We performed a comparison between Cisco Secure Workload and Singularity Cloud Security by SentinelOne based on real PeerSpot user reviews.
Find out what your peers are saying about VMware, Cisco, Akamai and others in Cloud and Data Center Security."By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself."
"The most valuable feature is micro-segmentation, which is the most important with respect to visibility."
"It's stable."
"The product provides multiple-device integration."
"Secure Workload's best feature is that it's an end-to-end offering from Cisco."
"Generally speaking, Cisco support is considered one of the best in the networking products and stack."
"Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time."
"The product offers great visibility into the network so we can enforce security measures."
"The UI is very good."
"PingSafe released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. PingSafe's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue."
"All the features we use are equal and get the job done."
"It's positively affected the communication between cloud security, application developers, and AppSec teams."
"Cloud Native Security is user-friendly. Everything in the Cloud Native Security tool is straightforward, including detections, integration, reporting, etc. They are constantly improving their UI by adding plugins and other features."
"The most valuable feature is the ability to gain deep visibility into the workloads inside containers."
"The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring."
"The interface is really helpful for technical people, but it is not user-friendly."
"There is some overlap between Cisco Tetration and AppDynamics and I need to have a single pane of glass, rather than have to jump between different tools."
"The integration could be better, especially with different types of solutions."
"The product must be integrated with the cloud."
"It has an uninviting interface."
"It is highly scalable, but there is a limitation that it is only available on Cisco devices."
"The emailed notifications are either hard to find or they are not available. Search capabilities can be improved."
"The categorization of the results from the vulnerability assessment could be improved."
"One of the issues with the product stems from the fact that it clubs different resources under one ticket."
"I want PingSafe to integrate additional third-party resources. For example, PingSafe is compatible with Azure and AWS, but Azure AD isn't integrated with AWS. If PingSafe had that ability, it would enrich the data because how users interact with our AWS environment is crucial. All the identity-related features require improvement."
"PingSafe can be improved by developing a comprehensive set of features that allow for automated workflows."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"The integration with Oracle has room for improvement."
"I used to work on AWS. At times, I would generate a normal bug in my system, and then I would check PingSafe. The alert used to come after about three and a half hours. It used to take that long to generate the alert about the vulnerability in my system. If a hacker attacks a system and PingSafe takes three to four hours to generate an alert, it will not be beneficial for the company. It would be helpful if we get the alert in five to ten minutes."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in PingSafe."
More Singularity Cloud Security by SentinelOne Pricing and Cost Advice →
Cisco Secure Workload is ranked 9th in Cloud and Data Center Security with 13 reviews while Singularity Cloud Security by SentinelOne is ranked 7th in Cloud and Data Center Security with 67 reviews. Cisco Secure Workload is rated 8.4, while Singularity Cloud Security by SentinelOne is rated 8.6. The top reviewer of Cisco Secure Workload writes "A solution that provides good technical support but its high cost makes it challenging for users to adopt it". On the other hand, the top reviewer of Singularity Cloud Security by SentinelOne writes "Provides excellent workload telemetry, hunting capabilities, and deep visibility ". Cisco Secure Workload is most compared with Akamai Guardicore Segmentation, Illumio, VMware NSX, Prisma Cloud by Palo Alto Networks and Cisco ACI, whereas Singularity Cloud Security by SentinelOne is most compared with Prisma Cloud by Palo Alto Networks, Wiz, Orca Security, AWS GuardDuty and Qualys VMDR.
See our list of best Cloud and Data Center Security vendors and best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.