Try our new research platform with insights from 80,000+ expert users
PrathmeshChavan - PeerSpot reviewer
IT Developer at Team Global Express
Real User
Top 20
Behavior analytics detect anomalies for proactive threat management
Pros and Cons
  • "SentinelOne's behaviour analytics are valuable because they detect anomalies and malicious behaviour that signature-based solutions might miss."
  • "SentinelOne Singularity Cloud Security has saved up to 50 percent in engineering time."
  • "SentinelOne Singularity Cloud Security has limited legacy system support and may not fully support older operating systems or legacy environments."
  • "SentinelOne Singularity Cloud Security has limited legacy system support and may not fully support older operating systems or legacy environments."

What is our primary use case?

I use SentinelOne Singularity Cloud Security to detect vulnerabilities and threats.

I use SentinelOne Singularity Cloud Security for continuous monitoring, as it provides constant threat detection with minimal impact on our system's performance compared to other endpoint security solutions.

How has it helped my organization?

SentinelOne Singularity Cloud Security's initiative dashboards have a user-friendly interface that is easy to understand, even for new users. The intuitive design eliminates the need for extensive knowledge transfer, allowing anyone to grasp the essential functions of SentinelOne quickly.

The evidence-based reporting effectively prioritizes and resolves critical cloud security issues. Its operational metrics, including key performance indicators and security metrics like false-positive rates, mean time to detection, and mean time to response, provide valuable insights for improvement.

SentinelOne Singularity Cloud Security offers exceptionally clear proof of exploitability for security practices. This clarity fosters trust among stakeholders and managers, assuring them of a secure environment by simplifying vulnerability identification and remediation.

It has significantly enhanced our security visibility. The system provides alerts for any vulnerabilities, along with comprehensive documentation and user-friendly solutions. Its multi-cloud support streamlines issue resolution, allowing for quicker remediation.

SentinelOne Singularity Cloud Security has reduced the number of false positives by 40 percent, our mean time to detect by 20 percent, and our mean time to remediate by 30 percent.

As an application developer and infrastructure/technical support specialist, I find SentinelOne Singularity Cloud Security extremely helpful for our security needs. The notifications and other features are particularly useful in my daily work.

SentinelOne Singularity Cloud Security has saved up to 50 percent in engineering time.

What is most valuable?

SentinelOne's behavior analytics are valuable because they detect anomalies and malicious behavior that signature-based solutions might miss. The cost is also much cheaper than other products in the market.

What needs improvement?

SentinelOne Singularity Cloud Security has limited legacy system support and may not fully support older operating systems or legacy environments. The depth of features may be overwhelming for small-scale organizations with less complex security needs. It can sometimes feel complex for smaller teams, requiring specialized expertise that might be challenging for teams without skilled cybersecurity professionals.

Buyer's Guide
SentinelOne Singularity Cloud Security
April 2025
Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,604 professionals have used our research since 2012.

For how long have I used the solution?

I have been using SentinelOne Singularity Cloud Security for eight months.

What do I think about the stability of the solution?

I would rate the stability of SentinelOne Singularity Cloud Security a seven out of ten because sometimes the UI feels laggy.

What do I think about the scalability of the solution?

I would rate the scalability of SentinelOne Singularity Cloud Security nine out of ten.

How are customer service and support?

The technical support has been satisfactory.

How would you rate customer service and support?

Positive

What was our ROI?

Without SentinelOne, I would need to add two to three resources to my team for monitoring and threat detection. It has reduced the need for additional resources and saved money by 40 percent.

What's my experience with pricing, setup cost, and licensing?

While I'm slightly out of touch with pricing, I know SentinelOne is much cheaper than other products.

Which other solutions did I evaluate?


What other advice do I have?

I would rate SentinelOne Singularity Cloud Security eight out of ten.

SentinelOne Singularity Cloud Security is deployed across various departments and locations for approximately 70 users.

SentinelOne manages the maintenance for Singularity Cloud Security.

I recommend SentinelOne Singularity Cloud Security to other users for security, monitoring, and threat detection purposes. SentinelOne uses AI-based detection, continuously upgrading itself to be on top of the market. 

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
PeerSpot user
Sathvik Kallepalli - PeerSpot reviewer
Cyber Defence Analyst at a media company with 51-200 employees
Real User
Top 10
Provides visibility, saves time, and automatically maps networks
Pros and Cons
  • "SentinelOne Singularity Cloud Security offers an intuitive user interface that lets us navigate quickly and easily."
  • "Customized queries should be made easier to improve SentinelOne Singularity Cloud Security."

What is our primary use case?

We use SentinelOne Singularity Cloud Security to identify cloud security misconfigurations, ensuring compliance with Cloud Security Posture Management and Cloud Workload Protection Platform best practices, as well as relevant regulations in India. We also integrate SentinelOne Singularity Cloud Security with our GitHub repositories that store our hard-coded secrets.

How has it helped my organization?

We renewed our contract with SentinelOne Singularity Cloud Security for another year because it's extremely easy to use. The user-friendly UI, along with its integration with Jira and the ability to consume alerts through Slack, make it a valuable tool for our team.

Evidence-based reporting facilitates addressing complaints related to mandatory controls. SentinelOne Singularity Cloud Security offers an option for high-alert items to be kept publicly available if we're confident we have appropriate controls implemented.

SentinelOne Singularity Cloud Security's agentless vulnerability scanning has identified a significant number of vulnerabilities.

SentinelOne Singularity Cloud Security's evidence-based reporting, particularly its proof of exploitability, is highly valuable. For example, their recommendations significantly reduce investigation time and allow us to easily research vulnerabilities using tags. This targeted approach helps stakeholders prioritize and address critical vulnerabilities efficiently through the dashboard.

We utilize the offensive security engine, but fortunately, it doesn't detect many vulnerabilities. It primarily identifies publicly known patch versions and the exposure of the SMTP service. On the other hand, I would rate the ASM functionality an eight out of ten.

IaC scanning has been effective in identifying code-level issues whenever infrastructure as code is scanned.

SentinelOne Singularity Cloud Security automatically populates and maps our network, identifying any misconfigurations within the first two hours of deployment.

It has reduced false positives by around 90 percent.

Our mean time to detection has been improved, especially for critical areas. Our mean time to remediation has been improved as well.

SentinelOne Singularity Cloud Security has improved our risk posture by providing visibility into our cloud infrastructure.

SentinelOne Singularity Cloud Security improved the collaboration between the cloud security application developers and the app security team.

It helped our developers save time.

What is most valuable?

SentinelOne Singularity Cloud Security offers an intuitive user interface that lets us navigate quickly and easily. Additionally, its identification feature allows us to customize rules and configurations in the cloud.

IaS scanning identifies misconfigured code within GitHub repositories. This represents a "shift left" approach to security.

What needs improvement?

Customized queries should be made easier to improve SentinelOne Singularity Cloud Security. 

For how long have I used the solution?

I have been using SentinelOne Singularity Cloud Security for one and a half years.

What do I think about the stability of the solution?

While SentinelOne Singularity Cloud Security is stable for around 90 percent of the time, there are occasional glitches in the UI. However, as a security tool, our primary focus is on the results it delivers, rather than the aesthetics of the dashboards themselves.

What do I think about the scalability of the solution?

Scaling SentinelOne Singularity Cloud Security is easy. We recently integrated with AWS and it went well.

How are customer service and support?

We regularly contact the technical support team about some UI glitches. We provide them with feedback on these glitches regularly. Additionally, we would like to see some new features added to Jira when creating tickets. We've also been in touch with the technical support team about this.

The technical support team's responses are good and have been improving.

We've noticed a decline in their response times lately. This could be due to the recent acquisition of SentinelOne Singularity Cloud Security by SentinelOne. Previously, their response times were much faster.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?


How was the initial setup?

The initial deployment was straightforward.

Deploying SentinelOne Singularity Cloud Security is a quick process that involves creating a dedicated service account, granting the necessary roles to the service account, and attaching the service account to SentinelOne Singularity Cloud Security.

The total deployment time took around 15 minutes.

What about the implementation team?

The implementation was completed in-house.

What's my experience with pricing, setup cost, and licensing?

The features included in SentinelOne Singularity Cloud Security justify its price point. The agent-level monitoring for Kubernetes clusters is particularly valuable and could support a modest price increase.

Which other solutions did I evaluate?

Our evaluation of Prisma Cloud and Trend Micro on an open-source platform for identifying misconfigurations yielded a high number of false positives, limiting its effectiveness. We chose SentinelOne Singularity Cloud Security based on the price and the ease of use.

The setup and cleanup need to be done first to get things organized. This makes SentinelOne Singularity Cloud Security a much easier option than the other products we evaluated, which were all very complex. So, we won't be jumping straight to CWP. Instead, we'll focus on securing our perimeter. We believe SentinelOne Singularity Cloud Security can solve this issue, and the support we received during the proof of concept was also very positive. Considering all these factors, we decided to go with SentinelOne Singularity Cloud Security. 

What other advice do I have?

I would rate SentinelOne Singularity Cloud Security nine out of ten.

SentinelOne Singularity Cloud Security does not require maintenance.

It is easy to use, but it works best when you have established organizational practices in place. If you feel this is critical, don't hesitate to address it directly. Integrating SentinelOne Singularity Cloud Security is straightforward, so there's no need to worry about that. It's a ready-made solution that can be integrated with just a click. You can then address the specific issues you find most important. Ideally, integrate all your relevant sources during onboarding, such as GitHub or any cloud accounts you use. This ensures you capture everything from the start and get the best possible results.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
SentinelOne Singularity Cloud Security
April 2025
Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,604 professionals have used our research since 2012.
PRATHAMESH SHASHIKANT MOHITE - PeerSpot reviewer
Cloud Engineer at a construction company with 5,001-10,000 employees
Real User
Top 10
Provides automated security responses, is effective for threat management, and saves us costs
Pros and Cons
  • "The most valuable aspect of Singularity Cloud Security is its unified dashboard."
  • "A vulnerability alert would appear, and we'd fix it, but then the same alert would return the next day."

What is our primary use case?

To address our client's infrastructure vulnerabilities, we implemented Singularity Cloud Security by SentinelOne. This security solution effectively identifies and resolves security issues, streamlining the process of ensuring our clients' infrastructure remains secure.

For the past year and a half, we've been managing AWS infrastructure for a client, originally using basic AWS security tools. While these provided a workable solution, Singularity Cloud Security offered a significant advantage. It prioritizes vulnerabilities by severity, high, medium, or low, allowing us to focus on the most critical issues first. This centralized tool gathers information and displays all details on a single dashboard, significantly reducing manual work. The dashboard helps us identify problems, understand their meaning and potential impact, and follow clear resolution steps. This streamlined process enables us to address security concerns quickly and effectively, ultimately enhancing our client's infrastructure security.

How has it helped my organization?

Singularity Cloud Security was convenient and effective for threat management. In the past, we relied on daily information gathering and alerts, requiring us to manually address the findings. Now, Singularity Cloud Security provides continuous threat detection and simplifies our work, significantly improving our security posture.

The automated security responses have significantly improved our overall security posture.

Singularity Cloud Security is easy to use as it gives us the proper step-by-step methods to solve that vulnerability.

I would rate the evidence-based reporting for helping prioritize and solve important cloud security issues nine out of ten.

It is helpful that Singularity Cloud Security includes proof of exploitability in the evidence-based reporting. Although it isn't perfect, it gives us the right solution to mitigate vulnerability.

Our infrastructure configuration is defined using an Infrastructure as Code template. This template allows us to scan our entire infrastructure for potential issues, including pre-production problems within templates or container configuration files. Previously, we stored infrastructure details in a format that required manual data retrieval via CSV files. Now, with IaC, we have a centralized control system that manages multiple accounts and provides vulnerability listings based on severity for each account.

Our previous default AWS security tool wasn't sufficient, so we adopted Singularity Cloud Security based on a client recommendation. It's been a huge improvement. Whereas our old tool took three months to gather data, Singularity Cloud Security provides a daily updated dashboard with vulnerability information. This allows us to prioritize and address security risks based on criticality, saving us significant time and effort compared to the past.

Singularity Cloud Security has helped reduce the number of false positives by 70 percent.

Singularity Cloud Security streamlines manual work by providing insightful information on security vulnerabilities. It not only identifies issues we might miss but also offers in-depth analysis, including potential future costs and the severity of the threat. Additionally, it presents basic details tailored for users with less security expertise, empowering them to understand and address vulnerabilities effectively.

Singularity Cloud Security has improved our risk posture by 80 percent and has reduced our mean time to detection by 85 percent.

Singularity Cloud Security has reduced our mean time to remediation by 70 percent.

It has streamlined collaboration between our cloud security, application developers, and AppSec teams. This tool automates manual tasks, reducing our team size from ten to five. It provides us with the information we need to effectively identify and address vulnerabilities, making our cloud environment more secure.

It has been a huge time-saver for our engineering team, saving them weeks of work.

We have saved around 70 percent of our overall time with Singularity Cloud Security. 

Singularity Cloud Security has positively impacted our operational costs. The time saved by reducing manual work and resource requirements translates directly into cost savings.

Singularity Cloud Security's AI empowers us with improved security solutions. When faced with uncertainty, the tool can quickly provide insights to help us gain a clear understanding of the situation. 

What is most valuable?

The most valuable aspect of Singularity Cloud Security is its unified dashboard. This reduces manual work by centralizing all security information, allowing us to see vulnerabilities categorized by severity, low, medium, high, and critical. This clear prioritization streamlines the process of understanding, addressing, and resolving security issues, making threat mitigation significantly more efficient.

What needs improvement?

A recurring issue caused frustration: a vulnerability alert would appear, and we'd fix it, but then the same alert would return the next day. We reported this to both our internal team and SentinelOne for investigation and resolution. This needs improvement to prevent these repetitive alerts.

In a future update, it would be beneficial to have both an AI chat function and a more modern user interface.

For how long have I used the solution?

I have been using Singularity Cloud Security by SentinelOne for eight months.

What do I think about the stability of the solution?

I would rate Singularity Cloud Security's stability nine out of ten.

What do I think about the scalability of the solution?

I would rate Singularity Cloud Security's scalability eight out of ten.

Which solution did I use previously and why did I switch?

In AWS, we previously relied on Amazon Inspector, a built-in service that automatically scans for vulnerabilities including VDF findings, a type of assessment finding in our resources. This not only provided a default security solution but also integrated with AWS Security Hub, allowing us to centrally address critical security issues. We migrated to Singularity Cloud Security by SentinelOne because our prior tools were labor-intensive and lacked a unified dashboard. Previously, identifying which accounts had vulnerabilities required manually checking each one. Now, Singularity offers a single pane of glass for all our accounts, displaying both account details and any security findings. This significantly reduces manual work and simplifies our security posture.

How was the initial setup?

The deployment took weeks and involved ten people.

What's my experience with pricing, setup cost, and licensing?

Singularity Cloud Security by SentinelOne is cost-efficient.

What other advice do I have?

I would rate Singularity Cloud Security by SentinelOne nine out of ten.

Singularity Cloud Security is deployed in multiple departments and we have five users.

Singularity Cloud Security occasionally requires scheduled downtime for maintenance, which allows our technicians to identify and address any potential problems.

I recommend Singularity Cloud Security. It's streamlined our operations by reducing manual work and simplifying problem-solving. The user interface is intuitive, allowing even new hires to become proficient after just a few weeks of training.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Pushpak Patil - PeerSpot reviewer
AWS architect & consultant at ACC
Consultant
Top 10
It saves us time while improving security and compliance
Pros and Cons
  • "It saves time, makes your environment more secure, and improves compliance. SentinelOne Singularity Cloud Security helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security."
  • "When we get a new finding from SentinelOne Singularity Cloud Security, I wish we could get an alert in the console, so we can work on it before we see it in the report. It would be very useful for the team that is actively working on the SentinelOne Singularity Cloud Security platform, so we can close the issue the same day before it appears in the daily report."

What is our primary use case?

We use SentinelOne Singularity Cloud Security to check for misconfigurations and vulnerabilities in new infrastructure or applications we deploy on AWS. All of our accounts are integrated. When we deploy new services, it highlights any misconfiguration or lack of encryption. We return to our applications and try to fix the issues immediately. The company has about 25 SentinelOne Singularity Cloud Security users across three teams and five cloud environments, including production. SentinelOne Singularity Cloud Security covers all five. 

How has it helped my organization?

SentinelOne Singularity Cloud Security saves us time finding misconfigurations and encryption issues. It helps us troubleshoot why data is not encrypted or why it's sitting idle for a long time. We previously had a separate team investigate the environment for security issues, like public IPs or anything like that. SentinelOne Singularity Cloud Security saves us time equivalent to a whole team. It reduces the time spent on these tasks by about 30 percent. It has reduced our remediation time by around 10 percent.

Another benefit is security compliance. It gives us the security reports, and we implement the recommendations according to best practices provided by the team. We were around 60 percent compliant when we started. Our SentinelOne Singularity Cloud Security security compliance score is now 99.4 percent. 

Recently, we were migrating a database from on-prem to AWS. After we successfully migrated it, SentinelOne Singularity Cloud Security discovered that it was using default ports and that no audit or error logs were enabled. It highlighted that issue within 30 minutes. Before we went live, we reconfigured all the databases, and SentinelOne Singularity Cloud Security helped us. 

What is most valuable?

The most valuable feature is SentinelOne Singularity Cloud Security's feedback about the severity and impact of a misconfiguration and the best practices for resolving it. It's helpful to anyone who's using the tool. Even if you're unfamiliar with the issue, SentinelOne Singularity Cloud Security will give you a detailed description of everything that went wrong and how to fix it. 

If your account is integrated, SentinelOne Singularity Cloud Security's evidence-based reporting gives you an alert with the severity. Before you go live or pass it off to the other teams, so you know all the issues and misconfiguration in your infrastructure. You can fix it before passing it to the other team, and you are confident you are using the best practices. It reports weekly on the number of issues discovered and how many tickets we've closed. 

The proof of exploitability is critical. There are a few scenarios where I need to explain the misconfiguration to the team. Before SentinelOne Singularity Cloud Security, I had to provide the evidence and screenshots to demonstrate the misconfiguration on our end, but now SentinelOne Singularity Cloud Security takes care of all that, saving me time. As someone leading a team, I spend half as much time on these tasks.  

It separates the issues, dividing cloud-based misconfigurations from container-based or web-based ones, so we can forward them to the appropriate team. This separation is required for organizations that have multiple teams.

SentinelOne Singularity Cloud Security is easy to use. After one login, you can understand everything. The console UI is very user-friendly.

What needs improvement?

When we get a new finding from SentinelOne Singularity Cloud Security, I wish we could get an alert in the console, so we can work on it before we see it in the report. It would be very useful for the team that is actively working on the SentinelOne Singularity Cloud Security platform, so we can close the issue the same day before it appears in the daily report.

For how long have I used the solution?

We have used SentinelOne Singularity Cloud Security for nearly 3 years. 

What do I think about the stability of the solution?

I rate SentinelOne Singularity Cloud Security 9 out of 10 for stability. 

What do I think about the scalability of the solution?

I rate SentinelOne Singularity Cloud Security 9 out of 10 for scalability. 

How are customer service and support?

I rate SentinelOne Singularity Cloud Security support 8 out of 10. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before SentinelOne Singularity Cloud Security, we were using AWS GuardDuty. We adopted SentinelOne Singularity Cloud Security because we established a dedicated team for security compliance. 

How was the initial setup?

SentinelOne Singularity Cloud Security is a cloud-based platform, and the setup was pretty straightforward. They provided all the necessary documentation, and we had a call with the SentinelOne Singularity Cloud Security team to help us get started. The deployment was fast—it took less than 20 minutes. Four people were involved, including the SentinelOne Singularity Cloud Security team. After deployment, it requires no maintenance. It's good to go once you set it up. 

What was our ROI?

You can expect a decent return on investment from SentinelOne Singularity Cloud Security. It's better to use tools like SentinelOne Singularity Cloud Security to improve security and compliance. I estimate the ROI is around 25 percent. 

What other advice do I have?

I rate SentinelOne Singularity Cloud Security 9 out of 10. I would recommend SentinelOne Singularity Cloud Security to anyone. It saves time, makes your environment more secure, and improves compliance. SentinelOne Singularity Cloud Security helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Stan Kapica - PeerSpot reviewer
Risk Analyst at a recreational facilities/services company with 1,001-5,000 employees
Real User
Top 10
Helps free up SOC staff to work on other projects, detect threats and protect our assets
Pros and Cons
  • "Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks."
  • "It would be really helpful if the solution improves its agent deployment process."

How has it helped my organization?

Singularity Cloud Workload Security gave us the visibility we needed and freed up time to do other tasks. It narrows down the false positives that we got with the previous solution.

What is most valuable?

We use Singularity Cloud Workload Security to detect threats and protect our assets. We look at the threats that come in and whether they're being blocked. We use Singularity Cloud Workload Security as an anti-malware threat management product.

Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks.

What needs improvement?

We had a couple of issues with the solution's deployment. We had to deploy the agent, and sometimes there were issues. It feels like we're battling a version of the software when we have to deploy an agent over another agent. It would be really helpful if the solution improves its agent deployment process.

For how long have I used the solution?

I have been using Singularity Cloud Workload Security for over a year.

What do I think about the stability of the solution?

I haven't heard from our team about any stability issues with Singularity Cloud Workload Security. Singularity Cloud Workload Security is more stable than our previous solution.

What do I think about the scalability of the solution?

Singularity Cloud Workload Security handles anything we throw at it. The scalability is good.

How are customer service and support?

When we have an issue, an online engineer from their group helps us resolve it within an hour or two. I haven't heard anything negative about the solution's support from our team.

How would you rate customer service and support?

Positive

How was the initial setup?

I was involved in the selection and the proof of concept process. I wasn't on the call for the installation, but I overheard our two engineers involved in the solution's installation. The solution's deployment was pretty quick, and they installed it in one day.

What about the implementation team?

We implemented the solution with an in-house team.

What's my experience with pricing, setup cost, and licensing?

Singularity Cloud Workload Security's licensing and price were cheaper than the other solutions we looked at. One product was a little bit cheaper, but its functionality and the overall product weren't as good as Singularity Cloud Workload Security. One of the vendors' prices was almost double what we would get thus far. Talking to their engineer and salesperson put our minds at ease when we got it. We knew they would be there for support, and they have been really good.

What other advice do I have?

I'd ask users to take a good look at Singularity Cloud Workload Security because it brings a lot of value to the table. For its price, the solution does a good job compared to some other solutions.

Singularity Cloud Workload Security’s automated remediation works great.

The solution’s real-time detection and response capabilities work great for us. It frees up time, unlike our previous solution, where we had a lot of false positives. 

It's granular, and you can take a deeper dive into something if you need to. You can analyze and get a verdict. It's easier to narrow it down and pinpoint it with more detail.

The solution helped reduce our organization’s mean time to detect. Singularity Cloud Workload Security is quicker than our previous solution. We are a small group of just five people, and we have to do instantaneous detection to stop things from coming in quickly. We like that part a lot.

The solution helped reduce our organization’s mean time to remediate. It lets us analyze an incident, report the status quicker, and escalate it quicker than our previous solution.

Singularity Cloud Workload Security helped free up SOC staff to work on other projects. It probably freed up 10 to 15 hours a week. Before, we spent a couple of hours a day sifting through events and trying to see if they were false positives. The solution freed up a lot of time.

We have seen an impact on our organization's productivity using Singularity Cloud Workload Security. With the freed-up time, we're able to do a lot of other work. We use other products and look at phishing emails. It frees up our time to study more than we did in the past.

I would have users look at their visibility across their environment. The solution's quick response to threats, ability to act on them, automated incident response, and forensic investigation capabilities are really good. The solution provides you with 24/7 threat monitoring detection.

We work eight hours a day when we have someone on call. It's nice to know someone else is also looking at our events. They're there to dive in with us when we need them to help increase our team. Even though they're not on our team, they're there to help us.

Overall, I rate Singularity Cloud Workload Security a nine out of ten.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Mathew Gonzalez - PeerSpot reviewer
IT Support Specialist at a non-tech company with 201-500 employees
Real User
Top 20
SentinelOne Singularity Cloud
Pros and Cons
  • "The real-time detection and response capabilities overall are great."
  • "Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time."

What is our primary use case?

We are a relatively smaller organization of roughly 250 people. We utilize SentinelOne for patch management, vulnerability assessments, and remediation. So whenever one of our users has an issue on their machine, we get an immediate notification to let us know what that intrusion, infection, malware, whatever it might be, where it is, what file may have caused it, and then we can immediately take action. 

There are also default settings for ensuring the software that SentinelOne installs on all our client machines. The latest agent is up to date everywhere. They have a couple more insights, however, that's our main use case.

The big thing for us was just having optics on vulnerabilities, being able to ensure that we have a secure way to get month-over-month assessments of our security stats, and ensuring that there's something in place that can make sure that we're secure. We also wanted something that could keep up with current demands without having any sort of interference or impact on the user's end.

How has it helped my organization?

The biggest thing for us is the level of minimal intrusion on our user's experience. The previous EDR we were using, Sophos, was not ideal. Whenever an update came out, there would be different things that were affected. At one point, an update from Sophos had completely disabled public Wi-Fi for our users. And when dealing through their message boards, dealing with their support, they, unfortunately, did not have a resolution other than disabling security elements of their software. With SentinelOne, we have not seen a single instance of that. You can get down to the user level of tweaking different elements of their security system. You can even quickly add exclusions based on rules. Being able to tailor to our users and making sure that our users don't feel like something is running on their machine is the biggest advantage.

What is most valuable?

The remote shell and the remediation are the two that really stand out as valuable features. The remote shell function that it offers is something that I use almost daily. It allows us to quietly and discreetly sign in on a user's computer, but only as admin. It prevents any sort of security issues or security risks to a user, which would be probably our favorite. 

The remediation is really nice as it gives a very clear understanding of where a file came from. For example, in our use of it, there are a couple of files that we had that we didn't even know that we had. There was software that no one was aware was installed on these machines more than three years ago; we actually learned about that software once SentinelOne was installed. The level of optics it gives you is just incredible.

With that software, as soon as we installed SentinelOne, there were a couple of different applications and software that were immediately flagged as tracking user information and things like that. We found out that there was actually some sort of remote surveillance software that the past iteration of the IT team had installed and tested that just never got removed. We ended up tracking down the vendor for that and getting their assurance that that was no longer being used.

The real-time detection and response capabilities overall are great. I've never used anything that was as fast as this. The software that we used to use, Sophos, was comparable, however, it had a noticeable impact on the user. The bigger thing for me is that there isn't an impact on my end users. When we are actually running a scan, let's say, if we find that there's an impact, it's very quick. We've tested it by throwing malicious software onto our test machines just to see how quickly SentinelOne actually picks it up. And it's literally within seconds. When you actually do a scan, you can scan your higher fleet, and it's done relatively quickly as long as those machines are powered on. And it will act the second that those machines power on and connect to the Internet again to get that signal.  I've never used anything as quick, personally. 

The forensic visibility into the Linux terminal is not something we use as we actually don't use any Linux machines ourselves, so I couldn't speak to that. As far as visibility goes, we're primarily a Mac organization, and we have ten percent of our users on PC. As far as Mac goes, the visibility is fantastic. Same with the PC side of things. 

The historical data record, from what they had shown us in the demo, looks pretty incredible. We thankfully have not suffered an attack that required historical data. 

In terms of our mean time to detect, I don't think we ever had it. Since we're a small organization, we haven't had any real issues with genuine malware attacks. I can't speak to a scenario where while we were on Sophos, we experienced one. When we've had security audits that have tried to pen test for us, we have not had any issues with SentinelOne whatsoever. Every time that we've attempted to see how accurate and how quickly it can detect an infection or intrusion, it's being caught immediately.

The same is true for mean time to remediate. Any remediation that we do, for example, as soon as we block off a file, the automatic remediations are nice. In the event that we want to have something behave differently on another machine, we can quickly change that once we see it in any incident log. Setting those permanent rules is very helpful since, if you know something's malicious, chances are you don't want it showing up anywhere else.

The product has helped free up your SOC staff to work on other projects or tasks. The work that we used to have to do with our previous provider in going through our vulnerability assessments on a monthly basis and in trying to track down the install path of different applications was a headache and a half. With SentinelOne, the application management, and vulnerability assessments, are easy. You can see directly to the file path. It cuts a significant enough time out of our day.

It's had a positive impact on our overall productivity. Being able to dig through and find applications faster has drastically cut down our vulnerability position. When we first started using Singularity, we were somewhere in the thousands. Within the first month of having used it for our vulnerability assessments, we were down to just 1600, and now we're sitting well under the 500 mark when it comes to critical vulnerabilities. It's been very drastic and exponential at that. Now, any time a vulnerability does pop up, it's very quick and easy for us to track down where it is and take immediate action.

The interoperability with third-party solutions is fine. We don't currently use Kubernetes in our organization, however, we do utilize a VPN and it has no issues with adapting to that VPN. We also utilize different storage, including cloud storage accounts. There are no issues there either.

They've been fantastic at supporting innovation. We've had their support; they're always very responsive and very quick to give us the right advice on how we can execute what we're looking to do. Making sure that you have access to the necessary system without interrupting your user and without your user feeling at risk of their privacy being invaded is huge.

What needs improvement?

Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time.

For how long have I used the solution?

I've been using the solution for nine to ten months. 

What do I think about the stability of the solution?

I've had no stability issues at all. We have not experienced any performance decreases.

What do I think about the scalability of the solution?

As far as deploying to more devices, there's not a problem with scaling at all. We've automated in our MDM so any device that we start in our MDM automatically installs SentinelOne, and those devices immediately show up. If we spin up a new device on Mac OS, it shows within the set the SentinelOne console within seconds.

How are customer service and support?

Their support has been fantastic. They are quick to respond. 

I've never had an issue with their support. What little time I did have one scenario where it was not something that they could help with, they'd been able to provide us with all the articles and information necessary to act on it on our own, which is really all you can ask for.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were previously using Sophos. The biggest issue that we had with them was the fact that we were a fully remote company, so a lot of our users would be traveling for client meetings or even traveling abroad for client meetings. Reliance on a secure public WiFi solution is a very big deal for us. When it comes to users on a VPN, Sophos with MacOS's more recent updates would completely cut off Wi-Fi - which was very difficult for us to work around as a remote company. Thankfully, with multiple different tests in multiple different scenarios, we've never had that issue with SentinelOne. 

The other big thing is the capability to remove a device from the network. In the event that a significant intrusion or malware, malware, ransomware, whatever it might be, is detected the ability to just isolate that one user from internet access is huge. You would hope that that's how an EDR would behave instead of completely removing all internet no matter what.

How was the initial setup?

The initial setup was pretty straightforward. Our organization uses Kagi MDM. And in using that MDM solution, it was very easy for us to just quickly put together an automated installer and deploy it. 

We have multiple different groups of users, including PC and Mac. With the smaller percentage of PC users, we were able to just change the group ID in the installer, and that ensured that they were placed into the proper place for their groups. Being able to tweak and ensure that from the back end within the SentinelOne console, we could ensure that everything is set up the way we want it to be once that user gets that package installed, makes life a lot easier. You don't need to worry about signing on with a user and changing any of those settings. The installer package that they get is going to be everything that they need. Once that installs, that's it. It was very seamless. If anything, removing Sophos was the hardest part of the installation process.

We were able to deploy using a team of three people. Hypothetically, one person could do it alone as long as they are well versed in MDM.

As far as the application itself is concerned, there was no need for maintenance. You can control everything from the console. When there is a new agent to install you receive a notification when you log in to the management console. You can control when that update gets deployed to your organization. You can break it up into different groups within your organization. For ourselves, we always test on a smaller number of users. And then once we see stability, we deploy to the rest. That's what little maintenance is involved. It's a drastic improvement versus other solutions that I've used.

What about the implementation team?

We were able to do the initial setup completely in-house. We were able to do that on our own. We were able to very, very quickly deploy SentinelOne to pretty much our entire fleet.

What was our ROI?

Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider. Our users have less of a performance drain when attempting to use it. That's always huge when it comes to EDR. It pretty much checks every single box for us. It's the one software in our stack that we are happiest with.

What's my experience with pricing, setup cost, and licensing?

For us, the pricing is very fair. They were willing to meet our price point. With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at. 

Which other solutions did I evaluate?

We reviewed quite a few solutions. The big selling point for this product was that they were willing to work with us on a price point as a smaller organization. That was a huge reason for us actually going with them. The fact that they were willing to work with us as far as the pricing goes was the main reason that we ended up going with them. It was nice to see that they work with the little teams.

What other advice do I have?

We're a customer and end-user.

We thought something as good as SentinelOne would be out of the question for an organization of our size. We assumed it would be something that's suited to larger organizations - money, obviously, being the main concern. However, the fact that they were willing to work with us changed that. Seeing that they're willing to work with smaller organizations is cool. I like that they actually give back to the tech sector that way.

I'd rate the stability ten out of ten.

I'd advise new users that they're going to need to invest a little bit of time upfront in order to make sure that their organization is set up for proper deployment. We probably spent about a week or two configuring everything and getting it to work the way we wanted. However, after that initial investment of time, the maintenance that you have to do is pretty minimal.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Ashraf Razi - PeerSpot reviewer
Sr. Security Engineer at a energy/utilities company with 10,001+ employees
Real User
Top 20
Scans all devices on a network, automates remediation, and is user-friendly
Pros and Cons
  • "The most valuable features are automated threat response, AI detection, and static and dynamic detection."
  • "I request that SentinelOne investigate this false positive, as SentinelOne has a higher false positive rate than other XDR solutions."

What is our primary use case?

I use SentinelOne Singularity Cloud Security as an endpoint security tool. We have deployed it on multiple users' endpoints and multiple servers to protect them from security threats.

As a security engineer responsible for administering the SentinelOne Singularity Cloud Security, Kubernetes, and VR tool, I work in an organization with over 10,000 employees and numerous virtual servers and corporate network machines. To safeguard these systems from security threats, we've deployed Singularity across all endpoints and servers to monitor for and respond to incidents, gathering detailed information about their spread and affected machines.

How has it helped my organization?

Any security incident or malware detection is reported to security administrators within a fraction of a second. Basic rules and AI detections drive this rapid response. For example, suppose a file is flagged as suspicious based on its activity and alignment with the MITRE ATT&CK framework. In that case, the system identifies the file's behavior, categorizes it according to MITRE attackers, generates AI-based responses, and provides insights to security administrators for review and further investigation.

Automated remediation is highly effective, responding in mere fractions of a second to block, quarantine, or contain affected files or devices. Additionally, it can isolate endpoints from the network to prevent malware from spreading or containing compromised systems.

The Ranger feature is not exclusive to Linux systems. It scans all devices on a network, providing information about the types of machines and operating systems present within that specific network environment.

Workload telemetry visibility is valuable during incident response, triage, and analysis. Detailed information about the process is provided when an incident is reported, offering deep insights. For example, if a file is flagged as malware, the entire process behind its execution, including accessed files and invoked processes, is displayed. This comprehensive history effectively aids in determining file behavior and accurately classifying it as benign or malicious.

The benefits of SentinelOne Singularity Cloud Security are immediately visible through the quick response time.

The mean time to detection is under half a second.

The mean time to remediate is between one and one and a half seconds.

It provides an automated response, eliminating the need to block and investigate files manually. SentinelOne Singularity immediately blocks suspicious files, and subsequent investigation allows us to whitelist the file completely or maintain the block.

What is most valuable?

The most valuable features are automated threat response, AI detection, and static and dynamic detection. Monitoring all activities on the server's endpoint provides security administrators with deep visibility into endpoints, servers, and the incidents occurring on them.

What needs improvement?

I request that SentinelOne investigate this false positive, as SentinelOne has a higher false positive rate than other XDR solutions. While false positives are an expected part of incident response, excessive numbers can indicate accuracy issues with the tool.

For how long have I used the solution?

I have been using SentinelOne Singularity Cloud Security for two years.

What do I think about the stability of the solution?

Cloud-based stability is beneficial because it eliminates downtime for business owners, ensuring uninterrupted operations.

What do I think about the scalability of the solution?

Scalability is relatively straightforward as it primarily involves installing agents on additional machines and addressing licensing requirements.

Auto-scaling based on workload demands is beneficial, for example, when a hundred machines are added to the corporate network. We need to deploy the SentinelOne agent to these additional machines and confirm that the license accommodates the increased number of devices.

Which solution did I use previously and why did I switch?

We previously used Crowdstrike Falcon but prefer SentinelOne Singularity Cloud Security because it is user-friendly. The GUI is easy to understand, operate, and administer.

How was the initial setup?

Due to SentinelOne's cloud-based nature, initial deployment is straightforward. Simply installing the agent on the endpoints we wish to protect is sufficient, making setup within our existing corporate network infrastructure relatively uncomplicated.

The deployment time varies depending on the number of endpoints and servers accessible within the network, but it typically takes one to two months to complete and transfer responsibility.

Two people are necessary for deployment: one to handle administrative tasks and another to manage the SCCM component, such as pushing agents to multiple machines.

What other advice do I have?

I would rate SentinelOne Singularity Cloud Security eight out of ten.

Sometimes, Singularity incorrectly flags legitimate files as malware or suspicious, which can disrupt the work of some project users. However, we understand the importance of protecting against potential threats and appreciate Singularity's proactive approach. We can easily whitelist false positives, minimizing productivity impact and ensuring our system remains secure.

SentinelOne Singularity Cloud Security is a valuable tool for organizations with the budget to invest in it. It offers robust protection for servers and endpoints, which are primary targets for security breaches. Given the critical nature of endpoint security, this software should not be overlooked. SentinelOne has a strong reputation, provides rapid response times, and includes features such as deep visibility into malicious files, enabling security administrators to isolate threats in the cloud through sandboxing directly.

The only maintenance required is for agent upgrades.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Nayan More - PeerSpot reviewer
Cloud Engineer at ACC Ltd
Real User
Top 10
Cost-effective, identifies vulnerabilities in the infrastructure, and saves time
Pros and Cons
  • "The tool identifies issues quickly."
  • "When we request any changes, they must be reflected in the next update."

What is our primary use case?

We are using the solution to identify the security vulnerabilities in our AWS infrastructure. Whenever we create a new infrastructure in AWS, if there is a vulnerability, an issue is created in the SentinelOne Singularity Cloud Security console. There are different severities, such as critical, medium, and high. The product also provides solutions to resolve the issues. SentinelOne Singularity Cloud Security provides a solution document for AWS. It helps us resolve issues. We have seven to eight AWS accounts. It is all in SentinelOne Singularity Cloud Security. SentinelOne Singularity Cloud Security identifies the issues with all the accounts.

How has it helped my organization?

Our company has very strict compliance requirements for security. SentinelOne Singularity Cloud Security has helped us resolve vulnerabilities and issues using best practices. It helps us resolve the security vulnerabilities of the AWS cloud infrastructure. The compliance monitoring capabilities are helpful. The tool identifies issues quickly. It gives us the root cause of the security issues rapidly.

The evidence given by the product helps us resolve the issues. It provides a step-by-step guide to resolve issues. It helps us a lot. SentinelOne Singularity Cloud Security provides us with a lot of information. It provides us with a document of AWS. We use AWS CloudFormation. If there is an issue with AWS CloudFormation or if the code is rapidly changing, SentinelOne Singularity Cloud Security will identify the issue.

The number of false positives depends on the requirements of the clients. If the client needs something for their application and it shows as an issue in SentinelOne Singularity Cloud Security, we must contact SentinelOne Singularity Cloud Security and close the issue as an exception. The tool has reduced the false positives by 10%.

The solution helps us maintain our risk posture. We use a web firewall in AWS. If we do not have a firewall in any of the resources, the SentinelOne Singularity Cloud Security console will identify it as an issue. The tool has helped reduce the mean time to detect. We check the SentinelOne Singularity Cloud Security dashboard daily. We have a checklist. We can identify how many issues are open and how many issues are closed. It helps us reduce the time to identify the issues and open vulnerabilities. SentinelOne Singularity Cloud Security has helped us reduce our workload and time by 50% to 60%.

SentinelOne Singularity Cloud Security helps reduce our mean time to remediate by 70% to 80%. The product reduces workload and time. It is very important in every organization to reduce time and find vulnerabilities. SentinelOne Singularity Cloud Security also provides us with solutions to the issues. Every organization must have a tool like SentinelOne Singularity Cloud Security. I will recommend the product to others.

What is most valuable?

The SentinelOne Singularity Cloud Security team identifies issues when we create the infrastructure. Within two to three hours, they create an issue in the SentinelOne Singularity Cloud Security console. It helps us resolve the vulnerabilities during the creation of the infrastructure. SentinelOne Singularity Cloud Security provides us with documents on how to resolve issues with the infrastructure. It saves our time in identifying issues. Integration with our cloud environment was straightforward.

What needs improvement?

Based on our application requirements, we discussed some improvement points with the SentinelOne Singularity Cloud Security team. However, after the new updates, what we asked for was not implemented. The exceptions we requested from the SentinelOne Singularity Cloud Security team were not included in the console. When we request any changes, they must be reflected in the next update.

For how long have I used the solution?

I have been using the solution for two years.

What do I think about the stability of the solution?

The product is stable. I rate the stability a ten out of ten.

What do I think about the scalability of the solution?

We have 12 users, including internal users and clients. I rate the scalability a nine out of ten.

How was the initial setup?

The solution is deployed on the cloud. The deployment takes a few days. Our cloud team and the SentinelOne Singularity Cloud Security team were involved in the deployment process. We need two to three people for the deployment. The tool does not require any maintenance.

What about the implementation team?

I am satisfied with the technical support.

What was our ROI?

We save a lot of time identifying vulnerabilities. The product gives us the issue and the solution. It reduces our time and workload.

What's my experience with pricing, setup cost, and licensing?

The tool is cost-effective.

What other advice do I have?

The product is easy to use. My colleague provided me with a KT of the tool. I could learn to use it in two to three days. I understood how to check and resolve issues and segregate them into different severities. The ease of use is very helpful.

Overall, I rate the tool a ten out of ten.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2025
Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros sharing their opinions.