Try our new research platform with insights from 80,000+ expert users

Cisco Secure Workload vs CloudPassage comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
118
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd), AI Observability (2nd)
Cisco Secure Workload
Ranking in Cloud Workload Protection Platforms (CWPP)
15th
Average Rating
8.6
Reviews Sentiment
7.7
Number of Reviews
15
Ranking in other categories
Cloud and Data Center Security (8th), Microsegmentation Software (4th), Cisco Security Portfolio (8th)
CloudPassage
Ranking in Cloud Workload Protection Platforms (CWPP)
30th
Average Rating
8.0
Number of Reviews
2
Ranking in other categories
Cloud Security Posture Management (CSPM) (48th)
 

Mindshare comparison

As of March 2026, in the Cloud Workload Protection Platforms (CWPP) category, the mindshare of SentinelOne Singularity Cloud Security is 4.4%, up from 2.4% compared to the previous year. The mindshare of Cisco Secure Workload is 2.4%, down from 3.1% compared to the previous year. The mindshare of CloudPassage is 0.6%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Workload Protection Platforms (CWPP) Mindshare Distribution
ProductMindshare (%)
SentinelOne Singularity Cloud Security4.4%
Cisco Secure Workload2.4%
CloudPassage0.6%
Other92.6%
Cloud Workload Protection Platforms (CWPP)
 

Featured Reviews

SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.
Raj Metkar - PeerSpot reviewer
Director, Head of Networks at MUFG, EMEA
Discover internal application dependencies and create a dependency map
We actively seek improvements in integrating the Infoblox DDI platform with Cisco Secure Workload. This integration allows Cisco Secure Workload to learn about our networks and network tags, providing valuable insights into vulnerabilities related to the operating system and various applications installed on our servers. Recently, Cisco announced a new product called HyperShield, an AI-based autonomous micro-segmentation solution. While Cisco has not stated that HyperShield will replace Cisco Secure Workload, it represents a natural evolution for the company. HyperShield features dynamic policy discovery and enforcement; however, once policies are enforced, they do not change until a discovery occurs, requiring a re-enforcement process. This new platform operates autonomously, minimizing the need for user or security engineer intervention. I would have expected Cisco to incorporate more automatic discovery and enforcement features within the existing Cisco Secure Workload product. Instead of enhancing the current product, they have introduced a new solution. Cisco plans to honor existing Tetration licenses, allowing users to transition to HyperShield without additional costs, reflecting the investment enterprises have already made. From Cisco’s perspective, this represents a natural progression in their product line. While the product name changes, it seems more of a rebranding effort. The enhancements are greater autonomy, improved discovery, and automatic enforcement, which are now being introduced in HyperShield. Cisco Secure Workload offers automatic policy enforcement but cannot adjust policies dynamically as the application needs to change. Having used the platform for the past five years, the recent announcement has been reassuring. Cisco has confirmed that our investment in the platform will not go to waste. They will honor our existing licenses, providing a natural migration path to the new solution without any disruption
it_user854058 - PeerSpot reviewer
Lead Information Security Engineer
It helped us be more aware of what our security posture is, but not all of the features work in my environment
I would say CloudPassage is very useful for certain things. If you just want a few modules then focus on what you need and negotiate the price based on the individual module, rather than looking at the whole thing, because I didn't find all the modules very useful. Also, use Splunk in combination with it if you want reporting. I would give CloudPassage at least a seven out of 10. I rate it on the high-end because of the customer support - I've never seen any support that is comparable to that, it's very good, excellent. The support staff actually care, they actually follow up; it's very nice. And CloudPassage really listens to its customers. The product itself is very nice if you're only looking to check off your compliance requirements, but if you're looking for more of dashboarding and things like that, CloudPassage is improving but it's not quite there.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I did a lot of research before signing up and doing the demo. They have a good reputation as far as catching threats early on."
"The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."
"The user-friendliness is the most valuable feature."
"Singularity Cloud's ability to create custom correlation searches and reduce noise is highly valuable."
"It gives me the information I need."
"I would definitely recommend SentinelOne Singularity Cloud Security for infrastructure security."
"The visibility is the best part of the solution."
"The UI is responsive and user-friendly."
"Scalability is its most valuable feature."
"Secure Workload's best feature is that it's an end-to-end offering from Cisco."
"Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations."
"By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself."
"The most valuable feature of this solution is security."
"A complete and powerful micro-segmentation solution."
"Generally speaking, Cisco support is considered one of the best in the networking products and stack."
"The product provides multiple-device integration."
"Key features are the Software Vulnerability Assessment and the CSM, which is the configuration check."
"CloudPassage allowed us to implement changes that affected hundred of servers within our environments in seconds."
"Our scores let us know when to trigger workflow to go out in a patch, it has reduced the amount of time we had to take to manually verify software and check our updates, and it helped us be more aware of what our security posture is."
"Policies are very easy to manage on a day-to-day basis."
 

Cons

"The cloud-based operations might pose challenges in areas with limited or unavailable internet connectivity."
"While SentinelOne offers robust security features, its higher cost may present a challenge for budget-conscious organizations."
"Implementing single sign-on requires a pre-class account feature, which is currently not available."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"They can add more widgets to its dashboard. A centralized dashboard with numerous metrics would improve user understanding."
"Their search feature could be better."
"The areas with room for improvement include the cost, which is higher compared to other security platforms. The dashboard can also be laggy."
"In addition to the console alerts, I would like SentinelOne Singularity Cloud Security to also send email notifications."
"The product should be easy to use, but it is not. Comparing it to other products, it was very complex."
"There is some overlap between Cisco Tetration and AppDynamics and there are few DC tools, it would be great to have a single pane of glass, rather than have to jump between different tools."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes."
"It has an uninviting interface."
"The product must be integrated with the cloud."
"There was a controversy when Cisco reduced the amount of data they kept, and the solution became quite cost-intensive, which made its adoption challenging….Although they have modified it now, I preferred the previous version, and I wish all the functionality were back under the same product."
"I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications."
"The scalability of this solution needs to be improved."
"The reports and graphs are unintuitive."
"Of all the advertised functions, I only find two things that really work in my environment, even though I wanted to use all of them. They're not flexible enough to be used."
"In the CSM module the policies are really hard to work with it. It is not very flexible at all. I would suggest that they change that. Right now, the scan is based on the group that the server is in. What happens if the server is in multiple groups?"
"Of all the advertised functions, I only find two things that really work in my environment, even though I wanted to use all of them."
"The reports and graphs are unintuitive."
"Anything outside of the software vulnerability management and the CSM, things like the GhostPort, need some improvement. The dashboard is in beta. It looks really good, I wish it would come out of beta."
 

Pricing and Cost Advice

"SentinelOne is relatively cheap. If ten is the most expensive, I would rate it a seven."
"SentinelOne offers excellent pricing and licensing options."
"Singularity Cloud Workload Security's licensing and price were cheaper than the other solutions we looked at."
"The pricing for PingSafe in India was more reasonable than other competitors."
"I understand that SentinelOne is a market leader, but the bill we received was astronomical."
"PingSafe is less expensive than other options."
"The tool is cost-effective."
"Its pricing was a little less than other providers."
"It is not cheap and pricing may limit scalability."
"The pricing is a bit higher than we anticipated."
"Pricing depends on the scope of the application and the features. Larger installations save more."
"The price is outrageous. If you have money to throw at the product, then do it."
"The cost for the hardware is around 300k."
"Regarding price, Cisco Secure Workload can be expensive if you don't have a budget. If you're not doing micro-segmentation, every extra security measure or enforcement you're putting on top of your existing environment will be an extra cost. It's not a cheap solution at all. But from my point of view, if you need to do micro-segmentation, this is one of the best tools I've seen for it. I can't compare that to Microsoft's solution because I haven't looked into it. I've looked into VMware and Cisco. Those are the only two that I know of. I didn't know that Microsoft could do micro-segmentation at all. Maybe they can, but I haven't heard anything about it."
"The price is based on how many computers you're going to install it on."
"We also evaluated VMware NSX, but the pricing and features available in a CloudPassage implementation were decisive in deciding to go with CP."
"CloudPassage is a little bit on the expensive side. So my suggestion is that the company lower its price point a wee bit or sell modules, separate them in modules, because I only find two things that are useful to me, yet I pay for four or five modules. It didn't seem like it was a fair deal."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
10%
Government
6%
Manufacturing Company
13%
Computer Software Company
10%
Financial Services Firm
10%
Government
8%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business49
Midsize Enterprise22
Large Enterprise55
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise3
Large Enterprise8
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
Regarding the pricing for SentinelOne Singularity Cloud Security, I do not think it is something I can compare.
What needs improvement with PingSafe?
I do not see room for improvement in SentinelOne Singularity Cloud Security. In the future, I would like to see the i...
What is your experience regarding pricing and costs for Cisco Secure Workload?
CloudStrike offers antivirus capabilities and firewall features for servers and VDI but lacks automatic policy discov...
What needs improvement with Cisco Secure Workload?
We actively seek improvements in integrating the Infoblox DDI platform with Cisco Secure Workload. This integration a...
What is your primary use case for Cisco Secure Workload?
When we onboarded Cisco Secure Workload, the usual use case was to discover internal application dependencies and cre...
Ask a question
Earn 20 points
 

Also Known As

PingSafe
Cisco Tetration
CloudPassage Halo
 

Overview

 

Sample Customers

Information Not Available
ADP, University of North Carolina Charlotte (UNCC)
Citrix
Find out what your peers are saying about Cisco Secure Workload vs. CloudPassage and other solutions. Updated: March 2026.
884,933 professionals have used our research since 2012.