Find out what your peers are saying about Microsoft, Wiz, Amazon Web Services (AWS) and others in Cloud Workload Protection Platforms (CWPP).
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
The solution has provided improvement in productivity and the time spent on issues.
If we cannot adjust how to operate the solution, then it becomes very difficult, so hearing and initial tuning are very important.
Through the use of Tenable Security Center, my clients achieve more efficient patching and gain visibility and understanding of security operations, leading to improved resilience and infrastructure insight.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
I appreciate the support for AWS; it is relatively fast, and their SLAs meet my needs.
Longer response times and less thorough assistance.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
I would rate the scalability of PingSafe 10 out of 10.
It is designed to scale based on usage, which makes it very adaptable for varying demands.
I can scale it extensively with the use of agents, allowing scanning in restrictive environments and loosely connected devices.
Scalability is a bit limited with Tenable Security Center.
Singularity Cloud Workload Security is significantly more stable than our previous solution.
Singularity Cloud Workload Security is more stable than our previous solution.
No lag, no crashing, no downtime.
The stability of GuardDuty is extremely reliable.
It is backed by machine learning, and AWS has strong machine learning models and the capacity to support this with advanced computing power.
The stability of the solution is outstanding.
If I had to ask for anything to make it easier, it would be signed images that are GPG signed and a public repository where we can get the bits from.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
A unified dashboard that aggregates findings across all regions without requiring manual aggregation could enhance convenience for users.
Further integration with services like API Gateway would be beneficial.
I think that some detections in container environments such as container runtime, and on services such as AWS container service, Fargate service or EKS service could be improved.
It's important for Tenable to catch up on testing capabilities that are present in solutions like Qualys.
The reports and plugins for reports and scans could benefit from enhancements.
Translating reports into European languages is especially relevant in Central Eastern Europe, where clients often require reports in local languages.
Covering our 50,000 endpoints would have nearly bankrupted most security programs, even well-funded ones like ours.
I believe the enterprise version costs around $55 per user per year.
There are some tools that are double the cost of Cloud Native Security.
GuardDuty is very cheap and operates on a pay-as-you-go basis.
The pricing of this tool is cheaper compared to other tools from other vendors, which are more expensive.
The product is somewhat pricey, reflecting its valuable features and status as a high-quality solution in the vulnerability management market.
Tenable Security Center is quite expensive, particularly for the CEE region, causing us to lose cases due to its pricing.
The price of Tenable Security Center is not so high; it's relatively a cheaper solution.
Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks.
For example, we can set up an automation alert so that if a threat is detected on an endpoint, we can automatically take action on our Okta or AD environment, such as locking the account that was signed in or forcing a password reset.
This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.
It notifies you immediately when something goes wrong, allowing quick response to threats.
Enabling GuardDuty with a single click allows it to start analyzing data for threats without requiring additional software deployment or updates.
The great benefits of using AWS GuardDuty are that it is connected to all ecosystems from the AWS environment, and I can detect threats faster and locate all the information in a single tool.
Tenable Security Center provides an overall score of vulnerabilities, comparing an organization with others in the same industry.
The most effective feature of Tenable Security Center for detecting vulnerabilities is its capability for critical mapping.
The most valuable features of Tenable Security Center for my clients are Vulnerability Priority Rating (VPR) and Asset Criticality Scoring.
Product | Market Share (%) |
---|---|
AWS GuardDuty | 12.8% |
Wiz | 16.6% |
Microsoft Defender for Cloud | 14.3% |
Other | 56.3% |
Product | Market Share (%) |
---|---|
Tenable Security Center | 9.9% |
Qualys VMDR | 16.1% |
Rapid7 InsightVM | 14.2% |
Other | 59.8% |
Company Size | Count |
---|---|
Small Business | 44 |
Midsize Enterprise | 21 |
Large Enterprise | 53 |
Company Size | Count |
---|---|
Small Business | 8 |
Midsize Enterprise | 4 |
Large Enterprise | 13 |
Company Size | Count |
---|---|
Small Business | 22 |
Midsize Enterprise | 10 |
Large Enterprise | 26 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Amazon Guard Duty is a continuous cloud security monitoring service that consistently monitors and administers several data sources. These include AWS CloudTrail data events for EKS (Elastic Kubernetes Service) audit logs, VPC (Virtual Private Cloud) flow logs, DNS (Domain Name System) logs, S3 (Simple Cloud Storage), and AWS CloudTrail event logs.
Amazon GuardDuty intuitively uses threat intelligence data - such as lists of malicious domains and IP addresses - and ML (machine learning) to quickly discover suspicious and problematic activity in a user's AWS ecosystem. Activities may include concerns such as interactions with malicious IP addresses or domains, exposed credentials usage, or changes and/or escalation of privileges.
GuardDuty is able to easily determine problematic AWS EC2 (Elastic Compute Cloud) instances delivering malware or mining bitcoin. It is also able to trace AWS account access history for evidence of destabilization. such as suspicious API calls resulting in changing password policies to minimize password strength or anomalous infrastructure deployments in new or different never-used regions.
GuardDuty will continually alert users regarding their AWS environment status and will send the security discoveries to the GuardDuty dashboard or Amazon CloudWatch events for users to view.
Users can access GuardDuty via:
Amazon Elastic Kubernetes Service (Amazon EKS)
Kubernetes protection is an optional add-on in Amazon GuardDuty. This tool is able to discover malicious behavior and possible destabilization of an organization's Kubernetes clusters inside of Amazon Elastic Kubernetes Service (Amazon EKS).
When Amazon EKS is activated, GuardDuty will actively use various data sources to discover potential risks against Kubernetes API. When Kubernetes protection is enabled, GuardDuty uses optional data sources to detect threats against Kubernetes API.
Kubernetes audit logs are a Kubernetes feature that captures historical API activity from applications, the control plane, users, and endpoints. GuardDuty collates these logs from Amazon EKS to create Kubernetes discoveries for the organization's Amazon EKS assets; there is no need to store or turn on the logs.
As long as Kubernetes protection remains activated, GuardDuty will continuously dissect Kubernetes data sources from the Amazon EKS clusters to ensure no suspicious or anomalous behavior is taking place.
Amazon Simple Cloud Storage (S3) Protection
Amazon S3 allows Amazon GuardDuty to actively audit object-level API processes to discover possible security threats to data inside an organization's S3 buckets. GuardDuty continually audits risk to the organization’s S3 assets by carefully dissecting AWS CloudTrail management events and AWS CloudTrail S3 data events. These tools are continually auditing various CloudTrail management events for potential suspicious activities that affect S3 buckets, such as PutBucketReplication, DeleteBucket, ListBucket, and data events for S3 object-level API processes, such as PutObject, GetObject, ListObject, and DeleteObject.
Reviews from Real Users
“The most valuable features are the single system for data collection and the alert mechanisms. Prior to using GuardDuty, we had multiple systems to collect data and put it in a centralized location so we could look into it. Now we don't need to do that anymore as GuardDuty does it for us.” - Arunkumar A., Information Security Manager at Tata Consultancy Services
Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize your most critical assets and vulnerabilities.
Managed on-premises and powered by Nessus technology, the Tenable Security Center (formerly Tenable.sc) suite of products provides the industry’s most comprehensive vulnerability coverage with real-time continuous assessment of your network. It’s your complete end-to-end vulnerability management solution.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.