Amazon EKS vs SentinelOne Singularity Cloud Security comparison

Cancel
You must select at least 2 products to compare!
Amazon Web Services (AWS) Logo
0 views|16 comparisons
97% willing to recommend
SentinelOne Logo
1,647 views|542 comparisons
98% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Amazon EKS and SentinelOne Singularity Cloud Security based on real PeerSpot user reviews.

Find out in this report how the two Container Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Amazon EKS vs. SentinelOne Singularity Cloud Security Report (Updated: May 2024).
772,679 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The stability is excellent.""EKS has security features that you can't find in competing solutions.""It has valuable monitoring and insights features.""I can use the autoscaling feature to manage and scale up infrastructure.""It is the best service because it has proper security packages.""It is a scalable solution.""The tool works well with the nodes in AWS. It's scalability is also good in terms of architecture.""Break down your application into small modules to improve resiliency"

More Amazon EKS Pros →

"It saves time, makes your environment more secure, and improves compliance. PingSafe helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security.""PingSafe released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. PingSafe's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue.""Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful.""The mean time to detect has been reduced.""The management console is the most valuable feature.""Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.""PingSafe's most valuable feature is its unified console.""The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."

More SentinelOne Singularity Cloud Security Pros →

Cons
"The product’s pricing needs improvement.""I would like Amazon EKS to be easier to configure on various environments like Windows or Linux installations""The goal and idea behind microservices are to always be available and capable of handling any load, no matter how many requests come through...All of these services are great, but I also think it would be useful to have the same technology available in a miniature resource size, enabling the same applications and services to run on a small machine.""The solution should include a popup for clusters so that all relevant information is visible at the bottom of a page.""An area for improvement in Amazon EKS is the user experience. The platform could be more user-friendly. Only an expert can manage and use it.""Amazon EKS is not a solution that can be fully managed through automation, making it an area of concern where improvement is required.""The overall stability of the product should be improved to prevent any loss of data.""Amazon EKS should improve its integration."

More Amazon EKS Cons →

"We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization.""There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security.""While it is good, I think the solution's console could be improved.""Scanning capabilities should be added for the dark web.""We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks.""The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects.""We've found a lot of false positives.""It does not bring much threat intel from the outside world. All it does is scan. If it can also correlate things, it will be better."

More SentinelOne Singularity Cloud Security Cons →

Pricing and Cost Advice
  • "The solution is more expensive than other competitors and does not require a license."
  • "Cloud based pay-as-you-go pricing"
  • "My company paid for the license."
  • "Pricing is dependent upon instance type."
  • "The solution is quite costly and developers will start exploring other solutions or moving their workloads to other clouds if costs aren't reduced."
  • "The price could be cheaper. I would rate it as seven out of ten."
  • "Amazon EKS has fair pricing. It's better in terms of pricing than other platforms."
  • "I would like a cheaper version of it."
  • More Amazon EKS Pricing and Cost Advice →

  • "As a partner, we receive a discount on the licenses."
  • "It's a fair price for what you get. We are happy with the price as it stands."
  • "I wasn't sure what to expect from the pricing, but I was pleasantly surprised to find that it was a little less than I thought."
  • "Singularity Cloud Workload Security's pricing is good."
  • "Singularity Cloud Workload Security's licensing and price were cheaper than the other solutions we looked at."
  • "I understand that SentinelOne is a market leader, but the bill we received was astronomical."
  • "It's not expensive. The product is in its initial growth stages and appears more competitive compared to others. It comes in different variants, and I believe the enterprise version costs around $55 per user per year. I would rate it a five, somewhere fairly moderate."
  • "The pricing is fair. It is not inexpensive, and it is also not expensive. When managing a large organization, it is going to be costly, but it meets the business needs. In terms of what is out there on the market, it is fair and comparable to what I have seen, so I do not have any complaints about the cost"
  • More SentinelOne Singularity Cloud Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Container Security solutions are best for your needs.
    772,679 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The product's most valuable features are scalability, observability, and performance.
    Top Answer:The product pricing depends on the specific requirements. For instance, clients between $3000-$4000 per month might find the pricing reasonable, with clusters priced around $70 to $80 plus additional… more »
    Top Answer:The main thing to improve with Amazon EKS is the price. However, these services can be very expensive. For example, in countries like Turkey, the cost is too high. That's why we offer our cloud… more »
    Top Answer:The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features.
    Top Answer:When I joined my organization, I saw that PingSafe was already implemented. I started to use the tool's alerting features and dashboard functionalities. Considering how much I used the product, I… more »
    Ranking
    15th
    out of 59 in Container Security
    Views
    0
    Comparisons
    16
    Reviews
    30
    Average Words per Review
    365
    Rating
    8.5
    6th
    out of 59 in Container Security
    Views
    1,647
    Comparisons
    542
    Reviews
    65
    Average Words per Review
    1,010
    Rating
    8.6
    Comparisons
    Also Known As
    Amazon Elastic Kubernetes Service
    PingSafe
    Learn More
    Overview

    Amazon Elastic Kubernetes Service (Amazon EKS) is a fully managed Kubernetes service. Customers such as Intel, Snap, Intuit, GoDaddy, and Autodesk trust EKS to run their most sensitive and mission critical applications because of its security, reliability, and scalability.

    EKS is the best place to run Kubernetes for several reasons. First, you can choose to run your EKS clusters using AWS Fargate, which is serverless compute for containers. Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design. Second, EKS is deeply integrated with services such as Amazon CloudWatch, Auto Scaling Groups, AWS Identity and Access Management (IAM), and Amazon Virtual Private Cloud (VPC), providing you a seamless experience to monitor, scale, and load-balance your applications. Third, EKS integrates with AWS App Mesh and provides a Kubernetes native experience to consume service mesh features and bring rich observability, traffic controls and security features to applications. Additionally, EKS provides a scalable and highly-available control plane that runs across multiple availability zones to eliminate a single point of failure.
    EKS runs upstream Kubernetes and is certified Kubernetes conformant so you can leverage all benefits of open source tooling from the community. You can also easily migrate any standard Kubernetes application to EKS without needing to refactor your code.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure and protect your multi-cloud infrastructure, services, and containers from build time to runtime. SentinelOne’s CNAPP applies an attacker’s mindset to help security practitioners better prioritize their  remediation tasks with evidence-backed Verified Exploit Paths™. The efficient and scalable runtime protection, proven over 5 years and trusted by many of the world’s leading cloud enterprises, harnesses local, autonomous AI engines to detect and thwart runtime threats in real-time. CNAPP data and workload telemetry is recorded to SentinelOne’s unified security lake, for easy access and investigation.

    Singularity Cloud Security includes both agentless and AI-powered cloud security controls, which represent two halves of our strategy to keep public cloud and container environments safe. Radically reduce your cloud attack surface with Singularity Cloud Native Security, formerly PingSafe, with agentless insights and evidence-based prioritization; protect runtime compute and container with Singularity Cloud Workload Security, SentinelOne’s real-time CWPP, with AI-powered machine-speed blocking of threats.

    Sample Customers
    GoDaddy, Pearson, FICO, Intuit, Verizon, Honeywell, Logicworks, RetailMeNot, LogMeIn, Conde Nast, mercari, Trainline, Axway
    Information Not Available
    Top Industries
    REVIEWERS
    Computer Software Company32%
    Financial Services Firm21%
    Comms Service Provider21%
    Manufacturing Company11%
    VISITORS READING REVIEWS
    Financial Services Firm20%
    Computer Software Company15%
    Manufacturing Company8%
    Insurance Company7%
    REVIEWERS
    Computer Software Company27%
    Construction Company13%
    Financial Services Firm10%
    Insurance Company8%
    VISITORS READING REVIEWS
    Computer Software Company21%
    Financial Services Firm15%
    Manufacturing Company10%
    Insurance Company4%
    Company Size
    REVIEWERS
    Small Business38%
    Midsize Enterprise20%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business16%
    Midsize Enterprise11%
    Large Enterprise73%
    REVIEWERS
    Small Business39%
    Midsize Enterprise20%
    Large Enterprise41%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise13%
    Large Enterprise61%
    Buyer's Guide
    Amazon EKS vs. SentinelOne Singularity Cloud Security
    May 2024
    Find out what your peers are saying about Amazon EKS vs. SentinelOne Singularity Cloud Security and other solutions. Updated: May 2024.
    772,679 professionals have used our research since 2012.

    Amazon EKS is ranked 15th in Container Security with 39 reviews while SentinelOne Singularity Cloud Security is ranked 6th in Container Security with 77 reviews. Amazon EKS is rated 8.6, while SentinelOne Singularity Cloud Security is rated 8.6. The top reviewer of Amazon EKS writes "Supports multiple tools and has a straightforward setup process ". On the other hand, the top reviewer of SentinelOne Singularity Cloud Security writes "Provides excellent workload telemetry, hunting capabilities, and deep visibility ". Amazon EKS is most compared with Red Hat OpenShift Container Platform, VMware Tanzu Mission Control, Kubernetes, Linode and Rancher Labs, whereas SentinelOne Singularity Cloud Security is most compared with Prisma Cloud by Palo Alto Networks, Wiz, Orca Security, AWS GuardDuty and Sysdig Secure. See our Amazon EKS vs. SentinelOne Singularity Cloud Security report.

    See our list of best Container Security vendors.

    We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.