Try our new research platform with insights from 80,000+ expert users

Perforce Puppet vs SentinelOne Singularity Cloud Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Intune
Sponsored
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
301
Ranking in other categories
Configuration Management (2nd), Remote Access (1st), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
Perforce Puppet
Average Rating
8.2
Reviews Sentiment
5.4
Number of Reviews
14
Ranking in other categories
Configuration Management (15th)
SentinelOne Singularity Clo...
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
114
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (2nd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (1st)
 

Mindshare comparison

Configuration Management Market Share Distribution
ProductMarket Share (%)
Perforce Puppet1.7%
Red Hat Ansible Automation Platform16.1%
Microsoft Configuration Manager11.5%
Other70.7%
Configuration Management
Cloud-Native Application Protection Platforms (CNAPP) Market Share Distribution
ProductMarket Share (%)
SentinelOne Singularity Cloud Security4.5%
Wiz23.8%
Prisma Cloud by Palo Alto Networks14.5%
Other57.2%
Cloud-Native Application Protection Platforms (CNAPP)
 

Featured Reviews

AkashKamble - PeerSpot reviewer
Enables management of multiple operating systems with a single license
The best feature is that it's a Microsoft product, so if anything goes wrong, we get quick support for anything required. Remote system functionality allows us to sit anywhere and take control of any device via remote management. We can enhance security for clients' laptops with built-in Microsoft Defender, which is available with the Microsoft Intune license. We use it for reporting purposes through endpoint analytics. When pushing scripting, there are two types available: remediation script and reservation script. Through endpoint analytics, you can push defender policies to clients. It helps with reporting, inventory updates, and monitoring tenant status health.
Erik  Ableson - PeerSpot reviewer
A stable solution that is more suited for larger companies with mature CI/CD structures and image management processes
Puppet Enterprise is more suitable for clients working up much more structured deployment images they manage internally. Before choosing Puppet Enterprise, users should think seriously about what they're trying to accomplish and ensure they put the right pieces in place. Overall, I rate Puppet Enterprise an eight out of ten.
Mike Bulyk - PeerSpot reviewer
Custom correlation searches enhance threat detection efficiency
Singularity Cloud Security significantly reduced our organization's threat detection time by providing immediate data visibility. This allows our team to analyze telemetry in real-time, query it, and identify anomalies or potential threats using the Singularity platform. We can create rules that automatically trigger alerts based on this real-time data, enabling immediate response. This instant threat detection and response capability is a major improvement over our previous reliance on multiple tools with delayed data flows. Singularity Cloud Security eliminates those delays, saving valuable time in incident response scenarios. MTTR and MTTD are critical metrics for incident response processes. They measure the time it takes to fully address an incident, from initial detection to complete remediation. Minimizing these times is crucial to limit damage, as attackers can quickly exploit vulnerabilities and compromise additional systems. Rapid detection and response are essential to disrupt attackers and prevent further progression within the attack chain. Singularity Cloud helps reduce false positives by allowing engineers direct access to data. This access enables querying, validation, and the creation of correlation searches for improved data analysis. Instead of a black box approach, Singularity provides full visibility into the code and syntax used, increasing confidence in the results. Ultimately, Singularity offers greater control over correlation searches, detection rules, and response scenarios due to the enhanced engagement and control it provides. Singularity's ability to create custom correlation searches significantly reduces noise by avoiding reliance on generic, pre-built searches that often lead to false positives in diverse organizational environments. This targeted approach results in a high positive rate and efficacy, allowing for focused detection and response. By designing and running custom searches, Singularity minimizes the need to sift through irrelevant alerts, unlike systems using default rules that inundate analysts with noise. This translates to a very low noise-to-efficacy ratio, enabling efficient and accurate incident response. Singularity Cloud offers valuable data and capabilities extending beyond security, benefiting various business units. For example, it helped troubleshoot a newly introduced service with limited telemetry. My team created custom correlation searches to track specific event types, confirming the software's functionality. This success garnered positive feedback throughout the company, reaching even the CIO and CSR, as it enabled the business to showcase the software's effectiveness in a way that was previously impossible. SentinelOne improves our regulatory compliance by fulfilling the endpoint detection and response requirements of various frameworks. Many federal regulations require businesses to meet specific security standards, including those related to endpoint, identity, and cloud security. SentinelOne enables us to meet these requirements and assure potential partners that we have a robust security posture. This strengthens our partnerships and streamlines procurement processes, demonstrating how SentinelOne contributes to our compliance efforts. SentinelOne's evidence-based reporting, particularly the CNS reports, fosters trust due to the transparency of the data source and the ability to understand the underlying mechanisms. Knowing the search criteria, data types, and information gathering process, especially when customized for detection engineering, creates confidence in the product and the relationship with SentinelOne. This transparency and customization allow users to delve into the mechanics of the reporting, understand its functionality, and ultimately trust the evidence provided. AI is a crucial consideration for security strategies. While some view AI as a potential replacement for human analysts, others see it as a powerful tool to enhance their capabilities. The latter approach emphasizes AI's ability to accelerate incident response, improve threat detection, and provide valuable insights to analysts. This perspective suggests that AI should be used to augment human expertise, enabling analysts to make faster and more informed decisions, particularly in prioritizing threats and developing a sixth sense for identifying malicious activity. By integrating AI as an enabler, organizations can empower their security teams to become more efficient and effective, ultimately strengthening their overall security posture.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I like how Intune deploys the policies and makes them customizable. You can deploy it through Intune and forget about it."
"The security compliance capabilities make it widely adopted across organizations."
"The main advantage is that Intune performs its intended functions effectively."
"Microsoft Intune brings all our endpoint and security management tools into one place, acting as a comprehensive solution where we can manage numerous devices and configuration profiles, and block specific URLs, among many other capabilities."
"It is a comprehensive security solution that not only controls access to enterprise resources but also tracks and prevents unauthorized access, ensuring the protection of sensitive data and preventing potential data loss scenarios."
"Easy to use."
"The ability to deploy patches and automate software deployments to end-user devices is very useful."
"Intune's most valuable features are the device, compliance, and configuration policies."
"Anything that we manage through Puppet always runs perfectly."
"Puppet Enterprise is a stable solution."
"The most valuable features are the agent, high load balancing, and overall robustness and features."
"The main purpose for this automation tool would be: deploying, controlling, ordering change for the system and IT Infrastructure."
"The agent-based feature helps me by being stable."
"Puppet3 and 4 series provides optimum deployment solutions for infrastructure and applications."
"Puppet Enterprise has good functionalities."
"I rate the stability of Puppet as ten out of ten."
"The most valuable feature of SentinelOne Singularity Cloud Security is its advanced AI and machine learning capabilities, which allow it to identify and respond to threats in real time."
"The monitoring tool has comprehensive monitoring features."
"The most valuable features are automated threat response, AI detection, and static and dynamic detection."
"The management console is highly intuitive to comprehend and operate."
"The most valuable aspects of SentinelOne Singularity Cloud Security are its alerting system and the remediation guidance it provides."
"It is very straightforward. It is not complicated. For the information that it provides, it does a pretty good job."
"As a frequently audited company, we value SentinelOne Singularity Cloud Security's compliance monitoring features. They give us a report with a compliance score for how well we meet certain regulatory standards, like HIPAA. We can show our compliance as a percentage. It's also a way to show that we are serious about security."
"SentinelOne Singularity Cloud Security offers an intuitive user interface that lets us navigate quickly and easily."
 

Cons

"One drawback of Intune is that we cannot find devices based on a user's region or location."
"We had an APNS certificate set to expire last week. We tried to renew it two days before it expired. We logged in to the APNS portal but could not find that certificate. We didn't know where it went. All the iOS devices stopped working. We contacted the Apple and Microsoft teams, and each blamed the other. This is something that Microsoft should take care of. Last week, we had so many escalations from high-profile users who couldn't access corporate data on their devices."
"In the next release, I would like a feature to be able to properly lock down the device. For example, if an attacker or somebody steals the phone, you can be sure that the pin cannot be broken."
"It would be helpful if there was proactive remediation."
"Data leak prevention can be integrated into it. Currently, it does not have data leak prevention."
"Having a dedicated configuration server that assists in modifying the configuration service, and creating personalized structures, interfaces, and web services could enhance usability."
"Intune should be much more granular in terms of supporting more Android cellular devices."
"In terms of the admin experience, it is straightforward, but the Windows enrollment experience could be improved. Sometimes, for enrollment, we have to reset devices and re-enroll them. Just configuring Windows, Azure, or Active Directory doesn't enroll the devices. We need easy enrollment for Windows."
"Puppet Enterprise should improve the general extensibility for places where they can't install it."
"There's a lot of scope for enhancement on the DevSecOps side. They should definitely include features for compliance, for both the Linux and Windows side of the devices, as well as for network devices. Compliance is something they need to work on."
"It's a bit of a pain point to make sure that everything works once we've upgraded it because Puppet has been evolving pretty fast."
"The solution has really complex code, you have to understand the Ruby language. However, once you know the code then you can move ahead without any problems."
"Clients with less technical expertise may find Puppet complex to configure. Our team may struggle if technical team members leave the organization, leaving others uncertain about using the tool."
"Puppet Enterprise is more complex and difficult to configure."
"At the beginning the initial setup was kind of complex."
"We would like Puppet to add more integration for applications."
"Once all components, including the cloud piece and container runtime piece, integrate further and incorporate an AI layer for better comprehension, it will greatly enhance the utility of Singularity Cloud Security."
"SentinelOne Singularity Cloud Security is an excellent CSPM tool, but its CWPP features need improvement, and there is scope for more application security posture management features."
"There should be more documentation about the product."
"Their search feature could be better."
"We use SentinelOne Singularity Cloud Security and also SentinelOne. If SentinelOne Singularity Cloud Security integrated some of the endpoint security features of SentinelOne, it would be the perfect one-stop solution for everything. We wouldn't need to switch between the products. At my organization, I am responsible for endpoint security and vulnerability management. Integrating both functions into one application would be ideal because I could see all the alerts, heat maps, and reports in one console."
"I personally use the SentinelOne Singularity Cloud Security daily, and I have noticed that the dashboard occasionally gets stuck, potentially due to internet issues. It could benefit from enhancements to be more robust and smoother."
"SentinelOne Singularity Cloud Security has limited legacy system support and may not fully support older operating systems or legacy environments."
"We can customize security policies but lack auditing capabilities."
 

Pricing and Cost Advice

"We work with the subscription rather than a server license. I think it's economical this way because we don't have to have a server license for that, and I think that works in our favor."
"Cost is not my department, but the product is included in the E5 license that we already pay for every user, so no additional cost is incurred."
"We use Defender ATP and E5 licenses."
"We work in the charity sector, so a lot of our clients get Microsoft Premium licenses or Business Premium for free. They get ten licenses free, and a lot of our clients do not have more than ten staff members. They are getting the tool for free, so its cost is not an issue."
"Consider the Microsoft Enterprise Mobility Suite rather than choosing specific sub-components, e.g. only Microsoft Intune."
"There are licenses required for this solution. We enable licenses on the devices we need to manage."
"I don't have any problem as far as cost is concerned. It is bundled with our license."
"Its pricing seems reasonable."
"Puppet Enterprise’s pricing is competitive."
"Puppet Enterprise can be an expensive solution for smaller businesses."
"The main thing that we noticed when we switched from the enterprise version to the community version was the difference in cost — the infrastructure is pretty expensive."
"Depending on the size of the organization there is a point when the price of Puppet Enterprise should be lower. However, they provide really good functionality, features, and capabilities."
"The features included in PingSafe justify its price point."
"While I'm slightly out of touch with pricing, I know SentinelOne is much cheaper than other products."
"SentinelOne Singularity Cloud Security is costly."
"Its pricing is constant. It has been constant over the previous year, so I am happy with it. However, price distribution can be better explained. That is the only area I am worried about. Otherwise, the pricing is very reasonable."
"Its pricing was a little less than other providers."
"PingSafe is less expensive than other options."
"It is not that expensive. There are some tools that are double the cost of PingSafe. It is good on the pricing side."
"PingSafe is affordable."
report
Use our free recommendation engine to learn which Configuration Management solutions are best for your needs.
867,370 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
9%
Manufacturing Company
9%
Government
8%
Government
13%
Financial Services Firm
13%
Comms Service Provider
10%
Computer Software Company
8%
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business116
Midsize Enterprise45
Large Enterprise151
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise1
Large Enterprise4
By reviewers
Company SizeCount
Small Business43
Midsize Enterprise21
Large Enterprise53
 

Questions from the Community

How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also ...
What is your experience regarding pricing and costs for Puppet Enterprise?
Regarding the cost, I find it expensive, always. I don't know how much the license would cost per year or per user ap...
What needs improvement with Puppet Enterprise?
I don't know what could be improved in Perforce Puppet to make this tool better for the next release. I can't think o...
What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is wor...
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs ...
 

Also Known As

Intune, MS Intune, Microsoft Endpoint Manager
Puppet
PingSafe
 

Overview

 

Sample Customers

Mitchells and Buzzers, Callaway
Los Alamos National Laboratory, GitHub, IP Commerce, Cedexis, Spiceworks, Server Density, Swisstopo, Chockstone, Constant Contact, NICS, Citrix
Information Not Available
Find out what your peers are saying about Red Hat, Microsoft, Amazon Web Services (AWS) and others in Configuration Management. Updated: September 2025.
867,370 professionals have used our research since 2012.