Try our new research platform with insights from 80,000+ expert users

Sweet Security vs Varonis Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
114
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (2nd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (1st)
Sweet Security
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Vulnerability Management (74th), Cloud Workload Protection Platforms (CWPP) (30th), Cloud Security Posture Management (CSPM) (37th), Cloud-Native Application Protection Platforms (CNAPP) (27th), Identity Threat Detection and Response (ITDR) (39th), Cloud Detection and Response (CDR) (8th)
Varonis Platform
Average Rating
8.2
Reviews Sentiment
6.4
Number of Reviews
14
Ranking in other categories
Data Loss Prevention (DLP) (9th), Data Governance (4th), SaaS Security Posture Management (SSPM) (5th), Data Security Posture Management (DSPM) (3rd), Compliance Management (7th), Ransomware Protection (11th), Identity Threat Detection and Response (ITDR) (7th)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Use Sweet Security?
Share your opinion
Herman Pienaar - PeerSpot reviewer
Has valuable data alerting capabilities and efficient reporting features
The solution's classification engine is highly configurable and efficient. It provides good reporting and visualization, which is superior to previous tools like Microsoft's. The platform's data alerting capabilities and automation features for managing broken permissions are particularly notable. It offers robust automation capabilities, including global permission repair, broken access repairs, and data transport engine features for archiving and migration. The automation tools are useful for managing permissions and performing cleanup tasks efficiently. It provides strong reporting capabilities that help customers adhere to regulations and maintain compliance. Automating reporting is beneficial for maintaining robust governance, risk, and compliance (GRC) posture. It does incorporate some AI elements, particularly in its data alerting module. However, AI integration has yet to be the primary focus of my implementations. AI is expected to play a larger role in future enhancements. I recommend Varonis, particularly its effectiveness in performing data security remediation tasks. Despite its high cost, it is valuable for its capabilities and the lack of impact on end users. Overall, I rate it a nine out of ten.
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
865,829 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
9%
Government
6%
Wellness & Fitness Company
26%
Financial Services Firm
12%
Manufacturing Company
10%
Non Profit
9%
Financial Services Firm
16%
Computer Software Company
9%
Manufacturing Company
9%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is wor...
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs ...
Ask a question
Earn 20 points
What do you like most about Varonis Platform?
The solution has significantly improved data security and compliance posture by allowing us to track and monitor acti...
What needs improvement with Varonis Platform?
Varonis started as an on-premises solution and is transitioning to cloud. It hasn't fully moved yet, which is an area...
What is your primary use case for Varonis Platform?
The primary use case for Varonis Platform is data discovery, specifically for discovering sensitive data in our organ...
 

Also Known As

PingSafe
No data available
No data available
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
Nottingham Building Society
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: July 2025.
865,829 professionals have used our research since 2012.