Try our new research platform with insights from 80,000+ expert users

SAP Access Control vs SentinelOne Singularity Cloud Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SAP Access Control
Average Rating
7.6
Reviews Sentiment
3.5
Number of Reviews
2
Ranking in other categories
Access Management (17th)
SentinelOne Singularity Clo...
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
118
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd), AI Observability (2nd)
 

Mindshare comparison

SAP Access Control and SentinelOne Singularity Cloud Security aren’t in the same category and serve different purposes. SAP Access Control is designed for Access Management and holds a mindshare of 0.8%, up 0.3% compared to last year.
SentinelOne Singularity Cloud Security, on the other hand, focuses on Cloud-Native Application Protection Platforms (CNAPP), holds 6.1% mindshare, up 3.0% since last year.
Access Management Mindshare Distribution
ProductMindshare (%)
SAP Access Control0.8%
Microsoft Entra ID15.1%
Okta Platform10.8%
Other73.3%
Access Management
Cloud-Native Application Protection Platforms (CNAPP) Mindshare Distribution
ProductMindshare (%)
SentinelOne Singularity Cloud Security6.1%
Wiz17.4%
Prisma Cloud by Palo Alto Networks12.4%
Other64.1%
Cloud-Native Application Protection Platforms (CNAPP)
 

Featured Reviews

reviewer2129061 - PeerSpot reviewer
Sap Its Workstream Manager at a energy/utilities company with 10,001+ employees
Centralized access control has improved risk detection and streamlined multi-system user provisioning
Having one tool to populate many systems for one user is one of the most beneficial aspects of the product, along with the audit part. When using Firefighter, we could have information about what a user modified or did in production because we sometimes have to use an SU01 transaction, so in that case, we use Firefighter. The main benefit for me is that it is a global system to manage the user in many systems, and also the assessment of risk with GRC. We are using Access Request to onboard people. I see some potential improvements for stability because sometimes we do not know why the approval workflow of GRC stops in the middle. When we have a look in GRC, we see that the validation is finished, but that is not the case. Sometimes, we have to check and relaunch GRC. It helps in risk detection. The benefits of SAP Access Control's user permissions management are measured through the reports in GRC. Time savings are obvious. In one request, we are able to create a user in a different system, so it is a time saving. It is a money saving as well because the access manager spends less time creating a user in a different system.
SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is an SAP product, so it integrates very well with other SAP products."
"Having one tool to populate many systems for one user is one of the most beneficial aspects of the product, along with the audit part."
"The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"SentinelOne Singularity Cloud Security offers security solutions for both Kubernetes and CI/CD pipelines."
"The most valuable features of SentinelOne Singularity Cloud Security are cloud misconfiguration, Kubernetes, and IaC scanning."
"The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well."
"Cloud Native Security offers attack path analysis."
"SentinelOne Singularity Cloud Security has improved our security posture."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"The most valuable features of SentinelOne Singularity Cloud Security are the asset inventory and issue indexing."
 

Cons

"Because it took time to get advice on a tricky issue, the support from SAP could be better."
"It would be better if we could also manage other systems with it. Currently, you have to purchase plugins for it to work with other non-SAP systems. It would be good if there is an easy way to integrate SAP Access Control with other non-SAP systems."
"We've found a lot of false positives."
"If I had to pick a complaint, it would be the way the hosts are listed in the tool. You have different columns separated by endpoint name, Cloud Account, and Cloud Instances ID. I wish there was something where we could change the endpoint name and not use just the IP address. We would like to have custom names or our own names for the instances. If I had a complaint, that would be it, but so far, it meets all the needs that we have."
"Cloud Native Security's reporting could be better. We are unable to see which images are impacted. Several thousand images have been deployed, so if we can see some application-specific information in the dashboard, we can directly send that report to the team that owns the application. We'd also like the option to download the report from the portal instead of waiting for the report to be sent to our email."
"SentinelOne Singularity Cloud Security is on the costlier side."
"The dashboard can be more detailed."
"I find the platform somewhat clunky at times, and SentinelOne Singularity Cloud Security does not always give me accurate data, which could also be due to fine tuning on our end."
"We had a glitch in SentinelOne Singularity Cloud Security where it fed us false positives in the past."
"I would like additional integrations."
 

Pricing and Cost Advice

"It is a part of our package with SAP. There is no extra cost in addition to the license."
"While I'm slightly out of touch with pricing, I know SentinelOne is much cheaper than other products."
"For pricing, it currently seems to be in line with market rates."
"It's a fair price for what you get. We are happy with the price as it stands."
"We have an enterprise license. It is affordable. I'm not sure, but I think we pay 150,000 rupees per month."
"PingSafe is cost-effective for the amount of infrastructure we have. It's reasonable for what they offer compared to our previous solution. It's at least 25 percent to 30 percent less."
"Singularity Cloud Workload Security's licensing and price were cheaper than the other solutions we looked at."
"PingSafe falls within the typical price range for cloud security platforms."
"SentinelOne offers excellent pricing and licensing options."
report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
10%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business49
Midsize Enterprise22
Large Enterprise55
 

Questions from the Community

What needs improvement with SAP Access Control?
SAP Access Control is quite complex. The complexity arises because we need a GRC specialist to set up the connection between GRC and the other system. We also spend time doing some specific configu...
What is your primary use case for SAP Access Control?
The major use case for SAP Access Control is to create an end-user account, and the second purpose is to check the Separation of Duties risk and the risk on our roles and authorizations. Having one...
What advice do you have for others considering SAP Access Control?
We do work with some other SAP products. We are using SAP Access Control with the GRC Access Control product. We are also using the module for Separation of Duties and the Firefighter module. It is...
What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features.
What is your experience regarding pricing and costs for PingSafe?
Regarding the pricing for SentinelOne Singularity Cloud Security, I do not think it is something I can compare.
What needs improvement with PingSafe?
I do not see room for improvement in SentinelOne Singularity Cloud Security. In the future, I would like to see the identity feature with two-factor authentication. It would be good if they could a...
 

Also Known As

No data available
PingSafe
 

Overview

Find out what your peers are saying about Microsoft, Okta, Cisco and others in Access Management. Updated: March 2026.
884,873 professionals have used our research since 2012.