Try our new research platform with insights from 80,000+ expert users

Lepide vs Sweet Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Average Rating
8.8
Reviews Sentiment
7.7
Number of Reviews
113
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd)
Lepide
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Active Directory Management (11th), Identity Threat Detection and Response (ITDR) (20th)
Sweet Security
Average Rating
9.0
Reviews Sentiment
8.0
Number of Reviews
3
Ranking in other categories
Vulnerability Management (35th), Cloud Workload Protection Platforms (CWPP) (17th), Cloud Security Posture Management (CSPM) (21st), Cloud-Native Application Protection Platforms (CNAPP) (16th), Identity Threat Detection and Response (ITDR) (12th), Cloud Detection and Response (CDR) (6th)
 

Featured Reviews

Chetan Yelve - PeerSpot reviewer
Enhancing workflow with automation and comprehensive security monitoring
Since I have been using it, I have seen many improvements. SentinelOne Singularity Cloud Security is an excellent CSSPM tool, but the CSC CWPP features need improvement. There is scope for more application security posture management features and other than that, there are not many ASPM solutions on the market, and existing ones are more costly. I would prefer to see SentinelOne Singularity Cloud Security develop into a single pane of glass for ASPM and CSPM, and I would also appreciate runtime protection highlighted immediately if I'm changing anything in my environment. The dashboard needs more widgets added so that customers or users can see everything on the dashboard itself without needing to go too deep.
Reviewer302234 - PeerSpot reviewer
Real-time insights have reduced false positives and improved cross-team collaboration
I find the UX/UI to be comfortable. The insights that it brings us are related to the business logic of our company, which is important. If something is flagged as a critical alert, this indicates that it must be observed closely. We have used the real-time monitoring feature of Sweet Security, and this specific solution has given us real detection that helps us find what is actually important against what is not important. It saves us a lot of investigation time that isn't required anymore. It's a very good product, I'm happy we have it. We looked into the CPU consumption and it's the lowest against the benchmark. The time savings from Sweet Security have varied, but the impact has been significant. It has reduced the need for back-and-forth discussions between teams such as Security, DevOps, and R&D. It only flags the important and critical risks. It saves developers time from looking into fixes for false positives. We use the customizable dashboards in Sweet Security. These dashboards have helped in managing our security posture by presenting all the relevant information that the security team needs to see. The correlation between the information is very efficient. They made a lot of improvements to this over the last year. It's a lot better now than it was a year ago. The insights are good. The reporting is very good because we can customize it to what we actually want to see. The value of having real-time visibility in our cloud environment with Sweet Security changes everything because it differentiates between identifying and reacting to something that is not really a risk and something that is truly a risk that needs to be treated. Sweet Security has had a big impact on mitigating risks and aiding development.
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
872,869 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
10%
Government
6%
Government
11%
Manufacturing Company
11%
Healthcare Company
8%
Computer Software Company
8%
Wellness & Fitness Company
16%
Healthcare Company
10%
Financial Services Firm
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business47
Midsize Enterprise20
Large Enterprise52
No data available
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I think the pricing of SentinelOne Singularity Cloud Security is a bit high.
What needs improvement with PingSafe?
One area that could be improved in SentinelOne Singularity Cloud Security is their policies; the way they have config...
Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Sweet Security?
I'm not really into the specifics of the pricing, but as far as I know, it is cost-effective.
What needs improvement with Sweet Security?
Sweet Security has room for improvement in two areas. One is for robust integration with automations and playbooks. W...
What is your primary use case for Sweet Security?
We are cloud native and are using Sweet Security for call runtime protection. It is much bigger than just runtime pro...
 

Also Known As

PingSafe
No data available
No data available
 

Overview

 

Sample Customers

Information Not Available
Deloitte, KPMG, Fujitsu, Investec, Pfizer, West Yorkshire, Moody's, Fair Trade, Mets, SEB
Information Not Available
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: October 2025.
872,869 professionals have used our research since 2012.