We performed a comparison between Singularity Cloud Security by SentinelOne and Tufin Orchestration Suite based on real PeerSpot user reviews.
Find out in this report how the two Container Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"The most valuable feature of PingSafe is its integration with most of our technology stack, specifically all of our cloud platforms and ticketing software."
"PingSafe offers three key features: vulnerability management notifications, cloud configuration assistance, and security scanning."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"PingSafe has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment."
"It is very straightforward. It is not complicated. For the information that it provides, it does a pretty good job."
"We've scaled it to hundreds of firewalls."
"They have very good responses regarding integration and internalization with open tickets."
"It is extremely scalable. It really addresses the scale of a company's firewall footprint."
"The automation piece is the most valuable feature: having SecureChange make the change on the firewalls, instead of my having to go manually make the changes on the vendor product."
"SecureChange is the most interesting part. It all comes down to having the user request firewall access and SecureChange, based on workflows, takes care of it, sending two or three emails to the business approvers. With one click, you can automate a firewall rule."
"Its ability to detect changes within our firewall."
"There are a lot of benefits to using the reporting. It gives us duplicate objects, duplicate services, shadow firewall rules, and the firewall rules not needed for a given number of days or months."
"The Automatic Policy Generator saves time because we are able to identify the required policy when a client doesn't know what he needs."
"It took us a while to configure the software to work well in this type of environment, as the support documents were not always clear."
"Whenever I view the processes and the process aspect, it takes a long time to load."
"It would be really helpful if the solution improves its agent deployment process."
"They need more experienced support personnel."
"Bugs need to be disclosed quickly."
"I would like additional integrations."
"We use PingSafe and also SentinelOne. If PingSafe integrated some of the endpoint security features of SentinelOne, it would be the perfect one-stop solution for everything. We wouldn't need to switch between the products. At my organization, I am responsible for endpoint security and vulnerability management. Integrating both functions into one application would be ideal because I could see all the alerts, heat maps, and reports in one console."
"Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time."
"For me, there are two things that can make Tufin a bit better... [It needs] a better focus on automation - automating a lot of the processes; and automating rule re-certification, or at least finding a way to simplify it."
"I would like to see them get rid of the REST APIs and use something more modern."
"There was some complexity during the initial setup"
"I would like to see more configuration options on next-generation firewalls, defining possible standards for devices."
"At least in our environment, the dynamic learning of the topology needs improvement."
"When it comes to web services, in my experience, Tomcat has always gone down; after a certain amount of load it breaks down and we have to get things restored again."
"They've got such a large number of APIs, and it is so easy to use their APIs. Effectively, they allow us to use it with anything. The only way to improve it more is by offering support for implementing their APIs into certain hardware or software that we might use. They can provide support for implementing APIs."
"I would like to simplify the reports, and maybe have another view besides the charts. Possibly they could be more graphical."
More Singularity Cloud Security by SentinelOne Pricing and Cost Advice →
Singularity Cloud Security by SentinelOne is ranked 6th in Container Security with 67 reviews while Tufin Orchestration Suite is ranked 22nd in Container Security with 180 reviews. Singularity Cloud Security by SentinelOne is rated 8.6, while Tufin Orchestration Suite is rated 8.0. The top reviewer of Singularity Cloud Security by SentinelOne writes "Provides excellent workload telemetry, hunting capabilities, and deep visibility ". On the other hand, the top reviewer of Tufin Orchestration Suite writes "A flexible, very secure solution that works well in Layer 2 environments". Singularity Cloud Security by SentinelOne is most compared with Prisma Cloud by Palo Alto Networks, Wiz, Orca Security, AWS GuardDuty and Qualys VMDR, whereas Tufin Orchestration Suite is most compared with AlgoSec, FireMon Security Manager, Skybox Security Suite, Palo Alto Networks Panorama and ManageEngine Firewall Analyzer. See our Singularity Cloud Security by SentinelOne vs. Tufin Orchestration Suite report.
See our list of best Container Security vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.