No more typing reviews! Try our Samantha, our new voice AI agent.

Sweet Security vs XM Cyber comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Vulnerability Management
4th
Ranking in Cloud Security Posture Management (CSPM)
3rd
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
118
Ranking in other categories
Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd), AI Observability (2nd)
Sweet Security
Ranking in Vulnerability Management
40th
Ranking in Cloud Security Posture Management (CSPM)
25th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
4
Ranking in other categories
Cloud Workload Protection Platforms (CWPP) (19th), Cloud-Native Application Protection Platforms (CNAPP) (17th), Identity Threat Detection and Response (ITDR) (11th), Cloud Detection and Response (CDR) (7th)
XM Cyber
Ranking in Vulnerability Management
34th
Ranking in Cloud Security Posture Management (CSPM)
26th
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
6
Ranking in other categories
Continuous Controls Monitoring (3rd), Continuous Threat Exposure Management (CTEM) (4th)
 

Mindshare comparison

As of March 2026, in the Vulnerability Management category, the mindshare of SentinelOne Singularity Cloud Security is 2.4%, up from 1.3% compared to the previous year. The mindshare of Sweet Security is 0.7%, up from 0.1% compared to the previous year. The mindshare of XM Cyber is 1.0%, up from 0.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Mindshare Distribution
ProductMindshare (%)
SentinelOne Singularity Cloud Security2.4%
XM Cyber1.0%
Sweet Security0.7%
Other95.9%
Vulnerability Management
 

Featured Reviews

SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.
FM
Infrastructure & Dev Ops Lead at Babylon Labs
Continuous runtime security has improved visibility while the interface still needs refinement
One thing I think Sweet Security can definitely improve is that they have a lot of features, but the UI right now is not so well designed in my opinion. It's a bit difficult to navigate and get to the signal. There is a lot of signal there, but it's a bit difficult to get to the correct place and understand what I am seeing. It has a small learning curve that I don't think such a product should have. It should be very straightforward. Sweet Security has a mechanism where they initially show all the vulnerabilities that are in my infrastructure, which they show as a huge number, maybe around ten thousand, and they narrow it down to which of these could actually be exploited and are actually severe. It's nice that they are able to narrow it down to a few incidents. However, they don't really need to show this in the UI. Maybe they can just show the actual signal and not show that there is a lot of vulnerabilities, but indicate which are important. That's good that they can do it, but it's not so important to see it every time in the platform.
Stephen Owen - PeerSpot reviewer
Group CISO at a insurance company with 51-200 employees
Has significantly improved risk visibility and optimized remediation efforts across dynamic environments
We tightly integrate with APIs, consuming feeds and open source data. We have integrated with XM Cyber, and we are elevating ourselves with AI and MCP tools as we view this as a forerunner to reducing the workload for our agents and IT staff. We're pushing all our security partners to provide AI and MCP tools. Our vision is for them to offer a chat interface where a junior IT or an experienced infrastructure engineer can ask for what needs to be patched next without using an interface. Their current interface is very usable and professional, ranking in the top tier of applications. Their reporting is good, offering custom reports, and their API integration is a new capability that serves us well. We have high expectations for the next generation, such as a chat interface to ask questions. However, everything has been very good. We push the boundaries with digital twins; I understand XM Cyber uses a similar concept of graph databases to map environments. I would like access to that and querying languages, enabling more informed business decisions. XM Cyber sees much of our estate, which is beneficial for making informed decisions, and we can harness those insights and data for business analytics. For instance, it could help us gain insights into change management—if a particular server impacts another and that server is supported by yet another server, we could glean significant insights for change management meetings.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue."
"The compliance monitoring feature of SentinelOne Singularity Cloud Security gives us a report with a compliance score to ensure we meet certain regulatory standards."
"We use the infrastructure as code scanning, which is good."
"The most valuable feature is the notification system, providing real-time alerts and comparisons crucial for maintaining security."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"The tool identifies issues quickly."
"The visibility SentinelOne Singularity Cloud Security provides into the Cloud environment is a valuable feature."
"SentinelOne Singularity Cloud Security's unified platform experience has helped streamline our security operations, as it has definitely allowed us to get more accurate information faster."
"Before we had Sweet Security, upon any type of detection of activity, we needed to conduct lots of investigations in different platforms and logs until we could build the larger picture, but once we inserted Sweet Security, we are able to actually see each and every request being made from the application level towards the infrastructure, making it much easier and reducing the time for an analyst to understand what's really happening."
"The value of having real-time visibility in our cloud environment with Sweet Security changes everything because it differentiates between identifying and reacting to something that is not really a risk and something that is truly a risk that needs to be treated."
"For the time I have been using Sweet Security, I feel a bit more safe in the sense that there is something that continuously scans my infrastructure for issues."
"The value we see from having real-time visibility into our cloud environment is significant, as Sweet Security serves as our eyes and ears inside AWS, telling us what we are doing wrong so we can fix it."
"Since implementing XM Cyber, we have improved the way we are doing patching, focusing on the choke points in our patching cycle, and it improves the way we assess the risk."
"XM Cyber permits us to identify if a zero-day vulnerability can affect our infrastructure; it helps me understand the company's total risk that we have in our infrastructure and workstation vulnerability, and it permits us to identify the real impact when we have a vulnerability."
"What I personally like very much, from my experience, is that it is very reliable."
"It saves you money while making you more secure."
"Six weeks into using XM Cyber, we saw a compelling return on investment—primarily in risk reduction, with a specific issue our other security tooling did not pick up but XM Cyber did, reducing IT remediation time and saving over 60,000 US dollars per year while significantly lowering our loss exposure amount."
"The platform's most valuable feature is attack simulation."
"XM Cyber permits us to identify if a zero-day vulnerability can affect our infrastructure; it helps me understand the company's total risk that we have in our infrastructure and workstation vulnerability, and it permits us to identify the real impact when we have a vulnerability."
"XM Cyber made it clear that browser vulnerabilities were the top priority because the platform was able to examine how vulnerabilities within our estate could be exploited and what the path would be from some bad actor in order to exploit those vulnerabilities."
 

Cons

"SentinelOne Singularity Cloud Security's current documentation could be improved to better assist customers during the cluster onboarding process."
"The area of improvement is the cost, which is high compared to other traditional endpoint protections."
"After closing an alert in Cloud Native Security, it still shows as unresolved."
"here is a bit of a learning curve. However, you only need two to three days to identify options and get accustomed."
"The areas with room for improvement include the cost, which is higher compared to other security platforms. The dashboard can also be laggy."
"I'd like to see better onboarding documentation."
"In version 2, a lot of rules have been deployed for Kubernetes security and CDR, which makes a lot of issues of critical severity, whereas they are not critical or of high severity. There is a mismatch of severities."
"If something happens in our infrastructure, the alert appears on the dashboard, but I have to log in to the dashboard and refresh it. I would prefer it to provide better alerting and notifications so that I can resolve issues on priority."
"There was something a year ago that caused a production issue in my company, but they fixed it within an hour."
"One thing I think Sweet Security can definitely improve is that they have a lot of features, but the UI right now is not so well designed in my opinion."
"The option to run specific playbooks through Sweet Security platform would help us a lot, but these must be fully customizable."
"One area for improvement could be the alerts, as we have an issue with the alert time, the time it takes for the system to send the alert, but besides that, there is nothing special."
"We have high expectations for the next generation, such as a chat interface to ask questions."
"There are many interesting things about XM Cyber, but the part that can be improved is the mobile exposure and the IBM i specific equipment."
"They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks."
"We'd like to see a cheaper price."
"They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks."
"We'd like to see a cheaper price."
"We have not saved any time or effort, but we can prove that the effort involved around vulnerability management has been better spent to greater effect, and we've been able to demonstrate that vulnerabilities that do represent a high risk have been remediated more rapidly and more effectively."
"XM Cyber could identify all areas of vulnerability. They could expand the identification span for different areas."
 

Pricing and Cost Advice

"It is not that expensive. There are some tools that are double the cost of PingSafe. It is good on the pricing side."
"Singularity Cloud Workload Security's licensing and price were cheaper than the other solutions we looked at."
"PingSafe is affordable."
"The pricing for PingSafe in India was more reasonable than other competitors."
"The pricing tends to be high."
"I would rate the cost a seven out of ten with ten being the most costly."
"SentinelOne is quite costly compared to other security platforms."
"I am not involved in the pricing, but it is cost-effective."
Information not available
"We have to pay standard licensing fees."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
10%
Government
6%
Wellness & Fitness Company
11%
Healthcare Company
10%
Manufacturing Company
8%
Outsourcing Company
8%
Computer Software Company
11%
Financial Services Firm
9%
Manufacturing Company
8%
Retailer
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business49
Midsize Enterprise22
Large Enterprise55
No data available
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
Regarding the pricing for SentinelOne Singularity Cloud Security, I do not think it is something I can compare.
What needs improvement with PingSafe?
I do not see room for improvement in SentinelOne Singularity Cloud Security. In the future, I would like to see the i...
What is your experience regarding pricing and costs for Sweet Security?
One very strong point of Sweet Security is their pricing. It's really good. Also, their team is very good, very respo...
What needs improvement with Sweet Security?
One thing I think Sweet Security can definitely improve is that they have a lot of features, but the UI right now is ...
What is your primary use case for Sweet Security?
I'm mostly using Sweet Security for real-time infrastructure security. If there is any threat, I want to detect it in...
What is your experience regarding pricing and costs for XM Cyber?
My experience with pricing, setup cost, and licensing was that we have a large, complicated estate, and in the licens...
What needs improvement with XM Cyber?
The roadmap is a disadvantage because this kind of technology should incorporate AI. At the moment, we don't have any...
What is your primary use case for XM Cyber?
My major use case for XM Cyber is managing the services in our company, Prosegur Iberia, for Spain and Portugal. We d...
 

Also Known As

PingSafe
No data available
No data available
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
Hamburg Port Authority, Plymouth Rock Corporation
Find out what your peers are saying about Sweet Security vs. XM Cyber and other solutions. Updated: March 2026.
885,311 professionals have used our research since 2012.