Try our new research platform with insights from 80,000+ expert users

Amazon EKS vs SentinelOne Singularity Cloud Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
3.3
Amazon EKS provides cost-effective cloud solutions with substantial savings, efficient scaling, and dynamic workload management, despite some EC2 cost concerns.
Sentiment score
8.0
SentinelOne Singularity Cloud Security boosts efficiency by improving visibility, reducing costs, and decreasing time for threat detection and resolution.
Initially, not having them resulted in an unoptimized solution. However, with these tools in place, we witnessed a reduction of costs by approximately a third—if it was $100 beforehand, we brought costs down to $25.
We have cost explorer available, and a bill forecast based on usage allows us to determine whether resources are underutilized or overutilized.
It's a fast deployment, with very good documentation, and it's really helpful.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Cloud Native Security does offer ROI.
 

Customer Service

Sentiment score
6.0
Amazon EKS support is responsive and helpful, especially for paid plans, but non-paying users may experience slower response times.
Sentiment score
7.8
SentinelOne Singularity Cloud Security's customer support is highly rated for responsiveness and effective issue resolution, ensuring smooth collaboration.
We didn't need to manage etcd and those control management tools; it's totally handled from the AWS side, making it very beneficial.
I believe there should be a recovery solution available for at least a few hours so that we might bring it back.
They will set up a call, guide us, or provide solutions regarding integration with AWS or Amazon EKS.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
 

Scalability Issues

Sentiment score
5.4
Amazon EKS is praised for its scalability, cost efficiency, flexibility, and effective multi-region and resource management capabilities.
Sentiment score
8.2
SentinelOne Singularity Cloud Security excels in scalability, smoothly integrating accounts and auto-scaling, despite separate account management challenges.
The ability to scale based on requirements by deploying additional containers is a strong point for Kubernetes.
This allows us to scale our applications or APIs as needed, offering reliability through the automation of scaling processes.
If any node is not ready, the cluster autoscaler ensures that it is removed from the AWS auto-scaling group and replaces it with a new node in the cluster.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
I would rate the scalability of PingSafe 10 out of 10.
 

Stability Issues

Sentiment score
6.4
Amazon EKS is praised for stability, reliability, and effective AWS support despite minor connectivity challenges, rating 8-10 by users.
Sentiment score
8.2
SentinelOne Singularity Cloud Security is highly stable but experiences minor UI glitches and occasional agent-related issues.
There are multiple availability zones in the regions, meaning no single point of failure.
The control plane is quite stable in Amazon EKS, and I find it to be 100% available.
We haven't faced any challenges, and it consistently delivers on its committed SLA.
It's a reliable solution that the organization is increasingly adopting for its robust features and security.
We contacted Cloud Native Security, and they addressed it in a day.
The only downtime we had was when switching from V1 to V2 but it was smooth.
 

Room For Improvement

Amazon EKS needs improvements in setup, support, integration, security, and automation to enhance functionality and user experience.
SentinelOne Singularity Cloud needs enhanced features, stability, better reporting, integration, and support for improved user experience and efficiency.
Simplifying these will enable more people, not just those with strong foundational knowledge, to work effectively with these services.
Amazon EKS can be improved by having the maintenance of Kubernetes versions managed better, as everything is handled by the Kubernetes team and possibly a separate team at AWS.
Adding logging would be a valuable improvement.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
I would also like to see Cloud Native Security offer APIs that allow us to directly build dashboards within the platform.
 

Setup Cost

Amazon EKS offers a scalable, pay-as-you-go model, appealing to enterprises but potentially expensive for startups.
SentinelOne Singularity Cloud offers competitive pricing and value, with flexibility and discounts available, though costly for large deployments.
The EKS service itself is free, but you will incur costs for the VMs used as nodes in that cluster.
If you want to monitor costs effectively, applying separate tools and acting accordingly in advance is essential.
The pricing structure is beneficial for large companies who pay for what they use, but it is not affordable for startups.
I believe the enterprise version costs around $55 per user per year.
There are some tools that are double the cost of Cloud Native Security.
I recall Cloud Native Security charging a slightly higher premium previously.
 

Valuable Features

Amazon EKS offers scalable, cost-effective Kubernetes management with security, ideal for cloud-native applications through easy integrations and auto-scaling.
SentinelOne Singularity Cloud's ease, AI detection, and seamless integration enhance IT efficiency, risk management, and forensic visibility.
The most beneficial aspect of Amazon EKS is that it helps manage the Kubernetes master node, so I don't need to maintain the master node, including tasks like upgrading.
The main benefits that I received from using Amazon EKS are that it is a managed cluster and offers simplicity.
By default, if you just install Amazon EKS, you can deploy your application, but to have it enterprise-ready, you have to configure a number of other things that will boost productivity.
This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.
The infrastructure-as-code feature is helpful for discovering open ports in some of the modules.
This tool has been helpful for us. It allows us to search for vulnerabilities and provides evidence directly on the screen.
 

Categories and Ranking

Amazon EKS
Ranking in Container Security
12th
Average Rating
8.4
Reviews Sentiment
6.1
Number of Reviews
90
Ranking in other categories
Container Management (2nd)
SentinelOne Singularity Clo...
Ranking in Container Security
3rd
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
115
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (2nd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd)
 

Mindshare comparison

As of October 2025, in the Container Security category, the mindshare of Amazon EKS is 0.2%, up from 0.1% compared to the previous year. The mindshare of SentinelOne Singularity Cloud Security is 3.1%, up from 1.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security Market Share Distribution
ProductMarket Share (%)
SentinelOne Singularity Cloud Security3.1%
Amazon EKS0.2%
Other96.7%
Container Security
 

Featured Reviews

Mahesh Dash - PeerSpot reviewer
Has enabled seamless infrastructure configuration while improving identity integration and monitoring capabilities
It has been since 2019 that I started using Amazon EKS. At that time, it was completely new, and many people were not using it just yet; it started from version 1.21, and right now we are on 1.33. Recently, 1.34 has been launched, but it's not yet available in the service catalog; we can see only 1.33. A lot of improvements have been made. We had numerous add-ons to install manually because Kubernetes is a completely different service than AWS cloud provider, and everyone has opted to use it. After opting, there is an identity that you have to maintain—one at Kubernetes level and one at the AWS provider level. You have to maintain one identity at IAM level and one within the cluster, Amazon EKS. A few things do not make sense within the add-ons, many of the secret providers that read the secret from Secrets Manager and then mount it as a volume. We use a service called EBS CSI driver, which reads the secrets or sensitive data from Secrets Manager and then mounts it as a volume to the pod at runtime. However, that doesn't have a dynamic feature where, if any changes happen in the secrets, it can read and populate in the environment. Sometimes consider your RDS password or OpenSearch password rotates. Amazon EKS doesn't have that feature to read the dynamic one and consider that the password has changed overnight; there is no functionality from the provider to see the changes and then restart the pod or fetch the new value. This often leads to downtime of 12 or even 6 hours, depending on when you realize it, so that needs improvement. Nonetheless, mostly on the add-on side, they have developed a lot; earlier we were installing them manually, but now with EKS auto mode, many things VPC CLI and pod identity service—around four plugins—are installed by default, which is a good thing. However, I believe there should be some solution that is self-contained, covering generic use cases. With the 1.33 release, they have addressed most of my earlier concerns, but I am still looking for some improvements, particularly in CloudWatch monitoring. In IT, we manage two aspects: either the system or the application. Currently, the application logs and monitoring are not very robust in CloudWatch; you can only find things if you are familiar with them. Fortunately, we are familiar, as most of the monitoring involves two types of databases: one is a time series for monitoring data, and the other is an indexing solution for a streaming service. This means we need to get the logs from each node, index them, and populate them on a screen. That part remains a separate service, but if they managed it within Amazon EKS service, where the monitoring is consolidated in one place, you wouldn't need to rely on Prometheus, Grafana, or different services. It would be advantageous to have a consolidated platform for EKS, as Kubernetes is leveraged; monitoring and logging should also be integrated simply by enabling parameters or tags. This would create a self-contained platform where people can onboard and start using it. Currently, I still need to enable logging and monitoring among other things myself; that shouldn't be the case after six or seven years in the market. On a scale from 1 to 10, I would rate Amazon EKS tech support an eight. Some individuals have a deep understanding of the services and can identify potential bottlenecks, especially with load balancer endpoints and certificate management. The shift from NGINX to AWS load balancers has diminished many previous issues. However, not every support engineer meets the same level of expertise, hence why I rate it a solid eight, which I consider decent.
Ritesh P. - PeerSpot reviewer
It's more scalable and flexible than our previous solution because we don't need to install any agents
The reporting works well, but sometimes the severity classifications are inaccurate. Sometimes, it flags an issue as high-impact, but it should be a lower severity. For example, it might highlight an exposed AWS encryption key, a critical compliance issue, but it isn't tagged as a high-risk problem. That only happens about 10 percent of the time. It shows a true positive 80-90 percent of the time.
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
21%
Computer Software Company
11%
Insurance Company
7%
Manufacturing Company
6%
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
10%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business32
Midsize Enterprise18
Large Enterprise38
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise20
Large Enterprise54
 

Questions from the Community

What do you like most about Amazon EKS?
The product's most valuable features are scalability, observability, and performance.
What is your experience regarding pricing and costs for Amazon EKS?
My opinion on the pricing and licensing of Amazon EKS is that it is quite varied, especially when doing projects in the African continent. It's quite expensive considering the local currency with r...
What needs improvement with Amazon EKS?
When we need to deploy the application, we require a large number of instances. Therefore, I hope and believe I will not face out-of-capacity issues in AWS, especially since I have not yet experien...
What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features.
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is worth the price.
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs attention.
 

Also Known As

Amazon Elastic Kubernetes Service
PingSafe
 

Overview

 

Sample Customers

GoDaddy, Pearson, FICO, Intuit, Verizon, Honeywell, Logicworks, RetailMeNot, LogMeIn, Conde Nast, mercari, Trainline, Axway
Information Not Available
Find out what your peers are saying about Amazon EKS vs. SentinelOne Singularity Cloud Security and other solutions. Updated: September 2025.
869,566 professionals have used our research since 2012.