Try our new research platform with insights from 80,000+ expert users

Claroty Platform vs Sweet Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Vulnerability Management
5th
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
115
Ranking in other categories
Cloud and Data Center Security (2nd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd)
Claroty Platform
Ranking in Vulnerability Management
19th
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
16
Ranking in other categories
Remote Access (8th), Operational Technology (OT) Security (2nd), Cyber-Physical Systems Protection (2nd)
Sweet Security
Ranking in Vulnerability Management
34th
Average Rating
9.0
Reviews Sentiment
8.0
Number of Reviews
3
Ranking in other categories
Cloud Workload Protection Platforms (CWPP) (18th), Cloud Security Posture Management (CSPM) (21st), Cloud-Native Application Protection Platforms (CNAPP) (17th), Identity Threat Detection and Response (ITDR) (12th), Cloud Detection and Response (CDR) (6th)
 

Mindshare comparison

As of October 2025, in the Vulnerability Management category, the mindshare of SentinelOne Singularity Cloud Security is 2.3%, up from 1.0% compared to the previous year. The mindshare of Claroty Platform is 0.8%, up from 0.4% compared to the previous year. The mindshare of Sweet Security is 0.4%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Market Share Distribution
ProductMarket Share (%)
SentinelOne Singularity Cloud Security2.3%
Claroty Platform0.8%
Sweet Security0.4%
Other96.5%
Vulnerability Management
 

Featured Reviews

Ritesh P. - PeerSpot reviewer
It's more scalable and flexible than our previous solution because we don't need to install any agents
The reporting works well, but sometimes the severity classifications are inaccurate. Sometimes, it flags an issue as high-impact, but it should be a lower severity. For example, it might highlight an exposed AWS encryption key, a critical compliance issue, but it isn't tagged as a high-risk problem. That only happens about 10 percent of the time. It shows a true positive 80-90 percent of the time.
Deevanshi Priya - PeerSpot reviewer
Achieve certifications with progress tracking and potential for enhanced interactivity
I was using Claroty to complete training assigned by my company. The courses were self-paced and helped me get certified in two additional certifications. I plan to use it further as I have a task list for future courses. It was primarily for certification and study materials The feature I like…
Reviewer302234 - PeerSpot reviewer
Real-time insights have reduced false positives and improved cross-team collaboration
I find the UX/UI to be comfortable. The insights that it brings us are related to the business logic of our company, which is important. If something is flagged as a critical alert, this indicates that it must be observed closely. We have used the real-time monitoring feature of Sweet Security, and this specific solution has given us real detection that helps us find what is actually important against what is not important. It saves us a lot of investigation time that isn't required anymore. It's a very good product, I'm happy we have it. We looked into the CPU consumption and it's the lowest against the benchmark. The time savings from Sweet Security have varied, but the impact has been significant. It has reduced the need for back-and-forth discussions between teams such as Security, DevOps, and R&D. It only flags the important and critical risks. It saves developers time from looking into fixes for false positives. We use the customizable dashboards in Sweet Security. These dashboards have helped in managing our security posture by presenting all the relevant information that the security team needs to see. The correlation between the information is very efficient. They made a lot of improvements to this over the last year. It's a lot better now than it was a year ago. The insights are good. The reporting is very good because we can customize it to what we actually want to see. The value of having real-time visibility in our cloud environment with Sweet Security changes everything because it differentiates between identifying and reacting to something that is not really a risk and something that is truly a risk that needs to be treated. Sweet Security has had a big impact on mitigating risks and aiding development.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloud Security has provided a single view to observe all workloads, prioritization for handling cloud assets, and reduced noise by distinguishing false positives effectively."
"The solution helped free other staff to work on other projects or other tasks. We basically just had to do a bunch of upfront configuring. With it, we do not have to spend as much time in the console."
"Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful."
"The multi-cloud support is valuable. They are expanding to different clouds. It is not restricted to only AWS. It allows us to have different clouds on one platform."
"The user-friendliness is the most valuable feature."
"SentinelOne Singularity Cloud Security improved our risk posture significantly, helped reduce our mean time to detect and mean time to remediate, and enabled collaboration across cloud security, development, and AppSec teams, saving engineering time by approximately three to four hours."
"The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"We're monitoring several cloud accounts with Singularity. It is convenient to identify issues or security failures in any account. It's nice to have all the details we need to solve these issues."
"I appreciate the active coding, deep inspection of packages, and data retrieval. The tool covers information about assets and attack vectors, which I find superior to other tools. Based on alerts, I create reports detailing how an attacker can penetrate the plant, both externally and internally."
"The solution's most valuable feature is the map, which shows everything that is connected and communicates with each other."
"The platform ensures security without imposing significant delays."
"I believe the two main aspects where Claroty stands out are their ability to provide a complete platform and their OT-specific focus."
"Their SRA solution, the Secure Remote Access solution, is very useful for industrial environments."
"The platform ensures security without imposing significant delays."
"I have had a very good experience with the Claroty Platform."
"The solution's asset management is really great compared to Dragos or Nozomi."
"Before we had Sweet Security, upon any type of detection of activity, we needed to conduct lots of investigations in different platforms and logs until we could build the larger picture, but once we inserted Sweet Security, we are able to actually see each and every request being made from the application level towards the infrastructure, making it much easier and reducing the time for an analyst to understand what's really happening."
"The value we see from having real-time visibility into our cloud environment is significant, as Sweet Security serves as our eyes and ears inside AWS, telling us what we are doing wrong so we can fix it."
"The value of having real-time visibility in our cloud environment with Sweet Security changes everything because it differentiates between identifying and reacting to something that is not really a risk and something that is truly a risk that needs to be treated."
 

Cons

"It took us a while to configure the software to work well in this type of environment, as the support documents were not always clear."
"The SentinelOne customer support needs improvement, as they are sometimes late in responding, which is critical in a production issue."
"The SentinelOne customer support needs improvement, as they are sometimes late in responding, which is critical in a production issue."
"It does not bring much threat intel from the outside world. All it does is scan. If it can also correlate things, it will be better."
"We don't get any notifications from SentinelOne Singularity Cloud Security when the clusters are down."
"I used to work on AWS. At times, I would generate a normal bug in my system, and then I would check SentinelOne Singularity Cloud Security. The alert used to come after about three and a half hours. It used to take that long to generate the alert about the vulnerability in my system. If a hacker attacks a system and SentinelOne Singularity Cloud Security takes three to four hours to generate an alert, it will not be beneficial for the company. It would be helpful if we get the alert in five to ten minutes."
"In some cases, the rules are strictly enforced but do not align with real-world use cases."
"The cost has the potential for improvement."
"Occasionally, I face a login problem despite entering the correct password."
"The product could be improved in terms of user interface design."
"There are a few protocols that Claroty doesn't currently support."
"If more AI features could be included with the Clarity solution, it would be feasible for everybody."
"Claroty Platform could improve the pricing to get more acceptability in the market."
"I think the only issue is that the hardware Claroty uses is expensive."
"There is room for improvement in the user interface to make it more vibrant and interactive, similar to IT tools."
"The graphical user interface is quite poor."
"The option to run specific playbooks through Sweet Security platform would help us a lot, but these must be fully customizable."
"One area for improvement could be the alerts, as we have an issue with the alert time, the time it takes for the system to send the alert, but besides that, there is nothing special."
"There was something a year ago that caused a production issue in my company, but they fixed it within an hour."
 

Pricing and Cost Advice

"PingSafe is less expensive than other options."
"While I'm slightly out of touch with pricing, I know SentinelOne is much cheaper than other products."
"The pricing is fair. It is not inexpensive, and it is also not expensive. When managing a large organization, it is going to be costly, but it meets the business needs. In terms of what is out there on the market, it is fair and comparable to what I have seen, so I do not have any complaints about the cost"
"PingSafe is cost-effective for the amount of infrastructure we have. It's reasonable for what they offer compared to our previous solution. It's at least 25 percent to 30 percent less."
"SentinelOne is relatively cheap. If ten is the most expensive, I would rate it a seven."
"We found it to be fine for us. Its price was competitive. It was something we were happy with. We are not a Fortune 500 company, so I do not know how pricing scales at the top end, but for our cloud environment, it works very well."
"We have an enterprise license. It is affordable. I'm not sure, but I think we pay 150,000 rupees per month."
"SentinelOne Singularity Cloud Security is on the costlier side."
"The licensing for physical devices is cheap, but the software version is expensive. The software version costs around 26-28 dollars. I was surprised and even double-checked. It was shocking."
"The tool is quite expensive."
"It's a bit expensive compared to other solutions."
Information not available
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
10%
Government
5%
Manufacturing Company
15%
Computer Software Company
11%
Energy/Utilities Company
9%
Financial Services Firm
5%
Wellness & Fitness Company
17%
Healthcare Company
10%
Financial Services Firm
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise20
Large Enterprise54
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise1
Large Enterprise11
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is wor...
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs ...
What do you like most about Claroty Platform?
The product helps mitigate potential threats, especially if its users have signature rules. The product also provides...
What needs improvement with Claroty Platform?
Regarding the cons of the Claroty Platform, it is not about the deployment, but rather the identification. The Clarot...
What is your primary use case for Claroty Platform?
My clients are using the Claroty Platform for asset identification, finding CVEs and threat intel. I am aware of the ...
What is your experience regarding pricing and costs for Sweet Security?
I am not aware of the pricing details; that is a different department.
What needs improvement with Sweet Security?
There is room for improvement. We have a very close relationship with Sweet Security and have a weekly meeting where ...
What is your primary use case for Sweet Security?
We use Sweet Security primarily for vulnerability management on all of our cloud assets, mainly AWS, but we also use ...
 

Also Known As

PingSafe
No data available
No data available
 

Overview

 

Sample Customers

Information Not Available
Rockwell Automation
Information Not Available
Find out what your peers are saying about Tenable, Wiz, Qualys and others in Vulnerability Management. Updated: September 2025.
869,566 professionals have used our research since 2012.