Try our new research platform with insights from 80,000+ expert users

SentinelOne Singularity Cloud Security vs Vulcan Cyber comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Zafran Security
Sponsored
Ranking in Vulnerability Management
18th
Average Rating
9.6
Reviews Sentiment
7.8
Number of Reviews
6
Ranking in other categories
Continuous Threat Exposure Management (CTEM) (3rd)
SentinelOne Singularity Clo...
Ranking in Vulnerability Management
4th
Average Rating
8.6
Reviews Sentiment
7.7
Number of Reviews
116
Ranking in other categories
Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd), AI Software Development (1st), AI Observability (2nd)
Vulcan Cyber
Ranking in Vulnerability Management
25th
Average Rating
7.4
Reviews Sentiment
7.1
Number of Reviews
11
Ranking in other categories
Risk-Based Vulnerability Management (9th), Cloud Security Remediation (2nd)
 

Mindshare comparison

As of January 2026, in the Vulnerability Management category, the mindshare of Zafran Security is 1.1%, up from 0.2% compared to the previous year. The mindshare of SentinelOne Singularity Cloud Security is 2.1%, up from 1.3% compared to the previous year. The mindshare of Vulcan Cyber is 0.6%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Market Share Distribution
ProductMarket Share (%)
SentinelOne Singularity Cloud Security2.1%
Zafran Security1.1%
Vulcan Cyber0.6%
Other96.2%
Vulnerability Management
 

Featured Reviews

Reviewer6233 - PeerSpot reviewer
Works at a healthcare company with 10,001+ employees
Has become an indispensable tool in our cybersecurity arsenal
While Zafran Security is already a powerful tool, there are areas where it could be further improved to provide even greater value. One key area for enhancement is the searching capabilities within its vulnerabilities module. By incorporating the ability to create Boolean searches, users would gain the ability to apply more complex filters and customize their search criteria. This would greatly enhance the precision and efficiency with which security teams can identify and prioritize vulnerabilities. Having such tailored search capabilities would save time and resources by narrowing down vast lists of vulnerabilities to those that meet specific parameters relevant to our unique risk environment. Additionally, integrating more robust reporting and visualization tools would be advantageous. Enhanced dashboards that offer customizable visual representations of risk configurations and threat landscapes would facilitate better communication with stakeholders, making it easier to explain vulnerabilities and the rationale behind certain security measures. This would also aid in demonstrating the improvements and value derived from existing security investments to leadership and non-technical team members.
SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.
reviewer2649297 - PeerSpot reviewer
Technical Architect at a manufacturing company with 10,001+ employees
Streamlines prioritization but reporting needs enhancement
There are several areas needing improvement. The product helps, but the reporting relies heavily on Power BI. It is limited to graphical views and requires additional filtering, posing operational challenges. The inability to download specific asset details directly from the Power BI portal is a drawback, particularly for non-technical users, though it provides high-level executive summaries. The reporting model should be enhanced so that we have the flexibility to download. We have requested a few features, and they are open to accepting those requests. It needs ITSM improvements. It has out-of-the-box integration with ServiceNow, but the customer is using BMC Helix ITSM. We would like an integration with BMC Helix ITSM. When uploading CSV files without an out-of-the-box connector, duplicate entries for assets occur. We have already reported this to them, but we are not sure when they will fix it. It will significantly benefit if we can directly upload business context information from CMDB without manual merging efforts. It can also have automatic remediation capabilities through SCCM or something else.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Zafran has become an indispensable tool in our cybersecurity arsenal."
"We saw benefits from Zafran Security almost immediately after deploying it."
"With Zafran Security, it integrates with your security controls, allowing you to take that risk score and reduce it based on the controls in place or increase the risk based on different factors, such as if the issue is internet reachable or if there's an exploit in the wild."
"Overall, we have seen about eighty-seven percent reduction of the number of vulnerabilities that require urgency to remediate, specifically the number of criticals."
"We are able to see the real risk of a vulnerability on our environment with our security tools."
"Zafran is an excellent tool."
"It is scalable, stable, and can detect any threat on a machine. It uses artificial intelligence and can lock down any virus."
"I would definitely recommend SentinelOne Singularity Cloud Security for infrastructure security."
"I rate SentinelOne Singularity Cloud Security ten out of ten."
"The visibility SentinelOne Singularity Cloud Security provides into the Cloud environment is a valuable feature."
"Our organization is growing steadily, so our infrastructure is expanding, and we're managing more technical resources. Singularity Cloud Security helps us track our resources so that we don't get lost in the overwhelming volume of things and ensures we follow best practices. The solution gives us better visibility into our resources and enables faster resolution."
"The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue."
"SentinelOne Singularity Cloud Security is on top of protecting ephemeral workloads."
"The SentinelOne Singularity Cloud Security has substantially affected my risk posture, as it was the first tool that notified me of the public exposure of a repository by a developer, allowing me to resolve the issue within minutes."
"Vulcan Cyber is a very good tool."
"The most notable aspects include having prioritization capabilities and custom scripts."
"Vulcan Cyber offers a single pane of glass for centralizing our security data."
"The interface of Vulcan Cyber is intuitive with a lot of information about vulnerabilities, which helps in classifying and analyzing threats. We have a good view of assets and vulnerabilities. It helps to do good threat analysis because we can see exactly what the threat is and assess it accordingly."
"It has allowed us to bring together multiple sources of information from different signal sources into a single point."
"They recently upgraded their UI, which is great. It is user-friendly."
"I find the ability to consolidate information from multiple vulnerability scanners into a single source valuable."
"Out of the three solutions I've used, Vulcan Cyber is the superior option."
 

Cons

"I think the ability to have some enhanced reporting capabilities is something they can improve on, as they have good reports but we have asked for some specific reporting enhancements."
"Initially, we were somewhat concerned about the scalability of Zafran due to our large asset count and the substantial amount of information we needed to process."
"The dashboarding and reporting functionality of Zafran Security is an area that definitely could use some improvements."
"SentinelOne Singularity Cloud Security has limited legacy system support and may not fully support older operating systems or legacy environments."
"Implementing single sign-on requires a pre-class account feature, which is currently not available."
"SentinelOne Singularity Cloud Security is an excellent CSSPM tool, but the CSC CWPP features need improvement."
"Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time."
"While SentinelOne Singularity Cloud Security offers real-time response, there is room for improvement in alert accuracy."
"SentinelOne Singularity Cloud Security can improve by eliminating 100 percent of the false positives."
"It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background."
"SentinelOne Singularity Cloud Security can be improved by developing a comprehensive set of features that allow for automated workflows."
"Initially, when onboarding Vulcan Cyber, the setup and configuration was more complex than expected with a user-friendly approach. This aspect can be enhanced."
"The fact that we cannot use it for our reporting leads me to rate it three out of ten."
"Improvements are needed in providing more concise details on how to apply remedies for particular vulnerabilities. I would like to have more information about the remedies for particular vulnerabilities so that we do not have to go through the CVE numbers and relevant pages to check for a particular vulnerability and its remedy."
"It would be extremely helpful to have a community group around the product."
"I would rate the tool between six and seven because there have been instances when the tool was down, and I couldn't access Cyber reports. Additionally, the Vulcan Cyber team made changes to the tool and did not notify us."
"The product helps, but the reporting relies heavily on Power BI. It is limited to graphical views and requires additional filtering, posing operational challenges."
"An important area is performance and speed, as Vulcan Cyber often lacks speed when exporting reports."
"Mainly, what I would like from them is more maintenance of the different connectors they have in the platform."
 

Pricing and Cost Advice

Information not available
"PingSafe falls within the typical price range for cloud security platforms."
"PingSafe is not very expensive compared to Prisma Cloud, but it's also not that cheap. However, because of its features, it makes sense to us as a company. It's fairly priced."
"Singularity Cloud Workload Security's licensing and price were cheaper than the other solutions we looked at."
"The pricing is somewhat high compared to other market tools."
"It is not that expensive. There are some tools that are double the cost of PingSafe. It is good on the pricing side."
"It's not expensive. The product is in its initial growth stages and appears more competitive compared to others. It comes in different variants, and I believe the enterprise version costs around $55 per user per year. I would rate it a five, somewhere fairly moderate."
"Singularity Cloud Workload Security's pricing is good."
"The pricing tends to be high."
"Our leadership knows better about the pricing. As per my knowledge, which might not be accurate, its price can come down."
"Its pricing is quite fair compared to what is out there in the market, especially compared to the tool from Microsoft. It is a SaaS platform that has an annual cost, so it is something that is already used by many companies. It is quite affordable."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
880,490 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Manufacturing Company
8%
Computer Software Company
7%
Outsourcing Company
6%
Financial Services Firm
14%
Computer Software Company
12%
Manufacturing Company
10%
Government
6%
Computer Software Company
27%
Manufacturing Company
9%
Financial Services Firm
8%
Retailer
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business48
Midsize Enterprise20
Large Enterprise54
By reviewers
Company SizeCount
Small Business1
Large Enterprise10
 

Questions from the Community

What is your experience regarding pricing and costs for Zafran Security?
Since we stood Zafran Security up in our private cloud, we handle the maintenance on our side. As we opted not to use...
What needs improvement with Zafran Security?
In terms of areas for improvement, Zafran Security is doing a really great job as a new and emerging company. Oftenti...
What is your primary use case for Zafran Security?
My use cases for Zafran Security revolve around two primary areas. One is around vulnerability management and priorit...
What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I think the pricing of SentinelOne Singularity Cloud Security is a bit high.
What needs improvement with PingSafe?
We did not try to use the threat investigations feature from SentinelOne Singularity Cloud Security.Drift detection w...
What is your experience regarding pricing and costs for Vulcan Cyber?
I don't deal with the pricing of the solution. I'm not a part of that department.
What needs improvement with Vulcan Cyber?
One area for improvement is clarity in the results column of vulnerability reports. Currently, the path where the vul...
What is your primary use case for Vulcan Cyber?
I have been using the solution for more than six months. Essentially, any reporting I do for our internal Internet as...
 

Also Known As

No data available
PingSafe
No data available
 

Interactive Demo

Demo not available
Demo not available
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
Stitch Fix, Mandiant, Wealthsimple, Entrust, Anaplan, Deloitte, Origami Risk, Verana Health
Find out what your peers are saying about SentinelOne Singularity Cloud Security vs. Vulcan Cyber and other solutions. Updated: December 2025.
880,490 professionals have used our research since 2012.