Try our new research platform with insights from 80,000+ expert users

Microsoft Defender for Cloud vs Sysdig Monitor comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 13, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
114
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (2nd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (1st)
Microsoft Defender for Cloud
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
79
Ranking in other categories
Vulnerability Management (7th), Container Management (8th), Container Security (7th), Cloud Workload Protection Platforms (CWPP) (1st), Cloud Security Posture Management (CSPM) (4th), Cloud-Native Application Protection Platforms (CNAPP) (4th), Data Security Posture Management (DSPM) (5th), Microsoft Security Suite (7th), Compliance Management (5th)
Sysdig Monitor
Average Rating
7.6
Reviews Sentiment
7.1
Number of Reviews
3
Ranking in other categories
Container Monitoring (9th)
 

Mindshare comparison

Cloud Workload Protection Platforms (CWPP) Market Share Distribution
ProductMarket Share (%)
Microsoft Defender for Cloud14.3%
Wiz16.6%
AWS GuardDuty12.8%
Other56.3%
Cloud Workload Protection Platforms (CWPP)
Container Monitoring Market Share Distribution
ProductMarket Share (%)
Sysdig Monitor1.2%
Dynatrace33.3%
Datadog26.1%
Other39.4%
Container Monitoring
 

Featured Reviews

Mike Bulyk - PeerSpot reviewer
Custom correlation searches enhance threat detection efficiency
Singularity Cloud Security significantly reduced our organization's threat detection time by providing immediate data visibility. This allows our team to analyze telemetry in real-time, query it, and identify anomalies or potential threats using the Singularity platform. We can create rules that automatically trigger alerts based on this real-time data, enabling immediate response. This instant threat detection and response capability is a major improvement over our previous reliance on multiple tools with delayed data flows. Singularity Cloud Security eliminates those delays, saving valuable time in incident response scenarios. MTTR and MTTD are critical metrics for incident response processes. They measure the time it takes to fully address an incident, from initial detection to complete remediation. Minimizing these times is crucial to limit damage, as attackers can quickly exploit vulnerabilities and compromise additional systems. Rapid detection and response are essential to disrupt attackers and prevent further progression within the attack chain. Singularity Cloud helps reduce false positives by allowing engineers direct access to data. This access enables querying, validation, and the creation of correlation searches for improved data analysis. Instead of a black box approach, Singularity provides full visibility into the code and syntax used, increasing confidence in the results. Ultimately, Singularity offers greater control over correlation searches, detection rules, and response scenarios due to the enhanced engagement and control it provides. Singularity's ability to create custom correlation searches significantly reduces noise by avoiding reliance on generic, pre-built searches that often lead to false positives in diverse organizational environments. This targeted approach results in a high positive rate and efficacy, allowing for focused detection and response. By designing and running custom searches, Singularity minimizes the need to sift through irrelevant alerts, unlike systems using default rules that inundate analysts with noise. This translates to a very low noise-to-efficacy ratio, enabling efficient and accurate incident response. Singularity Cloud offers valuable data and capabilities extending beyond security, benefiting various business units. For example, it helped troubleshoot a newly introduced service with limited telemetry. My team created custom correlation searches to track specific event types, confirming the software's functionality. This success garnered positive feedback throughout the company, reaching even the CIO and CSR, as it enabled the business to showcase the software's effectiveness in a way that was previously impossible. SentinelOne improves our regulatory compliance by fulfilling the endpoint detection and response requirements of various frameworks. Many federal regulations require businesses to meet specific security standards, including those related to endpoint, identity, and cloud security. SentinelOne enables us to meet these requirements and assure potential partners that we have a robust security posture. This strengthens our partnerships and streamlines procurement processes, demonstrating how SentinelOne contributes to our compliance efforts. SentinelOne's evidence-based reporting, particularly the CNS reports, fosters trust due to the transparency of the data source and the ability to understand the underlying mechanisms. Knowing the search criteria, data types, and information gathering process, especially when customized for detection engineering, creates confidence in the product and the relationship with SentinelOne. This transparency and customization allow users to delve into the mechanics of the reporting, understand its functionality, and ultimately trust the evidence provided. AI is a crucial consideration for security strategies. While some view AI as a potential replacement for human analysts, others see it as a powerful tool to enhance their capabilities. The latter approach emphasizes AI's ability to accelerate incident response, improve threat detection, and provide valuable insights to analysts. This perspective suggests that AI should be used to augment human expertise, enabling analysts to make faster and more informed decisions, particularly in prioritizing threats and developing a sixth sense for identifying malicious activity. By integrating AI as an enabler, organizations can empower their security teams to become more efficient and effective, ultimately strengthening their overall security posture.
Vibhor Goel - PeerSpot reviewer
A single tool for complete visibility and addressing security gaps
Currently, issues are structured in Microsoft Defender for Cloud at severity levels of high, critical, or warning, but these severity levels are not always right. For example, Microsoft might consider a port being open as critical, but that might not be the case for our company. Similarly, it might suggest closing some management ports, but you might need them to be able to log in, so the severity levels for certain things can be improved. Even though Microsoft Defender for Cloud provides a way to temporarily disable certain alerts or notifications without affecting our security score, it would be better to have more granularized control over these recommendations. Currently, we cannot even disable certain alerts or notifications. There should be an automated mechanism to design Azure policies based on the recommendations, possibly with AI integration. Instead of an engineer having to write a policy to fix security gaps, which is very time-consuming, there should be an inbuilt capability to auto-remediate everything and have proper control in place. Additionally, enabling Defender for Cloud at the resource group level, rather than only at the subscription level, would be beneficial.
Md. Olid Hasan Bhuiyan - PeerSpot reviewer
Provides a good view of the sequence and offers in-depth visibility into my infrastructure
I needed to identify the sequence and frequency of system calls for a specific system. Sysdig provided this information readily. However, analyzing frequency proved more challenging. As far as I know, Sysdig Monitor lacks functionality to directly obtain system call frequency for certain files. Therefore, I had to capture a screenshot of the relevant data from Sysdig Monitor and then manually extract the text. A built-in Sysdig feature to retrieve system call frequency for specific website actions would greatly enhance its usefulness. I had difficulty installing Sysdig Monitor on Windows.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The cloud misconfiguration feature and Offensive Security Engine, as well as their alerting process, are valuable."
"Cloud Native Security offers a valuable tool called an offensive search engine."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"The user-friendliness is the most valuable feature."
"Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful."
"The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"It is scalable, stable, and can detect any threat on a machine. It uses artificial intelligence and can lock down any virus."
"Overall, I would rate it a ten on ten for cloud security."
"Scalability is great, and I would rate it a ten out of ten."
"The most valuable features of this solution are the remote workforce capabilities and the general experience of the remote workforce."
"It's quite a good product. It helps to understand the infections and issues you are facing."
"One important security feature is the incident alerts. Now, with all these cyberattacks, there are a lot of incident alerts that get triggered. It is very difficult to keep monitoring everything automatically, instead our organization is utilizing the automated use case that we get from Microsoft. That has helped bring down the manual work for a lot of things."
"The solution's robust security posture is the most valuable feature."
"The vulnerability reporting is helpful. When we initially deployed Defender, it reported many more threats than we currently see. It gave us insight into areas we had not previously considered, so we knew where we needed to act."
"I would rate Microsoft Defender for Cloud a ten out of ten."
"I would rate Microsoft Defender for Cloud a nine out of 10."
"Docker containers are completely supported, kind of like "first class citizens"."
"Sysdig Monitor impressed me with its in-depth visibility into my infrastructure."
"The ability to stop/pause and capture logs when something happens is the most valuable feature."
 

Cons

"SentinelOne Singularity Cloud Security filtering has some areas that cause problems, and to achieve single sign-on functionality, a break-glass feature, which is currently unavailable, is necessary."
"SentinelOne Singularity Cloud Security's current documentation could be improved to better assist customers during the cluster onboarding process."
"There's room for improvement in the graphic explorer."
"The categorization of the results from the vulnerability assessment could be improved."
"The application module focuses on the different codes and libraries that can be run on the machines. It is very important for Singularity EDR to detect what type of codes and what type of libraries can run in the machine. If they can implement a white list or a black list of codes or libraries that can be used in the machine, it would be very helpful. They can focus more on the application module."
"While SentinelOne Singularity Cloud Security offers robust protection, its cost could be a barrier for some users."
"Bugs need to be disclosed quickly."
"The integration with Oracle has room for improvement."
"I would like to see more connectors and plugins with other platforms."
"Customer service and support from Microsoft are very poor. Even for high-severity cases, response or resolution time can extend to three or four weeks."
"Microsoft Defender could be more centralized. For example, I still need to go to another console to do policy management."
"The product must improve its UI."
"Microsoft has much room for improvement regarding the support for Microsoft Defender for Cloud. Their competitors are much better regarding support."
"An area where Microsoft Defender for Cloud could be improved is in getting away from having multiple menus that do the same thing, which seems imposing when looking at it."
"Features like code scanning and pipeline scanning are not included in the solution."
"I felt that there was disconnection in terms of understanding the UI. The communication for moving from the old UI to the new UI could be improved. It was a bit awkward."
"It is needs to automate the actions to take when an alert is triggered."
"I had difficulty installing Sysdig Monitor on Windows."
""Events" reporting (errors, crashes, etc.) is not clear at all in a Mesos environment (i.e., it's not clear what specific container is the one that went down). In a Docker Compose environment, it may be way better."
 

Pricing and Cost Advice

"It is cheap."
"It's not expensive. The product is in its initial growth stages and appears more competitive compared to others. It comes in different variants, and I believe the enterprise version costs around $55 per user per year. I would rate it a five, somewhere fairly moderate."
"SentinelOne Singularity Cloud Security is costly."
"While I'm slightly out of touch with pricing, I know SentinelOne is much cheaper than other products."
"The pricing tends to be high."
"The licensing is easy to understand and implement, with some flexibility to accommodate dynamic environments."
"While SentinelOne Singularity Cloud Security offers robust protection, its high cost may be prohibitive for small and medium-sized businesses."
"I would rate the cost a seven out of ten with ten being the most costly."
"Defender for Cloud is pretty costly for a single line. It's incredibly high to pay monthly for security per server. The cost is considerable for an enterprise with 500-plus virtual machines, and the monthly bill can spike."
"There are two different plans. We're using the secure basic plan, but we have used the end security plan as well. There are additional costs, but it gives us more functionalities compared to the basic plan."
"Its pricing is a little bit high in terms of Azure Security Center, but the good thing is that we don't need to maintain and deploy it. So, while the pricing is high, it is native to Azure which is why we prefer using this tool."
"I am not involved in this area. However, I believe its price is okay because even small customers are using Azure Security Center. I don't think it is very expensive."
"There is a helpful cost-reducing option that allows you to integrate production subscriptions with non-production subscriptions."
"It has global licensing. It comes with multiple licenses since there are around 50,000 people (in our organization) who look at it."
"The licensing cost per server is $15 per month."
"We are using the free version of the Azure Security Center."
"Sysdig Monitor is not expensive."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
867,445 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
9%
Government
6%
Financial Services Firm
13%
Computer Software Company
13%
Manufacturing Company
9%
Government
7%
Financial Services Firm
14%
Computer Software Company
13%
Outsourcing Company
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business43
Midsize Enterprise21
Large Enterprise53
By reviewers
Company SizeCount
Small Business26
Midsize Enterprise8
Large Enterprise44
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is wor...
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs ...
How is Prisma Cloud vs Azure Security Center for security?
Azure Security Center is very easy to use, integrates well, and gives very good visibility on what is happening acros...
What do you like most about Microsoft Defender for Cloud?
The entire Defender Suite is tightly coupled, integrated, and collaborative.
What needs improvement with Sysdig Monitor?
I needed to identify the sequence and frequency of system calls for a specific system. Sysdig provided this informati...
What is your primary use case for Sysdig Monitor?
During my undergraduate studies, I investigated how the frequency or order of actions within a specific system trigge...
 

Also Known As

PingSafe
Microsoft Azure Security Center, Azure Security Center, Microsoft ASC, Azure Defender
No data available
 

Interactive Demo

Demo not available
Demo not available
 

Overview

 

Sample Customers

Information Not Available
Microsoft Defender for Cloud is trusted by companies such as ASOS, Vatenfall, SWC Technology Partners, and more.
SAP Concur, Goldman Sachs, Worldpay by FIS, Cisco, Experian, Home Office, Societe Generale, Sunrun. More here: https://sysdig.com/customers/
Find out what your peers are saying about Microsoft Defender for Cloud vs. Sysdig Monitor and other solutions. Updated: July 2025.
867,445 professionals have used our research since 2012.