


Darktrace and Microsoft Defender for Cloud are leading solutions in the cybersecurity sector, offering a suite of tools and features for threat detection and network protection. Darktrace holds an upper hand in real-time threat detection and AI-based network visibility, while Microsoft Defender impresses with its integration capabilities and cloud-native security solutions.
Features: Darktrace provides detailed insights into user behavior and potential internal and external threats. It excels in its alerting system, fast anomaly detection, AI-powered learning, and comprehensive network visibility. Users appreciate Antigena for real-time threat detection and its self-learning capabilities. Microsoft Defender for Cloud offers multi-cloud compatibility, seamless integration with Microsoft 365, robust compliance features, and advanced threat protection, providing endpoint and cloud resource protection supported by continuous updates.
Room for Improvement: Darktrace could improve integration capabilities with other SIEM solutions, simplify configuration, and enhance endpoint protection features. Users find the pricing structure complex and wish for a reduction in false positives. Microsoft Defender for Cloud users desire a more intuitive user interface, simpler policy management, and clearer security recommendations. The pricing structure for complex environments is also a concern, necessitating finer control and streamlined processes.
Ease of Deployment and Customer Service: Darktrace's on-premises deployment suits organizations seeking local control, complemented by straightforward setup and responsive customer support. Microsoft Defender for Cloud is noted for seamless deployment in cloud and hybrid settings, benefiting from Microsoft integration and a robust support network.
Pricing and ROI: Darktrace is perceived as expensive, yet its advanced threat detection features are considered worth the cost, with ROI coming from enhanced visibility and incident prevention. Microsoft Defender for Cloud provides flexible, module-based pricing seen as competitive, delivering value through extensive security capabilities and integration, substantially improving ROI due to Microsoft's resources.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
It has saved us more than 50% of our time.
Other NDR solutions provide virtual appliances that can be deployed on virtualization servers to get up and running quickly.
Using this solution provides financial benefits by securing from server attacks, which offers indirect savings.
Defender proactively indexes and analyzes documents, identifying potential threats even when inactive, enhancing preventative security.
Identifying potential vulnerabilities has helped us avoid costly data losses.
Compared to not having Microsoft Defender for Cloud in place, we definitely saw an advantage by not having downtime due to a security threat.
Having a reliable team ready and willing to assist with any issues is essential.
Throughout the migration, they remained available for several hours without complaint, providing assistance at every step.
In my experience, I have never encountered a junior person or someone without knowledge coming into support from SentinelOne.
The technical support from Darktrace is of high quality.
Darktrace provides excellent technical support with a monthly meeting to review platform incidents, ensuring the system functions as expected.
The challenge lies in waiting for a response after logging a ticket.
Since security is critical, we prefer a quicker response time.
The support team was very responsive to queries.
They understand their product, but much like us, they struggle with the finer details, especially with new features.
The SentinelOne Singularity Cloud exhibits high scalability.
We've automated in our MDM so any device that we start in our MDM automatically installs SentinelOne.
It is scalable. I would rate it a ten out of ten for scalability.
Darktrace has high scalability, and I would rate it a nine out of ten.
Since it's cloud-based, it expands easily.
There is still a gap in terms of storage, and we are trying to figure out how to increase that capacity for regulated environments, which require data retention for 5 to 6 years.
As we have reduced our on-premises infrastructure, it is about how we can migrate workloads to the cloud to make it easier, and then having everything fully encompassed and secured within that area makes it much easier for us to scale as needed and grow.
We are using infrastructure as a code, so we do not have any scalability issues with Microsoft Defender for Cloud implementation because our cloud automatically does it.
It has multiple licenses and features, covering infrastructures from a hundred to five hundred virtual machines, without any issues.
SentinelOne Singularity Cloud is incredibly reliable.
The only downtime we had was when switching from V1 to V2 but it was smooth.
I would rate it a ten out of ten for stability.
The stability of Darktrace is excellent, rated ten out of ten.
The appliance itself has never let me down.
For stability, I would rate Darktrace an eight out of ten.
Defender's stability has been flawless for us.
I have not experienced any crashes or downtime.
Microsoft Defender for Cloud is very stable.
If notifications are available, then it will be more helpful, easy, and time-saving.
Alerts should be directly tied to compliance standards and have a clear role in the overall compliance process.
The Infrastructure as Code service available in PingSafe and the services available in AWS cloud security can be merged so that we can get the security data directly from AWS cloud in PingSafe.
There is no dedicated salesperson in Egypt, and having one would help to improve focus on this market.
They say they can integrate with most firewalls, but when we did an integration with Meraki MX firewalls, that integration didn't work and still doesn't work to this day.
We need Darktrace on each branch to get the data out, and I suggest having some kind of a centralized product that gets data from multiple sources to aggregate and provide the data.
Microsoft, in general, could significantly improve its communication and support.
It would be beneficial to streamline recommendations to avoid unnecessary alerts and to refine the severity of alerts based on specific environments or environmental attributes.
The artificial intelligence features could be expanded to allow the system to autonomously manage security issues without needing intervention from admins.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
If you want to buy just EDR, the price is less. XDR is a little bit more expensive.
It should not be based on subscription. It should be based on the number of servers that I am scanning.
The product is considered expensive compared to others.
The pricing is costly in USD, and they charge based on device counts.
The licensing cost is approximately eight dollars a year.
Security has essentially no cost when compared to the cost of a breach.
Every time we consider expanding usage, we carefully evaluate the necessity due to cost concerns.
We appreciate the licensing approach based on employee count rather than a big enterprise license.
This tool has been helpful for us. It allows us to search for vulnerabilities and provides evidence directly on the screen.
The cloud misconfiguration feature gave us almost zero false positives.
PingSafe has sped up the process by 80% to 90%.
It is capable of responding to lateral movement and ransomware deployment within environments where there is data exfiltration.
I do not need to manually process incidents as Darktrace provides an incident summary, potential detection paths, and other details, all exportable with just a click.
If I am in a data center where I don't have layer two, it becomes an issue because the autonomous response is reliant on sending spoofed TCP resets to my core switch to block traffic, which is a major issue.
The most valuable feature for me is the variety of APIs available.
This feature significantly aids in threat detection and enhances the user experience by streamlining security management.
The most valuable feature is the recommendations provided on how to improve security.
| Product | Mindshare (%) |
|---|---|
| SentinelOne Singularity Cloud Security | 4.9% |
| Microsoft Defender for Cloud | 6.3% |
| Darktrace | 2.5% |
| Other | 86.3% |

| Company Size | Count |
|---|---|
| Small Business | 52 |
| Midsize Enterprise | 23 |
| Large Enterprise | 58 |
| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 19 |
| Large Enterprise | 29 |
| Company Size | Count |
|---|---|
| Small Business | 30 |
| Midsize Enterprise | 12 |
| Large Enterprise | 49 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?
What benefits should users expect from SentinelOne Singularity Cloud Security?
SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Darktrace revolutionizes network security with AI-driven alerts, anomaly detection, and robust visibility across networks. It autonomously detects threats, minimizing the need for human oversight, and offers efficient IP identification with minimal false positives.
Darktrace uses advanced AI analytics to enhance network protection. Its powerful real-time threat response capabilities and self-learning enable thorough monitoring and insightful analysis of network activities. While providing scalable and reliable security, users seek improvements in false positive reduction, user-friendly interfaces, and pricing. Enhanced third-party integration, more effective dashboards, and centralized automation features remain top priorities. Users benefit greatly from its Antigena feature, offering automated responses like blocking suspicious connections for robust network defense.
What Are Darktrace's Key Features?In industries employing Darktrace, it is pivotal in securing LAN networks, analyzing behavioral patterns, and detecting internal and external threats. Adoption alongside platforms like F5 and SAP enhances incident response, traffic analysis, and threat identification, utilizing Antigena for proactive security measures.
Microsoft Defender for Cloud is a comprehensive security platform offering integration with Microsoft services, multi-cloud capability, AI-driven threat detection, compliance, and unified visibility for improved security operations.
Microsoft Defender for Cloud manages security operations by integrating with Microsoft services and supporting multi-cloud environments. Its features include AI-driven threat detection, compliance oversight, and advanced threat protection. It simplifies processes with unified visibility, threat intelligence, and automated workflows, enhancing security posture across various workloads. Despite its robust capabilities, improvements are needed in third-party tool integration, comprehensive AI-driven remediation, and a more intuitive dashboard. Users report complexity in licensing, inadequate documentation, and high costs, with room for enhancements in compliance reporting and multi-cloud support.
What are the key features of Microsoft Defender for Cloud?Industries leverage Microsoft Defender for Cloud for security posture management and endpoint protection. Many companies integrate it with Office 365 for enhanced functionality. It provides comprehensive security overviews by monitoring cloud vulnerabilities, limiting unauthorized access, and replacing existing tools with its extensive capabilities from network security to compliance checks, securing Azure infrastructure, and enhancing client security.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.