We use SentinelOne's Singularity Cloud Security as our Cloud Security Posture Management solution, to proactively identify vulnerabilities within our cloud configurations. Security alerts generated by the platform are then forwarded to our mitigation team for prompt remediation.
External reviews
External reviews are not included in the AWS star rating for the product.
Improves our cloud security, is flexible, and user-friendly
What is our primary use case?
How has it helped my organization?
The solution is easy to use.
The evidence-based reporting is helpful to our DevOps team who manually mitigate the vulnerabilities.
Singularity Cloud Security offers a flexible agentless vulnerability scanning solution that allows me to receive alerts directly to my personal email, a feature missing from AWS GuardDuty.
Evidence-based reporting that demonstrates how a vulnerability can be exploited is crucial because it allows me to prioritize alerts based on their severity level. This ensures I focus on the most critical issues first.
Singularity Cloud Security has improved our organization's security by proactively identifying vulnerabilities that could have significant detrimental effects.
It has decreased the number of false positives.
Before implementing Singularity Cloud Security our mean time to detection was three to four days.
Singularity Cloud Security has significantly improved our mean time to remediation from one hour to just 15 minutes.
What is most valuable?
SentinelOne stands out with its responsiveness to feature requests for Singularity Cloud Security. This means they can adapt the product to our specific needs, whereas Prisma Cloud forces us to wait for their pre-determined release schedule.
What needs improvement?
SentinelOne currently lacks a break glass account feature, which is critical for implementing Single Sign-On. SentinelOne should prioritize the development of a break glass account feature.
We've encountered some filtering difficulties, resulting in a few areas of the interface needing improvement.
For how long have I used the solution?
I have been using Singularity Cloud Security by SentinelOne for one year.
What do I think about the stability of the solution?
Singularity Cloud Security by SentinelOne is stable.
What do I think about the scalability of the solution?
I would rate the scalability of Singularity Cloud Security nine out of ten.
How are customer service and support?
The technical support is good. They've assisted us on multiple occasions with implementing new policies and creating custom plug-ins to meet our specific needs.
How would you rate customer service and support?
Positive
How was the initial setup?
I successfully deployed the solution in collaboration with a cloud-native administrator. The deployment process went smoothly and we encountered no complications.
What other advice do I have?
I would rate Singularity Cloud Security by SentinelOne eight out of ten.
We have over 400 users in our organization.
Helps identify vulnerabilities, is easy to use, and improves our risk posture
What is our primary use case?
SentinelOne's Singularity Cloud Security streamlines our cloud security by minimizing false positives. Previously, we were inundated with alerts from various sources like AWS Cloud and Microsoft Defender, making it difficult to distinguish real threats. Now, with Singularity's cloud-native security, I can confidently address genuine threats and efficiently alert my team about relevant Defender policies.
We implemented Singularity Cloud Security to reduce the number of false positive alerts we were receiving.
How has it helped my organization?
I would rate the ease of use a seven out of ten.
The Proof of exploitability in evidence-based reporting helps us during our investigations.
The IaC scanning helps identify preproduction issues.
By analyzing alerts from various channels against our defined security policies, Singularity Cloud Security significantly reduces false positives. This allows our team to focus on real threats, and when a rare false positive does occur, we can quickly notify the security team to refine the relevant policy.
Our false positives have been reduced by over 80 percent.
It has improved our risk posture.
Singularity Cloud Security has improved our mean time to detect by 20 percent and has improved our remediation time by allowing us to see the details of the vulnerabilities in one place.
Singularity Cloud Security has saved our engineers around 25 minutes of time.
What is most valuable?
The key strength of Singularity Cloud Security lies in its ability to pinpoint vulnerabilities in our cloud accounts and identify suspicious activity that warrants further investigation.
Unlike Prisma, which schedules feature additions for its next roadmap release, Singularity prioritizes user feedback and strives to implement feature requests as quickly as possible.
What needs improvement?
Singularity Cloud Security currently lacks a break-glass account function, which is a critical component for implementing Single Sign-On as it allows for regaining access in emergencies.
For how long have I used the solution?
I have been using Singularity Cloud Security by SentinelOne for one year.
What do I think about the stability of the solution?
I would rate the stability of Singularity Cloud Security six out of ten. There are times when I click on a topic and it freezes.
What do I think about the scalability of the solution?
I would rate the scalability of Singularity Cloud Security seven out of ten.
How are customer service and support?
The response time needs improvement.
How would you rate customer service and support?
Neutral
What other advice do I have?
I would rate Singularity Cloud Security by SentinelOne eight out of ten.
There are ten users in our organization.
No maintenance is required from our end.
I recommend Singularity Cloud Security. After using the solution for a year and a half, our organization has found it valuable in identifying vulnerabilities within our environment.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Evidence-based reporting shows all the findings and severity, helping us to prioritize issues
What is our primary use case?
We have one client, and we need a portal to manage security. We use Singularity to provide security information and identify vulnerabilities or malicious scripts that need to be fixed. It also provides recommendations about each of the vulnerabilities that are helpful.
How has it helped my organization?
We provide cloud services on our site using AWS. Singularity detects flaws that we must close for security reasons. We use Singularity to observe those findings and fix things based on the customer's requirements. Previously, we used to segregate issues and look after them. Singularity helped us secure our infrastructure. We've significantly reduced our potential security breaches to a minimum.
It has improved how we operate on a larger scale. We set up the platform, onboarded the info, and then gradually moved further. Over time, it helped us slowly resolve those issues. We were using the cloud platforms' native security tools, but those were unhelpful. Now, we rely on this more than those services.
Singularity reduced our false positive rate by about 60 percent. We've had even better results in terms of our risk posture. We can rely on this tool to improve our security conditions on a broader scale. If I gave our security posture a percent rating, I would give it 89 percent.
The solution saves time by giving us everything in one place. You don't need to manually check every account. It tells us a lot. Singularity reduces our detection time by about 60 percent.
Singularity has improved collaboration among cloud security, application developers, and AppSec teams. Previously, it would take around a week for engineers to address issues. Now that we use this tool, we resolve issues in one or two days.
What is most valuable?
We're monitoring several cloud accounts with Singularity. It is convenient to identify issues or security failures in any account. It's nice to have all the details we need to solve these issues. Singularity is easy and convenient to use. It is extremely easy for a novice to understand what the dashboard is trying to say and the terminology's meanings.
Evidence-based reporting is excellent for auditing. It shows all the findings and severity: low, high, medium, or critical. We solve the low-level and medium issues. Next, we resolve high-level and critical problems. It's easy to fix the security breaches.
What needs improvement?
We repeatedly get alerts on the tool dashboard that we've already solved on our end, but they still appear. That is somewhat irritating.
For how long have I used the solution?
We have used Singularity Cloud Security for about six months.
What do I think about the stability of the solution?
I rate Singularity nine out of 10 for stability.
What do I think about the scalability of the solution?
I rate Singularity eight out of 10 for scalability.
How are customer service and support?
I rate SentinelOne support nine out of 10.
How would you rate customer service and support?
Positive
How was the initial setup?
Singularity took about a week to deploy. A team of 40 to 50 people was involved.
What other advice do I have?
I rate SentinelOne Singularity Cloud Security nine out of 10. I would recommend the tool to others. It's a convenient and cost-effective tool for identifying security breaches. You get everything in one place, saving you time and costs.
Improves security posture, reduces false positives, and speeds up remediation time
What is our primary use case?
Our infrastructure is on AWS and we integrate SentinelOne Singularity Cloud Security with our enterprise accounts to identify misconfiguration on the Cloud.
How has it helped my organization?
The offensive security engine helps us visualize any potential attacks.
SentinelOne Singularity Cloud Security helps us maintain and improve our security posture.
It has helped reduce the number of false positives.
We have improved our mean time to detection with SentinelOne Singularity Cloud Security.
SentinelOne Singularity Cloud Security has improved our mean time to remediation. The alerts provided included details that help us address the issues quickly.
What is most valuable?
The most valuable aspects of SentinelOne Singularity Cloud Security are its alerting system and the remediation guidance it provides. This combination helps us identify misconfigurations and vulnerabilities in our systems and swiftly address them.
What needs improvement?
In addition to the console alerts, I would like SentinelOne Singularity Cloud Security to also send email notifications.
For how long have I used the solution?
I have been using SentinelOne Singularity Cloud Security for one and a half years.
What do I think about the stability of the solution?
SentinelOne Singularity Cloud Security is stable.
What do I think about the scalability of the solution?
SentinelOne Singularity Cloud Security is scalable.
How are customer service and support?
The technical support is helpful and responds quickly to our requests.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used AWS Security but switched to SentinelOne Singularity Cloud Security because of its wider scanning range and centralized console for maintenance.
How was the initial setup?
The initial deployment was straightforward and took one month to complete.
What about the implementation team?
We completed the implementation in-house with the help of SentinelOne Singularity Cloud Security.
What other advice do I have?
I would rate SentinelOne Singularity Cloud Security eight out of ten.
I recommend SentinelOne Singularity Cloud Security to others.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Helps reduce false positives, improve risk posture, and MTTD
What is our primary use case?
Our cloud security posture is managed with SentinelOne Singularity Cloud Security, a tool that identifies and highlights potential security weaknesses in our systems.
How has it helped my organization?
It is user-friendly.
SentinelOne Singularity Cloud Security helps reduce the number of false positives by 20 percent.
In evidence-based reporting, demonstrating that a vulnerability can be exploited is crucial. This information allows us to directly address the issue through manual remediation.
SentinelOne Singularity Cloud Security has improved our risk posture and has reduced our mean time to detection by 50 percent.
SentinelOne Singularity Cloud Security has reduced our mean time to remediation by 30 percent.
What is most valuable?
The user-friendly dashboard offers both convenience and security by providing quick access to solutions and keeping us informed of potential threats.
What needs improvement?
SentinelOne Singularity Cloud Security filtering has some areas that cause problems, and to achieve single sign-on functionality, a break-glass feature, which is currently unavailable, is necessary.
For how long have I used the solution?
I have been using SentinelOne Singularity Cloud Security for one year.
What do I think about the stability of the solution?
I would rate the stability of SentinelOne Singularity Cloud Security nine out of ten.
What do I think about the scalability of the solution?
SentinelOne Singularity Cloud Security is scalable.
How are customer service and support?
The technical support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Prisma Cloud but when we would request a feature we had to wait until the next release. That is the advantage of SentinelOne Singularity Cloud Security.
How was the initial setup?
The deployment took a few weeks to complete.
What's my experience with pricing, setup cost, and licensing?
SentinelOne Singularity Cloud Security falls somewhere in the middle price range, neither particularly cheap nor expensive.
What other advice do I have?
I would rate SentinelOne Singularity Cloud Security nine out of ten.
We have around five people working with SentinelOne Singularity Cloud Security.
No maintenance is required for SentinelOne Singularity Cloud Security.
Saves us time, generates good reports, and is easy to use
What is our primary use case?
Our cloud security posture management is handled by SentinelOne Singularity Cloud Security.
To prevent cloud misconfigurations and developer code errors, we implemented SentinelOne Singularity Cloud Security as a safeguard.
SentinelOne Singularity Cloud Security is deployed as a SaaS.
How has it helped my organization?
The UI is easy to navigate and user-friendly even for users with limited experience.
SentinelOne Singularity Cloud Security is easy to use.
The evidence-based reporting is good for helping prioritize and solve important cloud security issues.
Agentless vulnerability scanning simplifies vulnerability discovery across our entire cloud infrastructure, even in multi-cloud environments. This means we can see all our scan results in a unified view.
SentinelOne Singularity Cloud Security's proof of exploitability in evidence-based reporting is important because it helps us easily identify issues.
The offensive security engine is handy for verifying actual exploit paths and prioritizing breach potential. We can identify the issues easily and check with the developers to mitigate them.
The IaC scanning helps with identifying preproduction issues in templates and container configuration files.
SentinelOne Singularity Cloud Security has improved our ability to see and understand our cloud environment. By adhering to compliance regulations, we were able to identify areas where we had blind spots.
It has helped reduce the number of false positives by 60 percent. We have a whitelisting option that makes it easy to avoid false positives.
SentinelOne Singularity Cloud Security has strengthened our overall security posture by both enhancing our environment's security and proactively identifying misconfiguration.
SentinelOne Singularity Cloud Security has reduced our mean time to detection by 90 percent.
SentinelOne Singularity Cloud Security has reduced our mean time to remediation by 90 percent.
SentinelOne Singularity Cloud Security has affected the collaboration among our cloud security, application developers, and AppSec teams.
The collaboration has saved engineering 80 percent of their time.
What is most valuable?
The most valuable features of SentinelOne Singularity Cloud Security are cloud misconfiguration, Kubernetes, and IaC scanning.
What needs improvement?
A beneficial improvement for SentinelOne Singularity Cloud Security would be integration with Jira, allowing for a more streamlined ticketing system.
For how long have I used the solution?
I have been using SentinelOne Singularity Cloud Security for two years.
What do I think about the stability of the solution?
I would rate the stability of SentinelOne Singularity Cloud Security nine out of ten.
What do I think about the scalability of the solution?
I would rate the scalability of SentinelOne Singularity Cloud Security ten out of ten.
How are customer service and support?
SentinelOne Singularity Cloud Security's support is my favorite. They are easy to contact.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
In the past, we relied on an open-source CSPM tool, but it lacked functionality beyond basic cloud misconfiguration detection. This necessitated using additional tools to address our broader security needs.
How was the initial setup?
The deployment took two months and involved four people.
What was our ROI?
We have saved a lot of time and resources using SentinelOne Singularity Cloud Security.
What's my experience with pricing, setup cost, and licensing?
The cost for SentinelOne Singularity Cloud Security is average when compared to other CSPM tools.
Which other solutions did I evaluate?
Having experience with both Prisma Cloud and SentinelOne Singularity Cloud Security, I found SentinelOne Singularity Cloud Security to be the superior solution.
What other advice do I have?
I would rate SentinelOne Singularity Cloud Security nine out of ten.
We have under 50 SentinelOne Singularity Cloud Security users within our organization and it is deployed in one location.
No maintenance is required on our end.
I recommend SentinelOne Singularity Cloud Security to others.
Good interface, helpful alerts, and timely support
What is our primary use case?
We have multiple applications in our AWS cloud environment. We have a private environment, and we do not disclose it to the Internet. We have configured multiple security alerts, such as for any incoming traffic from a public IP address.
We have also set up SentinelOne Singularity Cloud Security alerts for key rotation of security credentials for the accounts.
How has it helped my organization?
SentinelOne Singularity Cloud Security helps us to reduce the security overhead. We do not have to manage every small thing manually. They are taken care of by SentinelOne Singularity Cloud Security.
We use vulnerability scanners for our AWS servers. If there is any vulnerability, we get a report on that. We close those open security points. I do not know the exact name of the scanners, but they work great.
We rarely get false positives. We usually get real-time, accurate data. Sometimes there is a mismatch between the actual data and the data we get from SentinelOne Singularity Cloud Security, but that is negligible. It happens once in a thousand times.
SentinelOne Singularity Cloud Security has reduced our mean time to remediate. It has saved about 60% of our time. It has helped us with that.
It has also reduced our mean time to detect. The time savings depend on the use case. On average, it saves ten to fifteen minutes per use case.
We do not use it at a large level for Infrastructure as Code scanning, but it saves us time. We do not have to click on the features in the GUI. We have set up some scripts with the Infrastructure as Code feature. We run them to generate reports and get the required output.
The Infrastructure as Code feature has helped us. We can integrate SentinelOne Singularity Cloud Security with our cloud tools. It helps with the development part. For example, Lambda is an AWS feature. It is a code environment. We can directly connect these two. It helps with the run time of the processes.
What is most valuable?
We mostly use alerts. That has been pretty good. If we use the alert system from Amazon, it is much costlier to us, so we use SentinelOne Singularity Cloud Security.
SentinelOne Singularity Cloud Security's interface is quite good. It is beginner-friendly. If someone has even a little bit of idea about cloud security, they can learn it very easily.
What needs improvement?
I do not know if it is possible, but in AWS Cloud, there are multiple features or services, and if they can collaborate with them, it would be helpful. The Infrastructure as Code service available in SentinelOne Singularity Cloud Security and the services available in AWS cloud security can be merged so that we can get the security data directly from AWS cloud in SentinelOne Singularity Cloud Security. This way, all the data related to security will be in one single place. Currently, we have to check a couple of things on SentinelOne Singularity Cloud Security, and we have to validate that same data on the AWS Cloud to be sure. If they can collaborate like that, it will be great. It will be an amazing tool.
For how long have I used the solution?
My organization has been using SentinelOne Singularity Cloud Security for one and a half years, but I have been using it for the past three to four months for cloud security.
What do I think about the stability of the solution?
I have not faced any downtime. If they have any kind of maintenance, they let us know via email a week or two before. The maintenance is usually done once a quarter, and it is done out of business hours, so we do not have any concerns about that.
What do I think about the scalability of the solution?
I would rate it a seven out of ten for scalability. If they can collaborate with AWS services as well, it can be a 10 out of 10.
How are customer service and support?
I have contacted them quite a few times. They are pretty good. They are within their SLAs. I have never raised a support case with a very high severity. For the cases I raised, they have an SLA of about 24 hours, and they always meet that SLA.
I always get a perfect answer in the reply. If I have some major issue and I am unable to understand that via email, they also come on a Teams or Webex call. They provide a good service. I would rate them a nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
It is a cloud deployment. I believe they have an on-premise option as well, but we are not using that. We are completely on the cloud.
I was not involved in its deployment. Its deployment was done by the organization about a year and a half ago. I only manage operations, and I have been here only for about three months.
It does not require any maintenance as such. In the infrastructure code part, we update the code, but I am not sure if that comes under maintenance.
What other advice do I have?
You should be a little familiar with cloud security. Otherwise, you might face a few difficulties in accessing the SentinelOne Singularity Cloud Security console. If you are a little familiar, it will be very easy for you. A completely new user without a technical background can get a bit confused by the naming conventions in the GUI.
I would recommend SentinelOne Singularity Cloud Security to others. Overall, I would rate SentinelOne Singularity Cloud Security an eight out of ten.
Helps improve our cloud security posture, provides great reports, and is user-friendly
What is our primary use case?
We use SentinelOne Singularity Cloud Security to improve our security posture through evidence-based alerts by detecting and mitigating vulnerabilities.
We sought a CSPM solution that could be configured to adhere to the security policies of our required integrations. SentinelOne Singularity Cloud Security stood out as a strong candidate due to its compliance with industry standards like ISO and its ability to provide valuable security insights.
SentinelOne Singularity Cloud Security is a SaaS solution.
How has it helped my organization?
SentinelOne Singularity Cloud Security boasts a user-friendly interface that avoids information overload. The clean layout allows for easy navigation, even for new users, while still offering the ability to delve deeper into the data for a more granular view.
I would rate the evidence-based reporting of SentinelOne Singularity Cloud Security an eight out of ten.
SentinelOne Singularity Cloud Security's proof of exploitability is invaluable because it allows us to demonstrate the root cause of security issues to stakeholders clearly and concisely, streamlining the remediation process.
I would rate the offensive security engine's ability to assess and verify exploit paths and prioritize breach potential a nine out of ten.
The easy-to-use UI helps our security team review evidence from a single dashboard.
SentinelOne Singularity Cloud Security has broadened our viewpoint within our environment, allowing us to see things from multiple angles. This wider perspective provides greater assurance to our team and the entire enterprise.
It has helped reduce around ten percent of the false positives.
Thanks to SentinelOne Singularity Cloud Security, our cloud security posture has significantly improved. We've effectively mitigated critical and high vulnerabilities, achieving a strong security position from a CSPM perspective.
SentinelOne Singularity Cloud Security has impacted collaboration between our cloud security application developers and AppSec teams. To address this, we've granted controlled access to SentinelOne Singularity Cloud Security for all relevant teams. We've also encouraged its use by providing training on the tool itself.
What is most valuable?
SentinelOne Singularity Cloud Security stands out for its user-friendly interface and intuitive software, making it easy to navigate and use. It excels at presenting remediation steps in a clear and actionable way. Additionally, the reporting capabilities ensure we maintain compliance. However, the most valuable feature for us is the ability to conduct authentic security testing, providing real-world insights into our vulnerabilities.
What needs improvement?
The vulnerability scanner generates a high number of false positives that it flags as alerts, even though they're not actual threats. This suggests a configuration issue. We need to address this, especially since some of these flagged vulnerabilities have already been mitigated by other means.
The compliance monitoring dashboard, while helpful, doesn't integrate seamlessly with our entire system. This creates a disconnect: a high volume of alerts doesn't necessarily reflect a decline in compliance. For instance, I might have a thousand alerts on my ISO-related compliance dashboard, yet the compliance itself remains at 99.99 percent. This inconsistency makes it difficult to justify remediating every alert. In other words, I might give a clean bill of health from a compliance standpoint, yet still expect them to resolve the alert, which can be confusing. Therefore, we need to address either the way the dashboard generates alerts or the way we create them. Ideally, alerts should be directly tied to compliance standards and have a clear role in the overall compliance process. If they don't meet these criteria, perhaps they shouldn't be flagged as high or critical in severity.
Crafting customized policies can be tricky. Take creating our own, for instance. It requires a deep dive into the customization options, as the language used can be complex and demands a certain level of skill.
Since Sentinel's acquisition of SentinelOne Singularity Cloud Security, there has been a decline in both the frequency of new releases and the quality of support. Previously, SentinelOne Singularity Cloud Security was known for its proactive approach.
SentinelOne Singularity Cloud Security utilizes additional modules besides CSPN. Ideally, there should be a correlation between these systems. This would ensure that the assets we review for vulnerabilities within SentinelOne Singularity Cloud Security are consistent with those reviewed in CSPN. This consistency would simplify the process, allowing us to focus on a single review level. This level could be defined from a configuration perspective or by a compliance standard, such as the web application itself. If SentinelOne Singularity Cloud Security migrates data, this correlation between systems would be especially beneficial to ensure continued integration with all modules.
For how long have I used the solution?
I have been using SentinelOne Singularity Cloud Security for six months.
What do I think about the stability of the solution?
The core modules of SentinelOne Singularity Cloud Security are stable but some of their new features had bugs in them.
I would rate the stability of SentinelOne Singularity Cloud Security seven out of ten.
What do I think about the scalability of the solution?
I would rate the scalability of SentinelOne Singularity Cloud Security ten out of ten.
How are customer service and support?
The technical support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We've added SentinelOne Singularity Cloud Security to our existing Palo Alto Prisma Cloud environment. This will allow us to directly compare the results of the two tools.
How was the initial setup?
The implementation is straightforward and takes a couple of days to complete.
We had five to ten people involved, excluding the SentinelOne Singularity Cloud Security developers.
What other advice do I have?
I would rate SentinelOne Singularity Cloud Security eight out of ten.
We have SentinelOne Singularity Cloud Security accessible in multiple departments with a total of 20 users.
There is no maintenance required from our end.
While SentinelOne Singularity Cloud Security advertises itself as a Cloud-Native Application Protection Platform solution, it offers some CNAPP functionalities but doesn't provide a fully comprehensive picture of your cloud security posture. In essence, it has some CNAPP capabilities, but it's not a complete CNAPP solution yet.
Offers a great dashboard and good UI
What is our primary use case?
My company is trying to get an ISO certification by the second quarter of 2024, so we have been resolving certain security issues for the past year.
I use the solution in my company, where we have alerts coming from SentinelOne Singularity Cloud Security, especially if any security threats are there. Our company's primary concern in using the tool is to get the ISO certification. My company wants to get our infrastructure to meet ISO standards so that there won't be any issues while getting ISO certification.
How has it helped my organization?
With the product in my organization, I feel that we are more secure now, and our services have become better. My company gets to know if we are doing something right or wrong based on the scans that SentinelOne Singularity Cloud Security deploys. My company doesn't have to care much about security because SentinelOne Singularity Cloud Security takes care of it for us. My company also knows what all the best practices are there for each resource, which gives us a boundary of what we can do.
What is most valuable?
Most of the time, I have looked at the tool's dashboard to keep an eye on how much of my company is compliant regarding certain areas since we are eyeing ISO 22000 and ISO 22001. I just love the tool's dashboard, though I have not used it in depth. I like the dashboard mainly, and I know that all sections of ISO certification have been completed. I have not used the tool that much, but under that dashboard itself if I just click on the certification part, which states that 93 percent has been completed, it will show me the subcategories of what all things are still pending or how much percentage of it is still pending, and how many areas are yet to be resolved in relation to some of the resources. The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features.
What needs improvement?
When I joined my organization, I saw that SentinelOne Singularity Cloud Security was already implemented. I started to use the tool's alerting features and dashboard functionalities. Considering how much I used the product, I don't see any areas in it where improvements are required since everything seems fine.
Sometimes, there are alerts that don't have proper messaging attached. The tool can improve the alerting notifications. In SentinelOne Singularity Cloud Security, the alerts also show the affected resource that has a particular issue, but sometimes, the account shows as not applicable, and it isn't very helpful since you need to know the account the tool aims to point out.
The alerting system of the product is an area that I look at and sometimes get confused about. I feel the alerting feature needs improvement.
For how long have I used the solution?
I have been using SentinelOne Singularity Cloud Security for more than a year. My company is a customer of the solution.
What do I think about the stability of the solution?
My company has not experienced bugs, downtime, or any other issues in the product.
Stability-wise, I rate the solution an 8 out of 10.
What do I think about the scalability of the solution?
It is a scalable solution. Scalability-wise, I rate the solution a 7 out of 10.
My company's tech team consists of twelve people and around ten to twelve people use the product.
How are customer service and support?
I rate the technical support an 8-9 out of 10.
How would you rate customer service and support?
Positive
How was the initial setup?
The solution is deployed using the cloud services offered by AWS.
What other advice do I have?
SentinelOne Singularity Cloud Security regularly sends us messages on Slack for cloud security monitoring if it finds a certain security threat. If the area revolving around the security threat is something my company wants to look into, we just quickly check the product to see if there is a quick fix, and if there are no solutions, then we find a way to deal with it. A person from our company's team regularly tries to fix all the issues raised by SentinelOne Singularity Cloud Security so that it is ISO compatible, and right now, my company is close to achieving it.
Speaking about the issues my company was trying to resolve by implementing SentinelOne Singularity Cloud Security in our environment, I would say that whatever issues the tool has raised till now are related to certain policies that we might not have implemented in our IAM. There should only be certain roles that can access certain resources. The aforementioned area consists of the types of issues my company is currently trying to resolve so that we stay up to the mark. In my company, we don't have any regular threats that come up, but they are mainly used in regard to policies.
Considering how much I have used it to date, I can say that it is an easy-to-use product. However, I have not used the product in-depth, so I can't comment much about it.
If I assess the evidence-based reporting for helping prioritize and solve important cloud security issues, I would say that the concerns raised by the product are valid ones, and it is important to deal with them. Though I am not sure what the question entails, I feel that the issues raised by the product are proper, and they should be resolved before actually implementing its features.
I think it is very important for the solution to include proof of exploitability in evidence-based reporting. You have to know what things might go wrong if an issue is not resolved, and it makes it easier for us to assess key issues and to decide which areas should be taken into priority, considering what potential issues might crop up in the long run or short term. In general, SentinelOne Singularity Cloud Security is a quite helpful tool.
The most valuable feature of the tool in terms of real-time threat detection stems from the alerts my company receives via Slack. I think the alert feature is something I have majorly looked into, but I haven't explored many of SentinelOne Singularity Cloud Security'd features.
Whether the compliance monitoring capabilities of the tool have benefited our organization or not is something that we will get to know soon via its results in the next two or three months. My company is very close to getting ISO certification with SentinelOne Singularity Cloud Security's help. I think if it gave our company a demo compliance feature, it could be helpful.
The product's UI is good if I speak about the impact of its ease of use on security operations. The UI is very easy to navigate. Basically, I was able to navigate through the tool's dashboard. Overall, the tool's UI structure looks good.
My company has rarely had to deal with an incident involving a false positive with SentinelOne Singularity Cloud Security in place, and I believe that it happened at the end of the previous year. After that, my company didn't need to deal with any false positives. With SentinelOne Singularity Cloud Security, the chances of seeing a false positive are rare.
In terms of risk posture, after going through the recommendations provided by SentinelOne Singularity Cloud Security during the implementation phase, I feel that my solution has helped my company get better and more secure because now we are less vulnerable to attacks. Overall, I think that the product is good for improving an organization's risk posture. In my company, we don't have any doubts about using the product since everything feels right with it.
The tool has reduced the mean time to detect risks since, with the use of the tool, it has become faster as it is now done automatically. In my company, I operate in a very small team where we don't have a specific person or department giving us insights about a particular tool. The tool has reduced the mean time to detect risks by more than 50 percent. My company never scanned our own infrastructure until SentinelOne Singularity Cloud Security did. Until my company had it in mind that we wanted to get an ISO certification, we never scanned our infrastructure.
The mean time required to remediate is an area that has improved a lot. My company has never tried to resolve any issues since we have never detected any problems. The mean time to remediate has improved by more than 50 percent.
The product can make the collaboration between cloud security application developers and AppSec teams better. In my company, we only have one team, and we don't have a few departments.
The product has helped my company save a lot of engineering time because we don't have to put up physical resources to do many things, as they are managed automatically. In my company, we just have to employ one engineer to resolve everything. My company doesn't actually have to spend time detecting issues and then solving them as the tool solves them for us.
I have not integrated the tool with the existing solutions in my company's infrastructure or workflows. I use it as a standalone product in my company.
The product is used in just one location.
I don't think that the product requires any maintenance. I don't think that my company does any maintenance for SentinelOne Singularity Cloud Security.
I recommend the product to those who plan to use it. I think the tool has a very good alerting system. The tool also gives a proper description of resources and alerts. I think that the tool is very good for meeting the certification compliance requirements.
I rate the overall tool a 9 out of 10.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Has good ability to detect vulnerabilities and do a rescan after a specific time duration
What is our primary use case?
My company has around ten AWS accounts, and we use SentinelOne to monitor and see if any risks are there or not in any security groups for VPC endpoints or any other resources that come under severe risk or medium risk, so my company uses the product for calculations concerning the aforementioned area. The tool also creates tickets for our company, which helps us monitor the resources and change them according to the standards applicable to the organization.
What is most valuable?
The solution's most valuable features are its ability to detect vulnerabilities inside AWS resources and its ability to rescan after a specific duration set by the administrator. It creates a ticket automatically, so you get to know the things in the tool that you need to attend to immediately, making it a core feature of the solution.
What needs improvement?
I am unsure as to what kind of subscriptions my company has taken from PingSafe. I am not sure about what other things are there in the product that can help our company. Based on whatever subscriptions related to the product my company has taken, I can say that though one of the security groups is open to my company's premises, it still stays that it is open, which, for my company, makes it secure, but for PingSafe, it is not secure, so I am not pretty sure about how it can check and update it. I am not sure if a feature to deal with the aforementioned area already exists in the solution and if my company has not taken a subscription to use it.
Let us assume that there is a ticket that states that one port is vulnerable in the security groups from AWS since it is exposed to the public. When the tool states that it is exposed to the public, it means that it is exposed to the IPs in the company premises and not the public.
Let us assume that there is a database that is exposed to all the IPs in an office. If I have 10 to 12 sets of IPs, I can use them for 10 to 12 Wi-Fi or VPN connections, and it is exposed on the company premises, but the tool states that it is exposed to the public and that the company needs to shut it down. My organization needs to expose the database so that our development team can access it over our office IPs. If you do not expose the database to office IPs, the development team cannot access DBs to manipulate or check data. In general, the database is exposed to the office IPs, not to the public, but the tool states that it is exposed to the public since it cannot identify whether the IP is a public IP or office IP. I am not very sure if there is a setting in the product that allows the office to give its set of IPs to the tool, and scanning can be done through them so that the tool can identify if the resources are inside or outside of the IP range, according to which can state whether it is safe or not. In general, the tool should offer users the ability to mark IPs as public and private ones so that the product can identify them. It would be good if a customer could provide the tool with a set of ten IPs and state that it will be okay and secure if any of the resources are exposed to them since they are inside the office premises.
One of the issues with the product stems from the fact that it clubs different resources under one ticket. If I have 10 resources in 10 accounts, there might be a problem if, from those 10 accounts, 5 resources have the same issues and they get clubbed together under a single ticket, which makes it somehow a difficult process since I have to get inside the ticket to get the resources and the account details.
For how long have I used the solution?
I have been using PingSafe for 6 months. My company is a customer of the solution.
What do I think about the stability of the solution?
I never found any stability issues in PingSafe.
What do I think about the scalability of the solution?
In terms of scalability, I have not used the application to its full extent. Right now, I cannot comment on the scalability part of the product.
How was the initial setup?
PingSafe helps identify the resources that are vulnerable to attacks, and if I can fix them up, then my application will be safe at that particular point in time. The tool's aforementioned area has no relation to the product's deployment since it is used to secure my company's resources, applications, and infrastructure.
Though the solution can be deployed with the help of my team, consisting of three people, I can handle it by myself. With PingSafe, the reports come to me, after which I can give or segregate them for different applications while having two different individuals working under me.
What about the implementation team?
I take care of the installation part of the product by myself.
What other advice do I have?
The solution is very user-friendly in terms of ease of use.
I do not use the product's reporting feature because another team in my company handles it. I know that my company uses the product's reporting feature to extract reports on a weekly, bi-weekly, and monthly basis, but I don't deal with it.
I don't use the product's agentless vulnerability scanning. I check the reports that come to me, as I need to further check the resource tests attached to them, especially whatever resources are affected as per the reports. In general, I just go with the report and complete the task.
I have not used Pingsafe's Offensive Security Engine.
Pingsafe's IaC Scanning is a great functionality that is built into the product. It is one of the major functionalities that my company's team uses. With Pingsafe's IaC Scanning, it is easy to monitor and observe areas in a good way.
Pingsafe's IaC Scanning role in identifying pre-production issues in IaC templates or container configuration files is helpful because when in my company, we configure IaC Scanning in our production environment, it gives a brief detail about what the resources and security groups or whatever resources are the most vulnerable, after which they get sorted into four categories, namely, low, medium, high and severe. The tool sorts out the resources into four categories before you go to the production phase, ensuring that they are good and secure.
The main benefit of the use of the product in our company stems from the fact that it provides a vulnerability scanning report, which helps us to maintain the resources mainly, an area for which my team and organization use it.
I experienced the benefits attached to the solution from the first day of using it, and before its use, I was not able to identify the issues in the resources. PingSafe gave me the value and the reports that helped me to identify the issues in resources.
PingSafe's use has helped reduce the false positive rate. In the initial stages, my company had more than 100 severe cases, but within a month, we were able to reduce that to below 10 percent.
With PingSafe, the mean time to detect has reduced because initially, for detection, I had to observe resources end to end. Now, the tool provides me with a regular report because of which I don't need to observe everything inside the resources. I just need to go to a particular resource and check what is stated in the ticket to see which ports are vulnerable, after which it can be changed, so I can directly go and check it, owing to which the tool definitely reduces the mean time to detect vulnerabilities.
With PingSafe, the mean time to remediate is a maximum of twenty-four hours. Initially, in my company, we had to identify the problem and then proceed with remediation, but now we can do it directly since the report is already available.
PingSafe has affected and helped me a bit to deal with the collaboration between cloud security application developers and AppSec teams because it helps me to keep my resources and tell the developers that we cannot expose them to the extent where the application will become vulnerable to attacks. In general, the tool is helpful since it reduces the time needed to connect DevOps and developers.
I found the product to be pretty useful. I directly onboarded the product and started to use it. I did not find any difficulties with the tool.
I rate the tool an 8 out of 10.