We use Singularity Cloud Security to monitor our infrastructure and ensure it meets all security and compliance standards. The solution helps us maintain and strengthen our security posture. Singularity covers our AWS environment, Kubernetes clusters, and some of our GitHub repositories.
DevOps Engineer at a computer software company with 51-200 employees
Gives us better visibility into our resources and enables faster resolution
Pros and Cons
- "Our organization is growing steadily, so our infrastructure is expanding, and we're managing more technical resources. Singularity Cloud Security helps us track our resources so that we don't get lost in the overwhelming volume of things and ensures we follow best practices. The solution gives us better visibility into our resources and enables faster resolution."
- "I would like to see the map feature improve. It's good, but it isn't fully developed. It lets us use custom resources and policies but does not allow us to perform some actions. I would also like more custom integration and runtime security for Kubernetes."
What is our primary use case?
How has it helped my organization?
Our organization is growing steadily, so our infrastructure is expanding, and we're managing more technical resources. Singularity Cloud Security helps us track our resources so that we don't get lost in the overwhelming volume of things and ensures we follow best practices. The solution gives us better visibility into our resources and enables faster resolution.
Another advantage of Singularity is compliance. I work in the payments industry, where regulations are strict. Maintaining everything and ensuring all the resources meet compliance standards is challenging, but Singularity Cloud Security enables us to do that while saving a lot of time.
Singularity has helped us reduce false positives, but it has also introduced some. Still, it's significantly less than many of the other tools we use. If we deal with fewer false positives, the technicians have more bandwidth to work on real issues. We don't need to spend time on the analysis and can focus on fixing the vulnerabilities and ensuring compliance.
The solution has improved our security posture considerably. In the finance industry, we can't function if we aren't compliant. The better our security posture is, the more compliant we are. By reducing vulnerabilities, we have eliminated risk factors in our systems.
Our remediation time is shorter. It's easier to identify vulnerabilities. We don't need to do much analysis before fixing vulnerabilities. About 90 percent of the time, we can identify the correct problem instantly and begin remedying the finding. It has saved a lot of time. It takes us only one or two days to remedy critical issues, whereas it previously took two weeks. Our mean detection time has dropped from about a week to one or two days.
The solution has given us a lot of insight into cloud security. It shows us some best practices that many people in the company do not know. Singularity finds those weak spots and educates us on the latest best practices to follow. The next time we deploy changes to our infrastructure, we change our policies and designs based on the recommendations.
What is most valuable?
Singularity Cloud Security's UI is clean, simple, and easy to use. When I started using it, I found it easy to learn what things are. Everything is explained in detail. It's always up to date with the latest technologies, such as AWS Kubernetes. They keep on top of trends with new features and updates.
The solution has a mapping feature that allows me to write my own queries and better understand my resources. It also offers some help with security controls on their end, suggesting best practices that you can use to write custom queries or standards. We have the flexibility to customize our infrastructure based on our needs.
Singularity's evidence-based reporting rates my alerts so I can see which ones to prioritize and identify the critical vulnerabilities. It provides a highly detailed description of each vulnerability and the resolution steps. I can triage all the findings from one place and apply different filters based on my preferences.
The offensive security engine is another major feature. We use it for our infrastructure and machines to see if we have an exposure or liability. It takes some time, but the vulnerability reports are highly accurate. It saves us some time because we don't need to verify all the vulnerabilities. We just have to go fix them.
What needs improvement?
The detection time could be better. It takes a long time to scan. I'm not sure how long other tools take for the same amount of scanning, so I cannot compare it with other tools, but it takes us half a day to a full day to complete the scan. I want to get the reports faster so we can start fixing the problems.
The proof of exploitability is another area for improvement. While I have all the information to troubleshoot the problem, it isn't detailed enough for an administrator. It has sufficient information for a general user, but an administrator would like to know all the ins and outs of the vulnerabilities that have been reported.
I would like to see the map feature improve. It's good, but it isn't fully developed. It lets us use custom resources and policies but does not allow us to perform some actions. I would also like more custom integration and runtime security for Kubernetes.
Buyer's Guide
SentinelOne Singularity Cloud Security
September 2025

Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
For how long have I used the solution?
We have used Singularity Cloud Security for about eight months.
What do I think about the stability of the solution?
I haven't seen any major stability problems. There are some minor issues but they are rare. Overall, it has been a smooth experience.
What do I think about the scalability of the solution?
Singularity is scalable. It has one UI that can be integrated easily with multiple backends, so we have all the data in one place and we can do whatever we want with it.
How are customer service and support?
I rate SentinelOne support eight out of 10. Their support team is proactive. It has been a while since I connected with them. They helped me with all my questions quickly. It was an excellent experience.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have worked on other infrastructure-as-code tools and other tools for various functions that Singularity performs, such an AWS Inspector, but now we use Singularity for most of it.
How was the initial setup?
The initial setup is not a very complex process. Because of the large number of resources, we have so many places where we need to integrate the solution repeatedly. It's easy to set up new places or add integrations. The initial setup took two to four weeks. That was how long it took to go back and forth and cover everything.
We did a PoC first, which wasn't very hard. Our deployment team consisted of three or four people. The vendor team was very helpful when they deployed everything on our infrastructure. They helped us set up all the necessary permissions.
What was our ROI?
The return on investment has been good. Singularity offers a lot of flexibility to focus on different aspects because it gives us a lot of information and helps us maintain the observability of all our resources. That is something that we value because of the sheer volume of resources we have. We couldn't do that manually or using some other tools.
What other advice do I have?
I rate SentinelOne Singularity seven out of 10. It's a solid product and I recommend checking it out. It has some excellent features, observability, metrics, etc. It's very cool.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

AWS architect & consultant at ACC
It saves us time while improving security and compliance
Pros and Cons
- "It saves time, makes your environment more secure, and improves compliance. SentinelOne Singularity Cloud Security helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security."
- "When we get a new finding from SentinelOne Singularity Cloud Security, I wish we could get an alert in the console, so we can work on it before we see it in the report. It would be very useful for the team that is actively working on the SentinelOne Singularity Cloud Security platform, so we can close the issue the same day before it appears in the daily report."
What is our primary use case?
We use SentinelOne Singularity Cloud Security to check for misconfigurations and vulnerabilities in new infrastructure or applications we deploy on AWS. All of our accounts are integrated. When we deploy new services, it highlights any misconfiguration or lack of encryption. We return to our applications and try to fix the issues immediately. The company has about 25 SentinelOne Singularity Cloud Security users across three teams and five cloud environments, including production. SentinelOne Singularity Cloud Security covers all five.
How has it helped my organization?
SentinelOne Singularity Cloud Security saves us time finding misconfigurations and encryption issues. It helps us troubleshoot why data is not encrypted or why it's sitting idle for a long time. We previously had a separate team investigate the environment for security issues, like public IPs or anything like that. SentinelOne Singularity Cloud Security saves us time equivalent to a whole team. It reduces the time spent on these tasks by about 30 percent. It has reduced our remediation time by around 10 percent.
Another benefit is security compliance. It gives us the security reports, and we implement the recommendations according to best practices provided by the team. We were around 60 percent compliant when we started. Our SentinelOne Singularity Cloud Security security compliance score is now 99.4 percent.
Recently, we were migrating a database from on-prem to AWS. After we successfully migrated it, SentinelOne Singularity Cloud Security discovered that it was using default ports and that no audit or error logs were enabled. It highlighted that issue within 30 minutes. Before we went live, we reconfigured all the databases, and SentinelOne Singularity Cloud Security helped us.
What is most valuable?
The most valuable feature is SentinelOne Singularity Cloud Security's feedback about the severity and impact of a misconfiguration and the best practices for resolving it. It's helpful to anyone who's using the tool. Even if you're unfamiliar with the issue, SentinelOne Singularity Cloud Security will give you a detailed description of everything that went wrong and how to fix it.
If your account is integrated, SentinelOne Singularity Cloud Security's evidence-based reporting gives you an alert with the severity. Before you go live or pass it off to the other teams, so you know all the issues and misconfiguration in your infrastructure. You can fix it before passing it to the other team, and you are confident you are using the best practices. It reports weekly on the number of issues discovered and how many tickets we've closed.
The proof of exploitability is critical. There are a few scenarios where I need to explain the misconfiguration to the team. Before SentinelOne Singularity Cloud Security, I had to provide the evidence and screenshots to demonstrate the misconfiguration on our end, but now SentinelOne Singularity Cloud Security takes care of all that, saving me time. As someone leading a team, I spend half as much time on these tasks.
It separates the issues, dividing cloud-based misconfigurations from container-based or web-based ones, so we can forward them to the appropriate team. This separation is required for organizations that have multiple teams.
SentinelOne Singularity Cloud Security is easy to use. After one login, you can understand everything. The console UI is very user-friendly.
What needs improvement?
When we get a new finding from SentinelOne Singularity Cloud Security, I wish we could get an alert in the console, so we can work on it before we see it in the report. It would be very useful for the team that is actively working on the SentinelOne Singularity Cloud Security platform, so we can close the issue the same day before it appears in the daily report.
For how long have I used the solution?
We have used SentinelOne Singularity Cloud Security for nearly 3 years.
What do I think about the stability of the solution?
I rate SentinelOne Singularity Cloud Security 9 out of 10 for stability.
What do I think about the scalability of the solution?
I rate SentinelOne Singularity Cloud Security 9 out of 10 for scalability.
How are customer service and support?
I rate SentinelOne Singularity Cloud Security support 8 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Before SentinelOne Singularity Cloud Security, we were using AWS GuardDuty. We adopted SentinelOne Singularity Cloud Security because we established a dedicated team for security compliance.
How was the initial setup?
SentinelOne Singularity Cloud Security is a cloud-based platform, and the setup was pretty straightforward. They provided all the necessary documentation, and we had a call with the SentinelOne Singularity Cloud Security team to help us get started. The deployment was fast—it took less than 20 minutes. Four people were involved, including the SentinelOne Singularity Cloud Security team. After deployment, it requires no maintenance. It's good to go once you set it up.
What was our ROI?
You can expect a decent return on investment from SentinelOne Singularity Cloud Security. It's better to use tools like SentinelOne Singularity Cloud Security to improve security and compliance. I estimate the ROI is around 25 percent.
What other advice do I have?
I rate SentinelOne Singularity Cloud Security 9 out of 10. I would recommend SentinelOne Singularity Cloud Security to anyone. It saves time, makes your environment more secure, and improves compliance. SentinelOne Singularity Cloud Security helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
SentinelOne Singularity Cloud Security
September 2025

Learn what your peers think about SentinelOne Singularity Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Cloud Security Specialist at a insurance company with 10,001+ employees
Is easy to deploy, helps reduce our mean time to detect, and actively identifies threats
Pros and Cons
- "Cloud Native Security offers a valuable tool called an offensive search engine."
- "With Cloud Native Security, we can't selectively enable or disable alerts based on our specific use case."
What is our primary use case?
We currently use Cloud Native Security for cloud security posture management, leveraging both the CWP module and the authentication security tab. While we regularly utilize these features, we're planning to onboard the cloud detection and response module, along with the ISIS scanning functionality.
We implemented Cloud Native Security as a secondary control measure to complement our existing security posture. In our Prisma Cloud environment, we have a detection score threshold set at 70 or above. As Cloud Native Security was a new entrant in the market, we wanted to evaluate its capabilities. Fortunately, Cloud Native Security's unique features and policies proved valuable. For instance, Cloud Native Security detected an alert when a developer accidentally committed VS Code files to a public GitHub repository. This helped us promptly remove the VS code from GitHub.
How has it helped my organization?
Cloud Native Security is easy to use.
The feature that has been most effective in threat detection for our cloud environment has been the cloud visual attack tab.
Our cloud security is managed by Intel and Azure Entra. We download a report from them and send it to our team to address any identified issues.
I appreciate that Cloud Native Security incorporates evidence of exploitability into their reports, making them more reliable.
Cloud Native Security's offensive security engine excels at validating potential exploit paths and prioritizing the most critical vulnerabilities. This enables us to proactively identify and address these risks, ultimately strengthening our security posture.
Cloud Native Security has helped reduce our false positives. We can investigate and mute any false positives so they don't appear going forward.
Cloud Native Security helps us actively identify threats, ultimately improving our security posture.
Cloud Native Security has reduced our mean time to detect by 10 percent.
Cloud Native Security facilitates collaboration between our cloud security application developers and AppSec teams. This collaboration is further enhanced by a shared console that provides visibility into all active tickets. This transparency helps to reduce redundant requests, saving time.
What is most valuable?
Cloud Native Security offers a valuable tool called an offensive search engine. This tool has been helpful for us. It allows us to search for vulnerabilities and provides evidence directly on the screen. Additionally, Cloud Native Security offers a feature called Graph Explorer. This feature allows us to drill down into specific resources, search for them on the console, and view details such as open security rules and graph features.
What needs improvement?
While only 5 percent of our workload resides on the Google Cloud Platform, we would still like Cloud Native Security to be configured with automatic remediation capabilities for GCP.
In Prisma, there's a dedicated tab for managing high and medium-severity alerts. This allows us to easily enable or disable specific policies based on our current needs. With Cloud Native Security, we can't selectively enable or disable alerts based on our specific use case.
For how long have I used the solution?
I have been using Cloud Native Security for six months.
What do I think about the stability of the solution?
I would rate the stability of Cloud Native Security 7 out of 10.
The only downtime we had was when switching from V1 to V2 but it was smooth.
What do I think about the scalability of the solution?
I would rate the scalability of Cloud Native Security 8 out of 10.
How are customer service and support?
The technical support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
For the past three years, Prisma Cloud has been our go-to security solution. Recently, we've added Cloud Native Security to our toolkit to further strengthen our security posture.
How was the initial setup?
The initial deployment was straightforward. First, we onboarded the UAT account. Then, we added our product support account and other accounts. We then tested the UAT environment accounts. The entire deployment took one week to complete. Two people were involved in the deployment.
What other advice do I have?
I would rate Cloud Native Security 9 out of 10.
Our primary cloud security monitoring solution is Prisma Cloud by Palo Alto Networks, with Cloud Native Security as a secondary control measure.
We have 19 users overall in our cloud security team that utilize Cloud Native Security.
The only maintenance required is for updates.
I would recommend Cloud Native Security to others.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Cloud Engineer at a construction company with 5,001-10,000 employees
Provides automated security responses, is effective for threat management, and saves us costs
Pros and Cons
- "The most valuable aspect of Singularity Cloud Security is its unified dashboard."
- "A vulnerability alert would appear, and we'd fix it, but then the same alert would return the next day."
What is our primary use case?
To address our client's infrastructure vulnerabilities, we implemented Singularity Cloud Security by SentinelOne. This security solution effectively identifies and resolves security issues, streamlining the process of ensuring our clients' infrastructure remains secure.
For the past year and a half, we've been managing AWS infrastructure for a client, originally using basic AWS security tools. While these provided a workable solution, Singularity Cloud Security offered a significant advantage. It prioritizes vulnerabilities by severity, high, medium, or low, allowing us to focus on the most critical issues first. This centralized tool gathers information and displays all details on a single dashboard, significantly reducing manual work. The dashboard helps us identify problems, understand their meaning and potential impact, and follow clear resolution steps. This streamlined process enables us to address security concerns quickly and effectively, ultimately enhancing our client's infrastructure security.
How has it helped my organization?
Singularity Cloud Security was convenient and effective for threat management. In the past, we relied on daily information gathering and alerts, requiring us to manually address the findings. Now, Singularity Cloud Security provides continuous threat detection and simplifies our work, significantly improving our security posture.
The automated security responses have significantly improved our overall security posture.
Singularity Cloud Security is easy to use as it gives us the proper step-by-step methods to solve that vulnerability.
I would rate the evidence-based reporting for helping prioritize and solve important cloud security issues nine out of ten.
It is helpful that Singularity Cloud Security includes proof of exploitability in the evidence-based reporting. Although it isn't perfect, it gives us the right solution to mitigate vulnerability.
Our infrastructure configuration is defined using an Infrastructure as Code template. This template allows us to scan our entire infrastructure for potential issues, including pre-production problems within templates or container configuration files. Previously, we stored infrastructure details in a format that required manual data retrieval via CSV files. Now, with IaC, we have a centralized control system that manages multiple accounts and provides vulnerability listings based on severity for each account.
Our previous default AWS security tool wasn't sufficient, so we adopted Singularity Cloud Security based on a client recommendation. It's been a huge improvement. Whereas our old tool took three months to gather data, Singularity Cloud Security provides a daily updated dashboard with vulnerability information. This allows us to prioritize and address security risks based on criticality, saving us significant time and effort compared to the past.
Singularity Cloud Security has helped reduce the number of false positives by 70 percent.
Singularity Cloud Security streamlines manual work by providing insightful information on security vulnerabilities. It not only identifies issues we might miss but also offers in-depth analysis, including potential future costs and the severity of the threat. Additionally, it presents basic details tailored for users with less security expertise, empowering them to understand and address vulnerabilities effectively.
Singularity Cloud Security has improved our risk posture by 80 percent and has reduced our mean time to detection by 85 percent.
Singularity Cloud Security has reduced our mean time to remediation by 70 percent.
It has streamlined collaboration between our cloud security, application developers, and AppSec teams. This tool automates manual tasks, reducing our team size from ten to five. It provides us with the information we need to effectively identify and address vulnerabilities, making our cloud environment more secure.
It has been a huge time-saver for our engineering team, saving them weeks of work.
We have saved around 70 percent of our overall time with Singularity Cloud Security.
Singularity Cloud Security has positively impacted our operational costs. The time saved by reducing manual work and resource requirements translates directly into cost savings.
Singularity Cloud Security's AI empowers us with improved security solutions. When faced with uncertainty, the tool can quickly provide insights to help us gain a clear understanding of the situation.
What is most valuable?
The most valuable aspect of Singularity Cloud Security is its unified dashboard. This reduces manual work by centralizing all security information, allowing us to see vulnerabilities categorized by severity, low, medium, high, and critical. This clear prioritization streamlines the process of understanding, addressing, and resolving security issues, making threat mitigation significantly more efficient.
What needs improvement?
A recurring issue caused frustration: a vulnerability alert would appear, and we'd fix it, but then the same alert would return the next day. We reported this to both our internal team and SentinelOne for investigation and resolution. This needs improvement to prevent these repetitive alerts.
In a future update, it would be beneficial to have both an AI chat function and a more modern user interface.
For how long have I used the solution?
I have been using Singularity Cloud Security by SentinelOne for eight months.
What do I think about the stability of the solution?
I would rate Singularity Cloud Security's stability nine out of ten.
What do I think about the scalability of the solution?
I would rate Singularity Cloud Security's scalability eight out of ten.
Which solution did I use previously and why did I switch?
In AWS, we previously relied on Amazon Inspector, a built-in service that automatically scans for vulnerabilities including VDF findings, a type of assessment finding in our resources. This not only provided a default security solution but also integrated with AWS Security Hub, allowing us to centrally address critical security issues. We migrated to Singularity Cloud Security by SentinelOne because our prior tools were labor-intensive and lacked a unified dashboard. Previously, identifying which accounts had vulnerabilities required manually checking each one. Now, Singularity offers a single pane of glass for all our accounts, displaying both account details and any security findings. This significantly reduces manual work and simplifies our security posture.
How was the initial setup?
The deployment took weeks and involved ten people.
What's my experience with pricing, setup cost, and licensing?
Singularity Cloud Security by SentinelOne is cost-efficient.
What other advice do I have?
I would rate Singularity Cloud Security by SentinelOne nine out of ten.
Singularity Cloud Security is deployed in multiple departments and we have five users.
Singularity Cloud Security occasionally requires scheduled downtime for maintenance, which allows our technicians to identify and address any potential problems.
I recommend Singularity Cloud Security. It's streamlined our operations by reducing manual work and simplifying problem-solving. The user interface is intuitive, allowing even new hires to become proficient after just a few weeks of training.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Sr Manager DevSecOps at Bidgely
Is user-friendly, reduces mitigation time, and improves our security posture
Pros and Cons
- "SentinelOne Singularity Cloud Security offers comprehensive security posture management."
- "There is room for improvement in the current active licensing model for SentinelOne Singularity Cloud Security."
What is our primary use case?
We utilize SentinelOne Singularity Cloud Security for Cloud Security Posture Management and real-time cloud configuration monitoring. SentinelOne Singularity Cloud Security identifies vulnerabilities at the resource level and generates reports. It also includes defense modules that investigate potential exposure of secrets in public or private repositories. Additionally, the scanning module can identify vulnerabilities and analyze how they correspond to and impact other modules.
We chose SentinelOne Singularity Cloud Security as our cloud security solution for its ability to identify misconfigurations, both intentional and unintentional, within our infrastructure. Additionally, SentinelOne Singularity Cloud Security generates reports that facilitate security compliance audits and help us identify inactive user accounts. It further integrates with our Jira instance, allowing for seamless data visualization on our security dashboard.
How has it helped my organization?
SentinelOne Singularity Cloud Security is user-friendly. The portal is well-designed and intuitive. SentinelOne Singularity Cloud Security boasts excellent customer engagement. They keep us informed with monthly updates on new features and upcoming releases, providing opportunities for learning and raising any challenges we encounter. Their approach is both proactive and professional.
It's evidence-based reporting system prioritizes and assigns reported issues to the appropriate teams based on their severity. This ensures that critical issues are addressed first. Reports are initially delivered to our CTO and then disseminated to the relevant teams for action.
Our agentless vulnerability scanner helps us discover vulnerabilities across our cloud infrastructure by analyzing cloud logs and log flows. It then provides detailed information and guidance on the identified vulnerabilities.
We find the offensive security engine that verifies actual exploit paths and prioritizes breach potentials to be very useful.
Using SentinelOne Singularity Cloud Security streamlines our cloud configuration validation process. We no longer need to spend excessive time and effort planning or using other tools to ensure our configurations meet industry standards. This reduces the training burden on our team, keeping them current with security best practices. Additionally, SentinelOne Singularity Cloud Security acts as a safety net, providing peace of mind and increased confidence when deploying updates, rolling out new policies, or making any security-related cloud configuration changes. Our experience and trust in SentinelOne Singularity Cloud Security are well-founded. Their support has consistently addressed any concerns we've raised throughout the year. This report demonstrates the value of maintaining a compliance center, and SentinelOne Singularity Cloud Security plays a critical role in making that possible.
SentinelOne Singularity Cloud Security has been instrumental in reducing false positives during login deployments. For example, when our server load balancer or cluster switches between servers. During this brief window of usually just a few seconds, the DNS isn't mapped to any background resources because it's being transferred from the old load balancer to the new one. While this is a minor, expected occurrence, it was previously flagged as a critical issue. Resolving these false positives took several hours. While SentinelOne Singularity Cloud Security likely detects these discrepancies in real time, it validates and corrects them based on a specific schedule. This delay in resolving the alerts prompted us to report the issue and request suppression of these expected findings. Highlighting this problem helped draw the attention of our executives and senior management.
SentinelOne Singularity Cloud Security has significantly improved our security posture. In the past, developers occasionally exposed credentials to the public unintentionally. SentinelOne Singularity Cloud Security effectively detects and reports these incidents to senior management, allowing us to address them promptly. Additionally, during infrastructure testing, security gateway code might be unintentionally exposed. However, SentinelOne Singularity Cloud Security helps us swiftly identify and mitigate these issues before any damage occurs.
Thanks to SentinelOne Singularity Cloud Security, we've significantly reduced our mean time to detection. It delivers the critical data we need, eliminating the need for dedicated full-time staff.
SentinelOne Singularity Cloud Security has helped us improve our mean time to remediation. Now, we can get prompt support from their team, allowing us to work together to mitigate issues quickly.
SentinelOne Singularity Cloud Security has improved collaboration between our cloud security team, application developers, and AppSec teams. Notably, secret configuration detection allows us to collaborate effectively with developers to swiftly resolve any emerging issues. Our DevOps team handles cloud security, and all teams are satisfied with SentinelOne Singularity Cloud Security's implementation. They actively participate in monthly meetings.
The collaboration has freed up some of our engineers' time. Once we enabled the module and it began identifying issues, engineers were able to plan their work more effectively. The analytical dashboard also helps them manage tasks efficiently, eliminating the need to hire additional staff.
What is most valuable?
SentinelOne Singularity Cloud Security offers comprehensive security posture management. Its success stems from its ability to analyze DNS mappings. While we may have access to the DNS record itself, the underlying infrastructure associated with that domain might be decommissioned. This creates a potential risk, as the domain could be remapped to a malicious website, leading to data breaches or credential theft. However, SentinelOne Singularity Cloud Security proactively detects and alerts us to such accidental exposures of sensitive information, including SaaS credentials. These are some of SentinelOne Singularity Cloud Security's most valuable features.
What needs improvement?
There is room for improvement in the current active licensing model for SentinelOne Singularity Cloud Security. As both a customer and service provider, I believe a more comprehensive package could be developed that would be mutually beneficial.
I recommend including endpoint monitoring functionality in a future release of SentinelOne Singularity Cloud Security. While we currently scan our endpoints manually through an external vendor, integrating this capability within SentinelOne Singularity Cloud Security would offer significant advantages. Additionally having real-time detection of malicious activity in our network would be beneficial.
For how long have I used the solution?
I have been using SentinelOne Singularity Cloud Security for 2.5 years.
What do I think about the stability of the solution?
SentinelOne Singularity Cloud Security is stable.
What do I think about the scalability of the solution?
SentinelOne Singularity Cloud Security is scalable.
How are customer service and support?
The technical support is responsive and they stay in contact with us.
How would you rate customer service and support?
Positive
What was our ROI?
As an energy company, SentinelOne Singularity Cloud Security helps us ensure compliance across our many providers, which is essential for our business expansion.
What's my experience with pricing, setup cost, and licensing?
The pricing for SentinelOne Singularity Cloud Security in India was more reasonable than other competitors.
What other advice do I have?
I would rate SentinelOne Singularity Cloud Security eight out of ten.
We have 15 people in our organization that use it. SentinelOne Singularity Cloud Security is responsible for the maintenance.
It is a sophisticated and fast-growing product with great services.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
SDE II/ Senior SRE at a computer software company with 1,001-5,000 employees
Provides good insights and has good support and price
Pros and Cons
- "We liked the search bar in SentinelOne Singularity Cloud Security. It is a global search. We were able to get some insights from there."
- "We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in SentinelOne Singularity Cloud Security."
What is our primary use case?
We did a PoC, but we did not go ahead with SentinelOne Singularity Cloud Security. It is currently on a test cluster. It is not in production.
We were looking for a CSPM tool to monitor all of our AWS resources. We also wanted it to give us an alert in the case of a vulnerability. If, for example, a zero-day vulnerability is there, it should scan all of our tools.
How has it helped my organization?
We used agentless vulnerability scanning. It helped us to see all the vulnerabilities without deploying any third-party component in our system.
We used SentinelOne Singularity Cloud Security's Offensive Security Engine. It helped us to identify all the CVEs. We could see what kind of CVEs were there and what severity level they had, such as normal or critical. It helped visualize all the severities.
SentinelOne Singularity Cloud Security changed our security posture a lot. In one dashboard, we were able to see all the information. We could see which resources are vulnerable and which ones have critical bugs. It helped us with that.
SentinelOne Singularity Cloud Security did not reduce our mean time to detect and mean time to remediate.
SentinelOne Singularity Cloud Security helped with collaboration, but in my organization, developers are not directly involved with SentinelOne Singularity Cloud Security. There was mainly the infrastructure component where we deployed agents and based on our particular role or access, they were able to send all the data to the SentinelOne Singularity Cloud Security server. We were able to see all the reports and all the details in the UI.
What is most valuable?
We liked the search bar in SentinelOne Singularity Cloud Security. It is a global search. We were able to get some insights from there.
The reporting feature is good. It is able to generate reports.
Its UI is very good, and it is easy to adapt. Any new person will be able to navigate, and within a week, he or she will be able to understand SentinelOne Singularity Cloud Security.
What needs improvement?
We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in SentinelOne Singularity Cloud Security.
If there is any virtual machine running on your public subnet, it is accessible outside your network. It is accessible via the Internet. If it has any Log4j or remote accessibility vulnerability, the attacker would be able to access the machine. From the private machine, the attacker can do NS Lookup and reach our DBs. It creates a channel for vulnerabilities. Such a feature is not present in SentinelOne Singularity Cloud Security.
What do I think about the stability of the solution?
It is stable. We have not had any issues.
What do I think about the scalability of the solution?
It is scalable.
How are customer service and support?
They were helpful. They helped us with the configuration. They were available through the Zoom call. Initially, they also provided us with a demo of all the features. They showed us all the features that we could use.
The speed of their support was good. I would rate their support a 9 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are using Orca. We did a PoC with SentinelOne Singularity Cloud Security, and there were some cost benefits.
How was the initial setup?
SentinelOne Singularity Cloud Security is a SaaS solution. I was involved in its initial deployment. It took around three months.
What about the implementation team?
We used their support. Its implementation requires at least two people.
What's my experience with pricing, setup cost, and licensing?
Its pricing was a little less than other providers.
What other advice do I have?
I would advise doing a PoC with all the similar tools and then making a decision based on the capabilities, features, and price.
Overall, I would rate SentinelOne Singularity Cloud Security a 9 out of 10.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Engineer at a transportation company with 1-10 employees
Great support, works well with AWS, and offers good vulnerability scanning
Pros and Cons
- "The agentless vulnerability scanning is great."
- "I'd like to see better onboarding documentation."
What is our primary use case?
We have AWS for most of our infrastructure, however, we don't have a dedicated security team. There are a lot of potential vulnerabilities which we are concerned about. We use SentinelOne Singularity Cloud Security for security. For example, if there are open ports or incorrect configurations, we would get alerted and could fix them.
What is most valuable?
They have dedicated cloud-based configurations, which are quite helpful.
The product works well with AWS. It can help us manage AWS security. If there are any groups or details that are incorrect or unsafe, or even misconfigured, it helps protect us.
The product offers ISE scanning, which basically scans all activities for issues.
We can pick up on pre-production issues. It's very helpful. They've helped us by providing a lot of CI/CD tools. Everything gets scanned so that we can get a sign-off before a deployment.
The ease of use is very good. I'd rate the ease of use 8 out of 10. They have nice UI and templates and the docmentation is very helpful. It's very thorough.
They also have a good support system for users. If something is not working, they have a good SLA, and within a day or so, they will reach out and help you with whatever you need.
The agentless vulnerability scanning is great.
If a protocol is not being properly followed, we'll be alerted. This helps us react faster to any production issues.
We do use the offensive security engine. It's good for verifying exploit paths and prioritizing items. We have recently started using this. It allows us to see which endpoints, for example, are publically accessible, or what code repositories have vulnerabilities in terms of libraries we are using that may be outdated. For example, if we've noted our NGINX server is very publically exposed we can change things.
The benefits of the product were felt almost immediately as it allowed us to handle issues in the pre-production phase. We didn't have to make anything live before finding issues. Within an hour, we'd begin to see issues, and within 4 to 6 hours, we'd have a full survey of security vulnerabilities. We also get regular notifications when the system sees something is off. Based on the information we receive, we're able to react and fix things very quickly.
We're able to see both high and low-priority issues so that we can accurately prioritize what to do first. That helps us manage bandwidth in terms of resources.
SentinelOne Singularity Cloud Security has helped us reduce the amount of false positives we see. We've reduced false positives by around one-third.
Our mean time to detect has been reduced, as well as our mean time to respond. We used to rely on a third-party provider to find issues, and now we can do it in-house. This means we no longer have to sync our AWS information on a daily basis. Now, we have a direct integration with SentinelOne Singularity Cloud Security. We used to have a delay of 36 to 48 hours before we would recognize if there were any vulnerabilities. On top of that, there was a reaction time delay of 4 to 6 hours, meaning issues wouldn't be dealt with until maybe 50 or so hours after the vulnerability was detected. We've reduced all of this down to maybe 8 to 10 hours.
The collaboration between cloud security, application developers, and AppSec teams has been better. It's mostly been positive for us.
What needs improvement?
They could improve on their UI. Sometimes it's not clear where to look when seeking information. Support often can direct us by giving us the correct link to what we are looking for.
I'd like to see better onboarding documentation. If we want to be able to integrate something new, such as new assets, it can be difficult.
For how long have I used the solution?
I've used the solution for more than 2 years now. We started using it around December 2021 or January 2022.
What do I think about the stability of the solution?
I haven't faced any lagging or crashing.
What do I think about the scalability of the solution?
For our use case, it has been scalable.
How are customer service and support?
The support they provide is good. They give you very detailed information and documentation which they have created internally. They are very informative. They've even shared their own internal documentation in terms of AWS issues or questions.
They are quick to respond, You can rely on them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did use a different solution, however, it didn't offer direct AWS integration. Due to this, we had to wait up to 48 hours for information on vulnerability issues. We were already having security issues in that timeframe, so we needed something that could help us detect faster.
How was the initial setup?
The initial deployment was easy. However, having more initial onboarding documentation would have been better. However, we've created some internal docs that have helped us with our use case. How long it takes to deploy depends on the use case, however, we were able to have it up in 12 to 14 hours. We had 2 people working on the deployment.
What about the implementation team?
SentinelOne Singularity Cloud Security did offer some assistance with the setup.
What's my experience with pricing, setup cost, and licensing?
I'm not sure of the exact pricing. However, my understanding is that it is very economical.
Which other solutions did I evaluate?
We did explore Crowd Strike at some point. Crowd Strike was a very big platform and we were not sure how much support we'd get. We wanted to make sure we had priority support.
What other advice do I have?
I'd rate the solution 9 out of 10. The usability is very good. Both their new and mature products are good in terms of their overall usability.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Cloud Security Engineer at a insurance company with 10,001+ employees
The offensive security feature is something no other product offers
Pros and Cons
- "When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
- "Cloud Native Security's reporting could be better. We are unable to see which images are impacted. Several thousand images have been deployed, so if we can see some application-specific information in the dashboard, we can directly send that report to the team that owns the application. We'd also like the option to download the report from the portal instead of waiting for the report to be sent to our email."
What is our primary use case?
We adopted Cloud Native Security for its offensive security engine, which no other tools provide. It checks to see if any file or domain has public access. We also use it for cloud configuration scanning. Now, we are integrating it with cloud detection and response and plan to integrate it with CloudTrail and logs. Multiple team members use the solution. Our cloud security team has more than 10 members. We sometimes forward issues to the application team.
How has it helped my organization?
When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks.
Compliance management is critical for every organization. Our compliance score was pretty low when we started using Cloud Native Security. Now, we've started seeing improvement every quarter. We're around 85 to 95 percent compliant. When we see any alerts related to configuration, we raise a ticket with our follow-up team unless the issue is resolved automatically. We eliminate false positives and identify and work on any problems with our policies or other issues.
Cloud Native Security has reduced our detection time by 15 to 20 percent through automation. The solution makes it easier by showing every impacted resource on a single dashboard. If we didn't have an automated tool to show us all the affected assets, we wouldn't know what's happening on every server or the resources we have created. Without this solution, we had to go to the documentation page for every cloud provider and implement the change. Now, we can check a single dashboard to get an overall idea of how something impacts our resources, and it helps us to automate.
The solution has improved collaboration between our teams regarding security posture. We can say to the cloud security team that they need to follow a particular posture-related practice or adopt a network configuration, like blocking public access to a resource. We give these requirements to the network development and application teams.
Cloud Native Security has reduced our vulnerabilities and misconfigurations, improving our security posture. We had about 10,000 alerts when we started, but we brought that down to around 500. That was a considerable improvement in six months.
What is most valuable?
I have worked on most of the tools in the market, and every product has distinctive features. Cloud Native Security's standout feature is offensive security. That's something no other product offers. All the other products have the same core features, such as vulnerability scanning.
The UI is user-friendly, and the recommendations are easy for everyone to understand. If any misconfiguration happens, all four teams can read the options and understand how to implement them. To achieve these goals, we can also create an automated template according to cloud security best practices
SecOps plays a crucial role in our deployment and testing in the software lifecycle. In the course of building and deploying our applications, we need to look at our vulnerabilities and configurations. It's easy to identify these things and fix them before deployment by integrating Cloud Native Security.
The solution's evidence-based reporting is helpful because it provides real-time information. If a file has been opened and we haven't provided access, it gives us the evidence. It tells us the domain, and we try to investigate by going to the team that owns the file. We require them to make the file private, so it can't be accessed from the internet.
What needs improvement?
Cloud Native Security's reporting could be better. We are unable to see which images are impacted. Several thousand images have been deployed, so if we can see some application-specific information in the dashboard, we can directly send that report to the team that owns the application. We'd also like the option to download the report from the portal instead of waiting for the report to be sent to our email.
For how long have I used the solution?
We started using Cloud Native Security last year.
What do I think about the stability of the solution?
Cloud Native Security doesn't have any bugs or glitches. It's fairly stable.
What do I think about the scalability of the solution?
I rate Cloud Native Security nine out of ten for scalability.
How are customer service and support?
I rate Cloud Native Security support nine out of ten. They have email support, but there is no option to raise tickets from within the portal. Now, they have Intercom, and we raise tickets through that.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Prisma Cloud, which has many of the same features, such as cloud-based configuration, Kubernetes scanning, vulnerability assessment, etc., but Cloud Native Security has the Offensive Security Engine. That is the main reason we switched.
How was the initial setup?
Our organization started with a POC for a month and a half before presenting Cloud Native Security to our VP and senior leadership. They gave us the go-ahead, and we finalized the product. It took us less than a week to implement, but the deployment time depends on the organization. It might take time if they need to get approval from leaders.
What's my experience with pricing, setup cost, and licensing?
I rate Cloud Native Security seven out of ten for pricing. It's cheaper than many other products.
What other advice do I have?
I rate Cloud Native Security nine out of ten. It's a mature solution that includes all the features found in other products on the market.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Cloud-Native Application Protection Platforms (CNAPP) Vulnerability Management Cloud and Data Center Security Container Security Cloud Workload Protection Platforms (CWPP) Cloud Security Posture Management (CSPM) Compliance ManagementPopular Comparisons
Microsoft Defender for Cloud
Prisma Cloud by Palo Alto Networks
Tenable Nessus
CrowdStrike Falcon Cloud Security
AWS Security Hub
Tenable Security Center
Akamai Guardicore Segmentation
Buyer's Guide
Download our free SentinelOne Singularity Cloud Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Does SentinelOne have a Virtual Patching functionality?
- When evaluating Cloud-Native Application Protection Platforms (CNAPP), what aspect do you think is the most important to look for?
- Why is a CNAPP (Cloud-Native Application Protection Platform) important?
- What CNAPP solution do you recommend for a hybrid cloud?
- Why are Cloud-Native Application Protection Platforms (CNAPP) tools important for companies?
- When evaluating Cloud-Native Application Protection Platforms (CNAPP) solutions, what aspect do you think is the most important to look for?
- Why is Cloud-Native Application Protection Platforms (CNAPP) important for companies?
- What Cloud-Native Application Protection Platform do you recommend?