Try our new research platform with insights from 80,000+ expert users

Red Hat Advanced Cluster Security for Kubernetes vs SentinelOne Singularity Cloud Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Red Hat Advanced Cluster Se...
Ranking in Container Security
21st
Average Rating
8.2
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
SentinelOne Singularity Clo...
Ranking in Container Security
3rd
Average Rating
8.6
Reviews Sentiment
7.7
Number of Reviews
116
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd), AI Software Development (1st), AI Observability (2nd)
 

Mindshare comparison

As of January 2026, in the Container Security category, the mindshare of Red Hat Advanced Cluster Security for Kubernetes is 2.1%, down from 2.2% compared to the previous year. The mindshare of SentinelOne Singularity Cloud Security is 3.5%, up from 1.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security Market Share Distribution
ProductMarket Share (%)
SentinelOne Singularity Cloud Security3.5%
Red Hat Advanced Cluster Security for Kubernetes2.1%
Other94.4%
Container Security
 

Featured Reviews

Daniel Stevens - PeerSpot reviewer
Software Engineer at Galley
Offers easy management and container connection with HTTPS, but the support needs to improve
I have experience with the solution's setup in Rio de Janeiro, Brazil and our company has assisted in the development of a cluster in a research department, but we didn't start from scratch because we have IT professionals who have installed Kubernetes across 12 nodes of a cluster and a new environment can be created for a new platform. I also had another setup experience of Red Hat Advanced Cluster Security for Kubernetes in Portugal where I had to implement the solution in a cluster of 22 computer servers, which was completed with assistance from the IT department of the company. The initial setup process of the solution can be considered as difficult. The setup process involves using the permissions, subnets and range of IPs, which makes it complex. Deploying Red Hat Advanced Cluster Security for Kubernetes takes around eight to ten hours for new clusters. The solution's deployment can be divided into three parts. The first part involves OpenStack, where the cluster's resources need to be identified. The second part involves virtualizing assets and identifying other physical assets, for which OpenStack, Kubernetes, or OpenShift are used. The third part of the deployment involves dividing the networks into subnetworks and implementing automation to deploy the microservices using Helm. The number of professionals required for the solution's deployment depends upon the presence of automated scripts. Ideally, two or three professionals are required to set up Red Hat Advanced Cluster Security for Kubernetes.
SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Segmentation is the most powerful feature."
"The most beneficial security feature of the product revolves around the areas of vulnerability and configuration."
"The most valuable feature is the ability to share resources."
"I like virtualization and all those tools that come with OpenShift. I also like Advanced Cluster Management and the built-in security."
"One of the most valuable features I found was the ability of this solution to map the network and show you the communication between your containers and your different nodes."
"The benefit of working with the solution is the fact that it's very straightforward...It is a perfectly stable product since the details are very accurate."
"Scalability-wise, I rate the solution a nine out of ten."
"Offers easy management with authentication and authorization features"
"Its performance impact on the systems is low, which means there is a minimal impact on system performance compared to traditional antivirus solutions."
"It is advantageous in terms of time-saving and cost reduction."
"SentinelOne Singularity Cloud Security has saved up to 50 percent in engineering time."
"SentinelOne Singularity Cloud Security is on top of protecting ephemeral workloads."
"SentinelOne stands out with its responsiveness to feature requests for Singularity Cloud Security."
"It is fairly simple. Anybody can use it."
"Cloud Native Security is a tool that has good monitoring features."
"The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue."
 

Cons

"They're trying to convert it to the platform as a source. They are moving in the direction of Cloud Foundry so it can be easier for a developer to deploy it."
"The initial setup is pretty complex. There's a learning curve, and its cost varies across different environments. It's difficult."
"The solution lacks features when compared to some of the competitors such as Prisma Cloud by Palo Alto Networks and has room for improvement."
"The support and specifications need to be up to date for the cluster technologies"
"I do see that some features associated with the IAST part are not included in the tool, making it an area where improvements are required."
"The deprecation of APIs is a concern since the deprecation of APIs will cause issues for us every time we upgrade."
"The solution's price could be better."
"The documentation about Red Hat Advanced Cluster Security available online is very limited... So it's very limited to the documentation."
"It took us a while to configure the software to work well in this type of environment, as the support documents were not always clear."
"The could improve their mean time to detect."
"I request that SentinelOne investigate this false positive, as SentinelOne has a higher false positive rate than other XDR solutions."
"One area that could be improved in SentinelOne Singularity Cloud Security is their policies; the way they have configured the policies could be enhanced."
"While SentinelOne Singularity Cloud Security offers real-time response, there is room for improvement in alert accuracy."
"The documentation could be better."
"There is scope for more application security posture management features. Additionally, the runtime protection needs attention."
"While it is good, I think the solution's console could be improved."
 

Pricing and Cost Advice

"Red Hat offers two pricing options for their solution: a separate price, and a bundled price under the OpenShift Platform Plus."
"The pricing model is moderate, meaning it is not very expensive."
"It's a costly solution"
"We purchase a yearly basis license for the solution."
"The price of Red Hat Advanced Cluster Security for Kubernetes is better than Palo Alto Prisma."
"While SentinelOne Singularity Cloud Security offers robust protection, its high cost may be prohibitive for small and medium-sized businesses."
"PingSafe's primary advantage is its ability to consolidate multiple tools into a single user interface, but, beyond this convenience, it may not offer significant additional benefits to justify its price."
"The pricing tends to be high."
"I would rate the cost a seven out of ten with ten being the most costly."
"It's a fair price for what you get. We are happy with the price as it stands."
"Their pricing appears to be based simply on the number of accounts we have, which is common for cloud-based products."
"PingSafe falls within the typical price range for cloud security platforms."
"The price depends on the extension of the solution that you want to buy. If you want to buy just EDR, the price is less. XDR is a little bit more expensive. There are going to be different add-ons for Singularity."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
881,078 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
28%
Computer Software Company
10%
Government
9%
Manufacturing Company
7%
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
10%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise2
Large Enterprise4
By reviewers
Company SizeCount
Small Business48
Midsize Enterprise20
Large Enterprise54
 

Questions from the Community

What needs improvement with Red Hat Advanced Cluster Security for Kubernetes?
From an improvement perspective, I would like to create new policies in the tool, especially if it is deployed for the prevention part, but currently, we need to do it manually. I hear that Palo Al...
What is your primary use case for Red Hat Advanced Cluster Security for Kubernetes?
I use the solution in my company for vulnerability management, configuration management, compliance, safety handling, and everything else.
What advice do you have for others considering Red Hat Advanced Cluster Security for Kubernetes?
The tool's policy management supports our company's compliance efforts since any corporate entity or enterprise must follow specific regulations, which include periodic analysis and configuration r...
What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features.
What is your experience regarding pricing and costs for PingSafe?
I think the pricing of SentinelOne Singularity Cloud Security is a bit high.
What needs improvement with PingSafe?
We did not try to use the threat investigations feature from SentinelOne Singularity Cloud Security.Drift detection with respect to infrastructure code is important. When somebody makes changes to ...
 

Also Known As

StackRox
PingSafe
 

Overview

 

Sample Customers

City National Bank, U.S. Department of Homeland Security
Information Not Available
Find out what your peers are saying about Red Hat Advanced Cluster Security for Kubernetes vs. SentinelOne Singularity Cloud Security and other solutions. Updated: December 2025.
881,078 professionals have used our research since 2012.