Try our new research platform with insights from 80,000+ expert users

Symantec Storage Protection vs Trellix Cloud Workload Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.6
Reviews Sentiment
7.6
Number of Reviews
118
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd), AI Software Development (1st), AI Observability (2nd)
Symantec Storage Protection
Ranking in Cloud Workload Protection Platforms (CWPP)
30th
Average Rating
8.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Trellix Cloud Workload Secu...
Ranking in Cloud Workload Protection Platforms (CWPP)
25th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2026, in the Cloud Workload Protection Platforms (CWPP) category, the mindshare of SentinelOne Singularity Cloud Security is 4.2%, up from 2.4% compared to the previous year. The mindshare of Symantec Storage Protection is 0.3%, up from 0.1% compared to the previous year. The mindshare of Trellix Cloud Workload Security is 0.6%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Workload Protection Platforms (CWPP) Market Share Distribution
ProductMarket Share (%)
SentinelOne Singularity Cloud Security4.2%
Trellix Cloud Workload Security0.6%
Symantec Storage Protection0.3%
Other94.9%
Cloud Workload Protection Platforms (CWPP)
 

Featured Reviews

SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.
reviewer1177905 - PeerSpot reviewer
Head, Managed Security Services with 10,001+ employees
Good technical support, secures our services and mobile devices against malware
We use this solution as a firewall to protect against malware The most valuable features of this solution are the advanced firewall and malware prevention. The mobile device solution is very good. One of the areas that this solution can be improved is in Behavioural monitoring. In the next…
Madan Mohan - PeerSpot reviewer
Director Operations at SOFTPRO PLUS
Easy policy designing and highly scalable solution
The customers really want protection against unauthorized applications running on their servers. They should avoid installing any unknown source and use Trellix Cloud Workload Security for the best solution in workload security. It includes DNS with ransomware protection. With this, they can have complete protection for their servers. Additionally, any solution working with the database should implement change control. So, if any changes are made on the database side, they should be resolved and verified to ensure they are not made by any unknown source. This is the best solution we suggest to customers who want granular control to protect their servers. It's easy to deploy with a single agent. Overall, I would rate the solution a nine out of ten because policy designing is very easy too. And the manageability is very easy. You can easily manage it through EPO and deploy policies within five to ten minutes. No issues with that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"SentinelOne Singularity Cloud Security's most valuable feature is its unified console."
"The most valuable aspects of SentinelOne Singularity Cloud Security are its alerting system and the remediation guidance it provides."
"The GUI is one of the best features. Audit reports and documentation for alerts are also valuable."
"The most valuable feature is the ability to gain deep visibility into the workloads inside containers."
"SentinelOne Singularity Cloud Security is excellent, and I highly recommend it."
"It saves us time based on savings on manual activities."
"The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"The most valuable features of this solution are the advanced firewall and malware prevention."
"The most valuable feature is the application control."
"The discovery feature is the most valuable. After you integrate your cloud environment, maybe an Azure or AWS, or a private environment hosted on VMware, it automatically starts discovering the number of servers that are running on that cloud and the number of services that you have done. It is a beautiful feature because, from a security standpoint, it is difficult to identify which VM is compliant or not when you keep on provisioning a number of VMs in the cloud. It also checks for compliance. It checks whether a system is compliant and whether antivirus is installed on a VM. If an antivirus is installed, it checks whether the antivirus is updated to the latest signature package or not. All these things are beautifully done by McAfee Cloud Workload Security. For communicating with the McAfee server, you need to install an agent on the VM. McAfee Cloud Workload Security gives you a direct opportunity to install an agent on a Windows machine. If you have a Windows cloud, you can directly push that agent onto the VM through your McAfee portal. It provides you a single dashboard view of all servers present in the cloud. It shows the servers on which the antivirus is already installed as well as the servers for which the antivirus installation is still pending. This dashboard view is a much-needed thing. It also has a centralized management, which makes it easy to use."
 

Cons

"Scanning capabilities should be added for the dark web."
"Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time."
"The main area for improvement I want to see is for the platform to become less resource-intensive. Right now, it can slow down processes on the machine, and it would be a massive improvement if it were more lightweight than it currently is."
"I'd like to see better onboarding documentation."
"While the future roadmap presented by SentinelOne appears promising, I hope the envisioned advancements are realistically achievable and that the gap between current offerings and long-term goals is not too significant."
"It would be really helpful if the solution improves its agent deployment process."
"One potential drawback is the cost of SentinelOne Singularity Cloud Security, which may be prohibitive for smaller businesses or startups, particularly those in regions with lower average incomes, such as India."
"I find the platform somewhat clunky at times, and SentinelOne Singularity Cloud Security does not always give me accurate data, which could also be due to fine tuning on our end."
"One of the areas that this solution can be improved is in Behavioural monitoring."
"There is room for improvement in the pricing model."
"Its vulnerability assessment is not the best. We cannot identify the vulnerabilities that are related to the operating system by using McAfee Cloud Workload Security. I wish McAfee would add a vulnerability assessment tool that will not only identify the vulnerability but will also be able to generate a report so that the required patching can be done for the servers. Currently, McAfee Cloud Workload Security only integrates with AWS and Azure. If it can also integrate with GCP, Alibaba, and other cloud services available in the market, it would be good because not all people are using Azure and AWS."
 

Pricing and Cost Advice

"It is cost-effective compared to other solutions in the market."
"The features included in PingSafe justify its price point."
"It is not that expensive. There are some tools that are double the cost of PingSafe. It is good on the pricing side."
"It is a little expensive. I would rate it a four out of ten for pricing."
"I wasn't sure what to expect from the pricing, but I was pleasantly surprised to find that it was a little less than I thought."
"It's not cheap, but it is worth the price."
"The pricing is somewhat high compared to other market tools."
"Singularity Cloud Workload Security's pricing is good."
Information not available
"It is not an expensive product. I am in the Indian market, and it is one of the most reliable and cost-effective solutions."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
881,515 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
10%
Government
6%
No data available
Comms Service Provider
19%
Government
11%
Computer Software Company
8%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business48
Midsize Enterprise22
Large Enterprise54
No data available
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
Regarding the pricing for SentinelOne Singularity Cloud Security, I do not think it is something I can compare.
What needs improvement with PingSafe?
Regarding the downsides of cloud security, I do not have much negative to discuss about cloud security, because it is...
Ask a question
Earn 20 points
Ask a question
Earn 20 points
 

Also Known As

PingSafe
Symantec Cloud Workload Protection for Storage
McAfee Cloud Workload Security
 

Overview

Find out what your peers are saying about Microsoft, Amazon Web Services (AWS), Wiz and others in Cloud Workload Protection Platforms (CWPP). Updated: January 2026.
881,515 professionals have used our research since 2012.