Try our new research platform with insights from 80,000+ expert users

Azure Confidential Computing vs SentinelOne Singularity Cloud Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Azure Confidential Computing
Ranking in Compliance Management
20th
Average Rating
0.0
Reviews Sentiment
8.5
Number of Reviews
1
Ranking in other categories
Data Privacy Management Software (8th)
SentinelOne Singularity Clo...
Ranking in Compliance Management
1st
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
114
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (2nd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd)
 

Mindshare comparison

As of August 2025, in the Compliance Management category, the mindshare of Azure Confidential Computing is 0.3%, up from 0.1% compared to the previous year. The mindshare of SentinelOne Singularity Cloud Security is 7.4%, up from 1.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Compliance Management
 

Featured Reviews

Cuneyt-Gurses - PeerSpot reviewer
Improves confidential data protection but needs improved efficiency in encryption algorithms
I have private data and want to prevent others, including Microsoft, from seeing it, I have control. By setting up a landing zone for sovereignty, the data is stored in MCFS landing zones. This data is encrypted in use, at rest, and in transit. While the data is in use, no third-party user or Microsoft can view, capture, or read it. These landing zones are for specific customers. When I enter an MCFS zone, my data remains strictly confidential, and unauthorized users cannot see it. This is the basic principle. Confidential computing is used for data in use. There are three types of data: in-use, in-transit, and at-rest data. At rest means the stored data is encrypted. In-use data means when the data is in memory, it remains confidential to other users, cloud users, or hackers, preventing data leakage or hacking. None can capture my data. Confidential computing involves data in use. This serves as a reference architecture, not just a unique service. Compliance and governance are core concepts of sovereignty. Sovereignty combines compliance rules with local compliance regulations. Each country can develop its compliance rules and integrate them into Azure. Globally, countries have developed their compliance rules and sovereignty compliance packs for Azure. For example, GDPR is implemented in some countries. In Turkey, there is a regulation named Kaveh Kaka. In Italy, there are specific data classification and compliance rules. They package their computing and compliance rules for Azure, allowing access to Italian compliance rules in Azure. If I implement Microsoft Cloud for Sovereignty landing zones, I see specialized and customized computing packages.
Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"When I enter an MCFS zone, my data remains strictly confidential, and unauthorized users cannot see it."
"The benefit of Microsoft Cloud for sovereignty is boundless."
"The cooperative nature of SentinelOne has influenced our decision not to shift."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"SentinelOne Singularity Cloud Security offers security solutions for both Kubernetes and CI/CD pipelines."
"SentinelOne Singularity Cloud Security is on top of protecting ephemeral workloads."
"SentinelOne Singularity Cloud Security's most valuable feature is its unified console."
"It is pretty easy to integrate with this platform. When properly integrated, it monitors end-to-end."
"With SentinelOne Singularity Cloud Security, I appreciate the monitoring features and the report with the compliance score."
"Cloud Native Security has helped us with our risk posture and securing our agenda. It has been tremendous in terms of supporting growth."
 

Cons

"There is an improvement area for data in use. It is still a research subject globally."
"Scientists are still working to improve the efficiency and latency of data in use algorithms."
"I have noticed that the dashboard occasionally gets stuck, potentially due to internet issues. It could benefit from enhancements to be more robust and smoother."
"In addition to the console alerts, I would like SentinelOne Singularity Cloud Security to also send email notifications."
"We use SentinelOne Singularity Cloud Security and also SentinelOne. If SentinelOne Singularity Cloud Security integrated some of the endpoint security features of SentinelOne, it would be the perfect one-stop solution for everything. We wouldn't need to switch between the products. At my organization, I am responsible for endpoint security and vulnerability management. Integrating both functions into one application would be ideal because I could see all the alerts, heat maps, and reports in one console."
"In some cases, the rules are strictly enforced but do not align with real-world use cases."
"The application module focuses on the different codes and libraries that can be run on the machines. It is very important for Singularity EDR to detect what type of codes and what type of libraries can run in the machine. If they can implement a white list or a black list of codes or libraries that can be used in the machine, it would be very helpful. They can focus more on the application module."
"SentinelOne Singularity Cloud Security is on the costlier side."
"SentinelOne Singularity Cloud Security could be improved with easier integrations to the Singularity Data Lake, particularly for various vendors."
"SentinelOne Singularity Cloud Security takes four to five hours to detect and highlight an issue, and that time should be reduced."
 

Pricing and Cost Advice

Information not available
"PingSafe falls within the typical price range for cloud security platforms."
"It's not cheap, but it is worth the price."
"While SentinelOne Singularity Cloud Security offers robust protection, its high cost may be prohibitive for small and medium-sized businesses."
"The pricing for PingSafe in India was more reasonable than other competitors."
"Pricing is based on modules, which was ideal for us."
"As a partner, we receive a discount on the licenses."
"We have an enterprise license. It is affordable. I'm not sure, but I think we pay 150,000 rupees per month."
"I would rate the cost a seven out of ten with ten being the most costly."
report
Use our free recommendation engine to learn which Compliance Management solutions are best for your needs.
865,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
16%
Financial Services Firm
15%
Manufacturing Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Azure Confidential Computing?
The setup contains an overhead, especially for the nodes used in implementing a landing zone, MCFS landing zone. These nodes are specialized for confidential computing, resulting in some overhead. ...
What needs improvement with Azure Confidential Computing?
There is an improvement area for data in use. It is still a research subject globally. Scientists are working to improve the efficiency and latency of data in use algorithms. For example, they are ...
What is your primary use case for Azure Confidential Computing?
I have utilized Amazon MQ for my Python automation projects. It serves as a middleware layer service for my projects, particularly when using Amazon MQ. I can state that it is one of the essential ...
What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features.
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is worth the price.
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs attention.
 

Also Known As

No data available
PingSafe
 

Overview

Find out what your peers are saying about SentinelOne, Wiz, Vanta and others in Compliance Management. Updated: August 2025.
865,649 professionals have used our research since 2012.