than to deploy it for a big customer.
What about the implementation team?
We have a team of technicians who are specialized in different kinds of companies. They are specialized in the cloud and other things. We have about 10 people. They take care of the deployment and configuration of the solution. We can also count on the specialist from the distributor for support and vendor support.
What was our ROI?
You get good support. You get a good product and you are going to be protected. The technology can be integrated with different tools. This is important. We do not live alone in this world. There are other vendors, so the capability to integrate is very important. Singularity Complete is going in the right way.
What's my experience with pricing, setup cost, and licensing?
The price depends on the extension of the solution that you want to buy. If you want to buy just EDR, the price is less. XDR is a little bit more expensive. There are going to be different add-ons for Singularity. This is important for customers because they can add some new features. They do not need to change the product. They can simply add a new feature.
What other advice do I have?
My company is a reseller of SentinelOne. It is one of the top solutions as per Gartner's Magic Quadrants. I am always interested in everything that comes from SentinelOne. I have watched the recent webinars about the latest launch of SentinelOne. There is going to be Purple AI. They have a new console, and we are waiting for it.
What we see here is that companies or customers want more features. The gap between EDR and XDR is too large. XDR includes cloud workloads of the systems and network and not only the endpoints. SentinelOne EDR is a very good solution. You do not need to monitor the Windows operating system. SentinelOne can do this for you. For example, the registry of Windows is the most important part of the operating system. SentinelOne EDR can see what happens in the registry. It can warn about any modification in the registry.
The Singularity ecosystem is very powerful. SentinelOne is very focused on expanding the reach of Singularity and making it a more comprehensive solution. SentinelOne is doing a very good job to get there. We believe that there will be a consolidation of the market, and SentinelOne will survive this consolidation because SentinelOne Singularity is a very powerful and very good solution.
I would rate SentinelOne Singularity Complete a nine out of ten. We have a very good relationship with SentinelOne.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Solutions Consultant at Trust Control
A comprehensive solution for complete visibility
Pros and Cons
- "Visibility is the most important aspect."
- "I would rate this solution a nine out of ten."
- "The documentation could be better."
- "The documentation could be better."
How has it helped my organization?
The most beneficial aspect of adopting these solutions is gaining visibility. We manage false positives efficiently, using tools like Tenable, which also provide visibility and help differentiate between actual risks and false positives concerning vulnerabilities.
What is most valuable?
Visibility is the most important aspect. Azure Monitor, SentinelOne Singularity Cloud Security, and other tools help gain visibility into our environments. Previously, we did not have any information about our environment. We now have visibility.
Evidence-based reporting is essential as it guides us in deciding and prioritizing vulnerability by improving our understanding of our environment. Before implementing these tools, obtaining information about our environment was challenging.
What needs improvement?
The documentation could be better. Besides improving the documentation, obtaining a professional or partner specializing in the implementation of SentinelOne Singularity Cloud Security is very important, as it can save time during the implementation process.
For how long have I used the solution?
I have used this solution for four or five years.
What do I think about the stability of the solution?
In my previous company, we once discovered a problem in one of our environments using SentinelOne, but I do not remember exactly what the problem was.
Which solution did I use previously and why did I switch?
I have not used any similar solution. SentinelOne offers a comprehensive solution for the complete environment. It is very difficult to get the same results from different partners and manufacturers.
How was the initial setup?
It is easy; it is not difficult.
What about the implementation team?
Usually, we make a deal with a specific partner specializing in implementation. We do not implement it on our own.
What other advice do I have?
Most security solutions are easy to use but require minimal knowledge to implement and maintain them.
Overall, I would rate this solution a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Mar 19, 2025
Flag as inappropriateDevOps Engineer at a computer software company with 51-200 employees
Nice UI and features with helpful support
Pros and Cons
- "Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful."
- "There should be more documentation about the product."
What is our primary use case?
We have multiple AWS accounts and we use it for our products and deployments, et cetera, and they are being monitored by SentinelOne Singularity Cloud Security for best practices and good security. In the past, we've had code exposed to the internet, and SentinelOne Singularity Cloud Security has been able to catch such instances. Basically, it is for security and monitoring purposes.
How has it helped my organization?
We've been able to integrate SentinelOne Singularity Cloud Security with out AWS and deployed their agents to Kubernetes. For production and compliance purposes, it allows us to monitor actively for issues from one place.
What is most valuable?
The solution reduces notifications.
We mainly use it for monitoring and security guidelines only. It's been really useful for us in terms of the developer accounts. If any have been exposed, we get notified and we can take care of issues before anything happens.
We haven't seen any server downtime. It's always been available when we've needed it.
The UI is very nice, and feature-wise, it's very good.
It has very good documentation.
Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful.
The solution is very easy to use. We have not had to spend much time customizing or integrating items. We were able to integrate all four AWS accounts in order to centrally monitor everything.
There is evidence-based reporting which can help prioritize and solve cloud security issues. We haven't actively used it or set it up.
We use the infrastructure as code scanning feature. It's good for identifying pre-production issues.
About six months ago, there was a major upgrade. We can see the containers running and which vulnerabilities appear, et cetera.
We haven't seen any increase in false positives since using the solution.
It's helped us improve our risk posture. We're more confident now that things aren't happening and getting missed. We're on the right track to adapting proper security rules.
More than saving engineering time, this solution has helped promote confidence is the security of our cloud accounts. We're more sure of our configurations and security posture. Since we don't have a cloud expertise team that might identify issues, it has helped us gain confidence in SQL deployments.
What needs improvement?
There should be more documentation about the product. Sometimes we have to go to customer support to get clarification.
For how long have I used the solution?
I've been using the solution for 1.5 years.
What do I think about the stability of the solution?
The solution is stable. I have not seen any downtime.
What do I think about the scalability of the solution?
We have around 15 users leveraging SentinelOne Singularity Cloud Security. They are mainly admins and engineers.
How are customer service and support?
Technical support is very helpful. However, the documentation needs to be better.
They tend to resolve issues within an hour or so. With most issues, they are very helpful
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have a different pipeline product working in parallel to this solution that is also helping us reduce vulnerabilities. Something else, for example, monitors compliance for us. SentinelOne Singularity Cloud Security is more of an additional tool than our main solution. We have been using open-source tools for scanning.
How was the initial setup?
The development was just one configuration, and we were able to implement SentinelOne Singularity Cloud Security in about an hour.
The solution does not require any maintenance.
What was our ROI?
We have noted an ROI based on the amount of confidence we've gained having visibility into our vulnerabilities. I do not have specific metrics on hand to illustrate that, however.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable.
What other advice do I have?
We're a customer and end-user. I'm a DevOps engineer.
I'd recommend the solution to others. I would rate it 10 out of 10 as it currently meets all of our requirements. I can't speak to other companies that may have different requirements.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Cloud-Native Application Protection Platforms (CNAPP) Vulnerability Management Cloud and Data Center Security Container Security Cloud Workload Protection Platforms (CWPP) Cloud Security Posture Management (CSPM) Compliance ManagementPopular Comparisons
Microsoft Defender for Cloud
Prisma Cloud by Palo Alto Networks
Tenable Nessus
Zscaler Zero Trust Exchange Platform
Tenable Security Center
AWS Security Hub
CrowdStrike Falcon Cloud Security
Akamai Guardicore Segmentation
Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Does SentinelOne have a Virtual Patching functionality?
- When evaluating Cloud-Native Application Protection Platforms (CNAPP), what aspect do you think is the most important to look for?
- Why is a CNAPP (Cloud-Native Application Protection Platform) important?
- What CNAPP solution do you recommend for a hybrid cloud?
- Why are Cloud-Native Application Protection Platforms (CNAPP) tools important for companies?
- When evaluating Cloud-Native Application Protection Platforms (CNAPP) solutions, what aspect do you think is the most important to look for?
- Why is Cloud-Native Application Protection Platforms (CNAPP) important for companies?
- What Cloud-Native Application Protection Platform do you recommend?
Thank you, Tanmay, for your kind words, feedback, and trust you place in us.