Try our new research platform with insights from 80,000+ expert users

Perforce Puppet vs SentinelOne Singularity Cloud Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Intune
Sponsored
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
312
Ranking in other categories
Configuration Management (2nd), Remote Access (2nd), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
Perforce Puppet
Average Rating
8.2
Reviews Sentiment
5.4
Number of Reviews
14
Ranking in other categories
Configuration Management (16th)
SentinelOne Singularity Clo...
Average Rating
8.6
Reviews Sentiment
7.6
Number of Reviews
117
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd), AI Software Development (1st), AI Observability (2nd)
 

Mindshare comparison

Configuration Management Market Share Distribution
ProductMarket Share (%)
Perforce Puppet2.9%
Red Hat Ansible Automation Platform13.5%
Microsoft Configuration Manager10.4%
Other73.2%
Configuration Management
Cloud-Native Application Protection Platforms (CNAPP) Market Share Distribution
ProductMarket Share (%)
SentinelOne Singularity Cloud Security5.3%
Wiz20.2%
Prisma Cloud by Palo Alto Networks12.8%
Other61.7%
Cloud-Native Application Protection Platforms (CNAPP)
 

Featured Reviews

AkashKamble - PeerSpot reviewer
Sr MacOS specialist engineer at Cyber24
Enables management of multiple operating systems with a single license
The best feature is that it's a Microsoft product, so if anything goes wrong, we get quick support for anything required. Remote system functionality allows us to sit anywhere and take control of any device via remote management. We can enhance security for clients' laptops with built-in Microsoft Defender, which is available with the Microsoft Intune license. We use it for reporting purposes through endpoint analytics. When pushing scripting, there are two types available: remediation script and reservation script. Through endpoint analytics, you can push defender policies to clients. It helps with reporting, inventory updates, and monitoring tenant status health.
reviewer2284542 - PeerSpot reviewer
Business Development Manager at a tech services company with 11-50 employees
Automated configuration management ensures consistent server setups
The strength of Puppet is in automated configuration management. We can configure a server once and set rules with Puppet so that future server configurations are automatic and consistent with company requests. Puppet is declarative, meaning it finds the best state for itself and corrects any deviations in the configuration.
SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I like Intune's ability to install software to a device remotely and push policy through the Azure portal."
"There are many features in Microsoft Intune. For personal mobile devices, MDM is what I most prefer."
"Our bank's most valuable Intune features are centered around the dedicated device concept."
"Microsoft Intune is a cost-saving solution, reducing IT department workload and allowing for faster device provisioning compared to traditional methods."
"I like how Intune brings everything into one place. For example, you can set up conditional access to applications and devices inside Intune. I also like the segregation inside the Intune devices. You can segregate them by Windows, iOS, iPadOS, macOS, and Android. You can sort it by platform, so you don't need to go into the devices section."
"It has a useful device management feature."
"The most valuable feature of Microsoft Intune is that it is more of a one-stop shop, providing an easier experience."
"Conditional access has helped us tailor and enforce our security policies in the mobile space."
"The main purpose for this automation tool would be: deploying, controlling, ordering change for the system and IT Infrastructure."
"I rate the stability of Puppet as ten out of ten."
"Puppet3 and 4 series provides optimum deployment solutions for infrastructure and applications."
"The versatility is great."
"The most valuable features are the agent, high load balancing, and overall robustness and features."
"Puppet Enterprise has reduced the time of production changes or environment changes."
"Puppet Enterprise has good functionalities."
"The agent-based feature helps me by being stable."
"Our organization is growing steadily, so our infrastructure is expanding, and we're managing more technical resources. Singularity Cloud Security helps us track our resources so that we don't get lost in the overwhelming volume of things and ensures we follow best practices. The solution gives us better visibility into our resources and enables faster resolution."
"The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."
"It's positively affected the communication between cloud security, application developers, and AppSec teams."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"Singularity Cloud Security's most valuable features are its ease of scalability and comprehensive security measures."
"Overall, I would rate it a ten on ten for cloud security."
"The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well."
"Cloud Native Security's evidence-based reporting allows us to prioritize issues by understanding their impact, helping us resolve the most important problems first."
 

Cons

"We've faced significant pushback with Copilot as our clients aren't seeing a favorable cost-benefit analysis."
"It should be easier to define policies and comply with those policies."
"I switched away from Microsoft Intune because it cannot manage the MacBook very well."
"It doesn't economize when you scale up. We have over 14,000 employees, and we have between 7,500 and 8,000 city-owned or personal devices being used to conduct city business. Its price can be improved. It is not a cheap solution."
"In future releases, I would like to see better integration with Apple products."
"The technical support could be improved."
"Microsoft Intune lacks the ability to provide seamless remote assistance or remote control."
"Unfortunately, Intune’s management extension does not provide the same level of logging, and I lack the visibility in Intune that I had with SCCM."
"It's a bit of a pain point to make sure that everything works once we've upgraded it because Puppet has been evolving pretty fast."
"At the beginning the initial setup was kind of complex."
"The solution has really complex code, you have to understand the Ruby language. However, once you know the code then you can move ahead without any problems."
"We would like Puppet to add more integration for applications."
"There's a lot of scope for enhancement on the DevSecOps side. They should definitely include features for compliance, for both the Linux and Windows side of the devices, as well as for network devices. Compliance is something they need to work on."
"Puppet Enterprise is more complex and difficult to configure."
"Puppet Enterprise should improve the general extensibility for places where they can't install it."
"Clients with less technical expertise may find Puppet complex to configure. Our team may struggle if technical team members leave the organization, leaving others uncertain about using the tool."
"While the future roadmap presented by SentinelOne appears promising, I hope the envisioned advancements are realistically achievable and that the gap between current offerings and long-term goals is not too significant."
"The reporting works well, but sometimes the severity classifications are inaccurate. Sometimes, it flags an issue as high-impact, but it should be a lower severity."
"To enhance the notification system's efficiency, resolved issues should be promptly removed from the portal."
"Whenever I view the processes and the process aspect, it takes a long time to load."
"The cloud-based operations might pose challenges in areas with limited or unavailable internet connectivity."
"In version 2, a lot of rules have been deployed for Kubernetes security and CDR, which makes a lot of issues of critical severity, whereas they are not critical or of high severity. There is a mismatch of severities. They need to work on severity management."
"The application module focuses on the different codes and libraries that can be run on the machines. It is very important for Singularity EDR to detect what type of codes and what type of libraries can run in the machine. If they can implement a white list or a black list of codes or libraries that can be used in the machine, it would be very helpful. They can focus more on the application module."
"I believe the UI/UX updates for SentinelOne Singularity Cloud Security have room for improvement."
 

Pricing and Cost Advice

"Intune is available as an individual product, but it also comes with Office 365 Premium or an Enterprise license, and the price varies for each version."
"Microsoft's licensing is more flexible and adaptive than its competitors."
"The pricing for Microsoft Intune is reasonable. Our clients are satisfied."
"Its price is in the medium range. It is acceptable because you're paying for the features. I am not aware of any additional costs."
"The cost of the license and the features are justified for myself as a technical person."
"We don't pay for Intune because it is bundled with the premium subscription to Office 365. It includes Intune and Defender. I don't have to buy two extra products to manage my enterprise."
"Cost is not my department, but the product is included in the E5 license that we already pay for every user, so no additional cost is incurred."
"The cost is somewhat on the higher side, particularly when considering certain price points, especially in markets like India."
"Puppet Enterprise’s pricing is competitive."
"Puppet Enterprise can be an expensive solution for smaller businesses."
"Depending on the size of the organization there is a point when the price of Puppet Enterprise should be lower. However, they provide really good functionality, features, and capabilities."
"The main thing that we noticed when we switched from the enterprise version to the community version was the difference in cost — the infrastructure is pretty expensive."
"It's a fair price for what you get. We are happy with the price as it stands."
"The tool is cost-effective."
"SentinelOne is quite costly compared to other security platforms."
"PingSafe's primary advantage is its ability to consolidate multiple tools into a single user interface, but, beyond this convenience, it may not offer significant additional benefits to justify its price."
"Its pricing was a little less than other providers."
"The features included in PingSafe justify its price point."
"PingSafe is priced reasonably for our workload."
"PingSafe is less expensive than other options."
report
Use our free recommendation engine to learn which Configuration Management solutions are best for your needs.
881,227 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
10%
Financial Services Firm
10%
Manufacturing Company
10%
Government
8%
Comms Service Provider
12%
Financial Services Firm
10%
Outsourcing Company
8%
Educational Organization
6%
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
10%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business121
Midsize Enterprise47
Large Enterprise154
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise1
Large Enterprise4
By reviewers
Company SizeCount
Small Business48
Midsize Enterprise21
Large Enterprise54
 

Questions from the Community

How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also ...
What is your experience regarding pricing and costs for Puppet Enterprise?
Regarding the cost, I find it expensive, always. I don't know how much the license would cost per year or per user ap...
What needs improvement with Puppet Enterprise?
I don't know what could be improved in Perforce Puppet to make this tool better for the next release. I can't think o...
What is your primary use case for Puppet Enterprise?
My main use case for Perforce Puppet is for configuration management.
What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I think the pricing of SentinelOne Singularity Cloud Security is a bit high.
What needs improvement with PingSafe?
We did not try to use the threat investigations feature from SentinelOne Singularity Cloud Security.Drift detection w...
 

Also Known As

Intune, MS Intune, Microsoft Endpoint Manager
Puppet
PingSafe
 

Overview

 

Sample Customers

Mitchells and Buzzers, Callaway
Los Alamos National Laboratory, GitHub, IP Commerce, Cedexis, Spiceworks, Server Density, Swisstopo, Chockstone, Constant Contact, NICS, Citrix
Information Not Available
Find out what your peers are saying about Red Hat, Microsoft, Amazon Web Services (AWS) and others in Configuration Management. Updated: December 2025.
881,227 professionals have used our research since 2012.