Skyhigh Security and Microsoft Defender for Cloud compete in the cloud security space. Microsoft Defender for Cloud seems to have the upper hand due to its seamless integration with other Microsoft solutions and its comprehensive security insights.
Features: Skyhigh Security provides robust shadow IT identification, encryption, and DLP integration, giving users comprehensive cloud service visibility and control. It also offers risk management tools and user analytics. Microsoft Defender for Cloud stands out with integration with Azure, strong threat protection, detailed reporting capabilities, and regulatory compliance management, offering users a thorough understanding of their security posture.
Room for Improvement: Skyhigh Security could enhance the user interface responsiveness, speed up report generation, and increase customization options. Better platform integration and simplified custom attribute setting would also improve user experience. Microsoft Defender for Cloud could benefit from improvements in log space management, pricing transparency, and reducing false positives. Broader third-party integration and a more consistent user interface would enhance the overall experience.
Ease of Deployment and Customer Service: Skyhigh Security supports various environments, including hybrid and on-premises, but deployment complexity due to interface limitations is noted. Mixed reviews highlight challenges in reaching competent technical support. Microsoft Defender for Cloud offers more straightforward deployment within the Microsoft ecosystem and robust multi-cloud support. Its customer service is generally responsive, though some documentation improvements are needed.
Pricing and ROI: Skyhigh Security’s pricing is based on monitored user counts and API integrations, which can lead to higher costs, though its rich features are appreciated. Microsoft Defender for Cloud’s pricing is integrated with Microsoft’s cloud services, providing flexibility but can become expensive at scale. While offering free versions, costs can rise with more features and integrations. Both solutions show positive ROI, varying by deployment scale and integration needs.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
The solution has provided improvement in productivity and the time spent on issues.
Defender proactively indexes and analyzes documents, identifying potential threats even when inactive, enhancing preventative security.
Identifying potential vulnerabilities has helped us avoid costly data losses.
The biggest return on investment is the rapid improvement of security posture.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
Since security is critical, we prefer a quicker response time.
The support team was very responsive to queries.
They understand their product, but much like us, they struggle with the finer details, especially with new features.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
I would rate the scalability of PingSafe 10 out of 10.
We are using infrastructure as a code, so we do not have any scalability issues with Microsoft Defender for Cloud implementation because our cloud automatically does it.
It has multiple licenses and features, covering infrastructures from a hundred to five hundred virtual machines, without any issues.
Defender won't replace our endpoint XDR, but it will likely adapt and support any growth in the Microsoft Cloud space.
Singularity Cloud Workload Security is significantly more stable than our previous solution.
Singularity Cloud Workload Security is more stable than our previous solution.
No lag, no crashing, no downtime.
Defender's stability has been flawless for us.
Microsoft Defender for Cloud is very stable.
Microsoft sometimes changes settings or configurations without transparency.
If I had to ask for anything to make it easier, it would be signed images that are GPG signed and a public repository where we can get the bits from.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
Microsoft, in general, could significantly improve its communication and support.
It would be beneficial to streamline recommendations to avoid unnecessary alerts and to refine the severity of alerts based on specific environments or environmental attributes.
The artificial intelligence features could be expanded to allow the system to autonomously manage security issues without needing intervention from admins.
The solution has room for improvement in its DDoS protection.
Covering our 50,000 endpoints would have nearly bankrupted most security programs, even well-funded ones like ours.
I believe the enterprise version costs around $55 per user per year.
There are some tools that are double the cost of Cloud Native Security.
Every time we consider expanding usage, we carefully evaluate the necessity due to cost concerns.
We appreciate the licensing approach based on employee count rather than a big enterprise license.
Microsoft Defender for Cloud is pricey, especially for Kubernetes clusters.
Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks.
For example, we can set up an automation alert so that if a threat is detected on an endpoint, we can automatically take action on our Okta or AD environment, such as locking the account that was signed in or forcing a password reset.
This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.
The most valuable feature for me is the variety of APIs available.
This feature significantly aids in threat detection and enhances the user experience by streamlining security management.
The most valuable feature is the recommendations provided on how to improve security.
The cloud security features are the most valuable.
Product | Market Share (%) |
---|---|
Microsoft Defender for Cloud | 14.3% |
Wiz | 16.6% |
AWS GuardDuty | 12.8% |
Other | 56.3% |
Product | Market Share (%) |
---|---|
Skyhigh Security | 1.8% |
Prisma Access by Palo Alto Networks | 15.5% |
Netskope | 12.3% |
Other | 70.4% |
Company Size | Count |
---|---|
Small Business | 44 |
Midsize Enterprise | 21 |
Large Enterprise | 53 |
Company Size | Count |
---|---|
Small Business | 26 |
Midsize Enterprise | 8 |
Large Enterprise | 44 |
Company Size | Count |
---|---|
Small Business | 29 |
Midsize Enterprise | 4 |
Large Enterprise | 38 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Microsoft Defender for Cloud is a comprehensive security solution that provides advanced threat protection for cloud workloads. It offers real-time visibility into the security posture of cloud environments, enabling organizations to quickly identify and respond to potential threats. With its advanced machine learning capabilities, Microsoft Defender for Cloud can detect and block sophisticated attacks, including zero-day exploits and fileless malware.
The solution also provides automated remediation capabilities, allowing security teams to quickly and easily respond to security incidents. With Microsoft Defender for Cloud, organizations can ensure the security and compliance of their cloud workloads, while reducing the burden on their security teams.
Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Skyhigh’s Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks.
The Skyhigh Security Service Edge portfolio includes Skyhigh Secure Web Gateway, Skyhigh Cloud Access Security Broker, Skyhigh Private Access, and Skyhigh Cloud Native Application Protection Platform. All solutions form a fully converged, consolidated platform, and are managed from the same single console.
Skyhigh Security Benefits
Skyhigh Security Features
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.