Try our new research platform with insights from 80,000+ expert users

BloodHound Enterprise vs Sweet Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
114
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (1st)
BloodHound Enterprise
Average Rating
8.0
Reviews Sentiment
6.2
Number of Reviews
1
Ranking in other categories
Identity Threat Detection and Response (ITDR) (6th)
Sweet Security
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Vulnerability Management (74th), Cloud Workload Protection Platforms (CWPP) (33rd), Cloud Security Posture Management (CSPM) (41st), Cloud-Native Application Protection Platforms (CNAPP) (28th), Identity Threat Detection and Response (ITDR) (38th), Cloud Detection and Response (CDR) (8th)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Hasan Abufreiha - PeerSpot reviewer
Has significantly influenced our security strategy as it helps us plan attacks and take initial steps in compromising networks
I haven't explored cost-saving aspects or utilized integration capabilities within BloodHound. Additionally, I haven't used AI features in Broadcom for threat detection yet, leaving that to our IT team to handle. If you're already familiar with the field, learning to use BloodHound Enterprise shouldn't be too tricky as the UI is user-friendly and the features are straightforward. I'd rate my overall experience around an eight, mainly due to occasional performance issues and deeper operational concerns. However, in terms of features, UI, and ease of use, it's top-notch.
Use Sweet Security?
Share your opinion
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
862,077 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
15%
Manufacturing Company
9%
Government
6%
Financial Services Firm
15%
Computer Software Company
10%
Manufacturing Company
9%
Retailer
6%
Wellness & Fitness Company
33%
Non Profit
12%
Computer Software Company
10%
Manufacturing Company
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is wor...
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs ...
What needs improvement with BloodHound Enterprise?
I don't have any specific improvements in mind, as I haven't encountered any significant issues with BloodHound Enter...
What is your primary use case for BloodHound Enterprise?
I mainly use BloodHound Enterprise for internal architecture planning, audits, and daily general testing engagements.
What advice do you have for others considering BloodHound Enterprise?
I haven't explored cost-saving aspects or utilized integration capabilities within BloodHound. Additionally, I haven'...
Ask a question
Earn 20 points
 

Also Known As

PingSafe
No data available
No data available
 

Overview

Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: June 2025.
862,077 professionals have used our research since 2012.