SentinelOne Singularity Cloud Security Features
What are the features of SentinelOne Singularity Cloud Security?
Management
- Dashboards and Reports
- Administration Console
Administration
- Auditing
- Security Automation
- Security Integration
Security
- Compliance Monitoring
- Cloud Gap Analytics
- Compliance Monitoring
- Risk Analysis
- Reporting
Visibility
- Asset Discovery
Vulnerability Management
- Vulnerability Scanning
- Vulnerability Intelligence
- Risk-Prioritization
Risk Management
- Risk-Prioritization
SentinelOne Singularity Cloud Security Categories on G2
Filter for Features
Management
Dashboards and Reports | Access pre-built and custom reports and dashboards. 54 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 98% (Based on 54 reviews) | |
Workflow Management | Creates new or streamlines existing workflows to better handle IT support tickets and service. This feature was mentioned in 32 SentinelOne Singularity Cloud Security reviews. | 99% (Based on 32 reviews) | |
Administration Console | As reported in 49 SentinelOne Singularity Cloud Security reviews. Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | 98% (Based on 49 reviews) |
Operations
Governance | Allows users to create, edit, and relinquish user access privileges. 36 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 99% (Based on 36 reviews) | |
Logging and Reporting | As reported in 36 SentinelOne Singularity Cloud Security reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing. | 99% (Based on 36 reviews) | |
API / Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 33 SentinelOne Singularity Cloud Security reviews. | 99% (Based on 33 reviews) |
Security Controls
Anomaly Detection | Based on 31 SentinelOne Singularity Cloud Security reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | 97% (Based on 31 reviews) | |
Data Loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. 29 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 100% (Based on 29 reviews) | |
Security Auditing | Based on 36 SentinelOne Singularity Cloud Security reviews. Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. | 99% (Based on 36 reviews) | |
Cloud Gap Analytics | Based on 31 SentinelOne Singularity Cloud Security reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | 98% (Based on 31 reviews) |
Administration
Risk Scoring | Provides risk scoring for suspicious activity, vulnerabilities, and other threats. 29 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 100% (Based on 29 reviews) | |
Secrets Management | As reported in 42 SentinelOne Singularity Cloud Security reviews. Provides tools for managing authentication credentials such as keys and passwords. | 98% (Based on 42 reviews) | |
Security Auditing | Based on 43 SentinelOne Singularity Cloud Security reviews. Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. | 99% (Based on 43 reviews) | |
Configuration Management | Based on 43 SentinelOne Singularity Cloud Security reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | 98% (Based on 43 reviews) | |
Policy Enforcement | Based on 42 SentinelOne Singularity Cloud Security reviews. Allows administrators to set policies for security and data governance. | 99% (Based on 42 reviews) | |
Auditing | Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. 45 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 98% (Based on 45 reviews) | |
Workflow Management | Based on 22 SentinelOne Singularity Cloud Security reviews. Creates new or streamlines existing workflows to better handle IT support tickets and service. | 100% (Based on 22 reviews) | |
Security Automation | Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. 47 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 97% (Based on 47 reviews) | |
Security Integration | Integrates additional security tools to automate security and incident response processes. This feature was mentioned in 44 SentinelOne Singularity Cloud Security reviews. | 98% (Based on 44 reviews) | |
Multicloud Visibility | Based on 41 SentinelOne Singularity Cloud Security reviews. Allows users to track and control activity across cloud services and providers. | 100% (Based on 41 reviews) |
Monitoring
Continuous Image Assurance | Based on 31 SentinelOne Singularity Cloud Security reviews. Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats. | 97% (Based on 31 reviews) | |
Behavior Monitoring | Based on 19 SentinelOne Singularity Cloud Security reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. | 99% (Based on 19 reviews) | |
Observability | As reported in 23 SentinelOne Singularity Cloud Security reviews. Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. | 100% (Based on 23 reviews) | |
Gap Analysis | Based on 36 SentinelOne Singularity Cloud Security reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | 97% (Based on 36 reviews) | |
Vulnerability Intelligence | As reported in 38 SentinelOne Singularity Cloud Security reviews. Stores information related to common vulnerabilities and how to resolve them once incidents occur. | 97% (Based on 38 reviews) | |
Compliance Monitoring | Monitors data quality and sends alerts based on violations or misuse. 38 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 99% (Based on 38 reviews) | |
Continuous Monitoring | Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response. This feature was mentioned in 39 SentinelOne Singularity Cloud Security reviews. | 100% (Based on 39 reviews) | |
Resource utilization | Optimizes resource allocation. | Not enough data | |
Real-time monitoring | Consistently monitors processes for applications and IT infrastructure to detect anomalies in real-time. | Not enough data | |
Performance baseline | Sets up standard performance baseline to compare live container activities. | Not enough data | |
API monitoring | Traces connections between different containerized environments and detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data |
Protection
Dynamic Image Scanning | As reported in 30 SentinelOne Singularity Cloud Security reviews. Scans application and image source code for security flaws without executing it in a live environment | 95% (Based on 30 reviews) | |
Runtime Protection | As reported in 24 SentinelOne Singularity Cloud Security reviews. Monitors container activities and detects threats across containers, networks, and cloud service providers. | 99% (Based on 24 reviews) | |
Workload Protection | Based on 27 SentinelOne Singularity Cloud Security reviews. Protects compute resources across a networks and cloud service providers. Serves as Firewall and prompts additional authentication for suspicious users. | 99% (Based on 27 reviews) | |
Network Segmentation | As reported in 19 SentinelOne Singularity Cloud Security reviews. Allows administrative control over network components, mapping, and segmentation. | 99% (Based on 19 reviews) |
Security
Compliance Monitoring | Monitors data quality and sends alerts based on violations or misuse. This feature was mentioned in 49 SentinelOne Singularity Cloud Security reviews. | 99% (Based on 49 reviews) | |
Anomoly Detection | As reported in 27 SentinelOne Singularity Cloud Security reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | 98% (Based on 27 reviews) | |
Data Loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. This feature was mentioned in 23 SentinelOne Singularity Cloud Security reviews. | 99% (Based on 23 reviews) | |
Cloud Gap Analytics | As reported in 45 SentinelOne Singularity Cloud Security reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | 98% (Based on 45 reviews) | |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse. 45 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 98% (Based on 45 reviews) | |
Risk Analysis | See feature definition | Based on 45 SentinelOne Singularity Cloud Security reviews. Identifies potential network security risks, vulnerabilities, and compliance impacts. | 97% (Based on 45 reviews) |
Reporting | As reported in 45 SentinelOne Singularity Cloud Security reviews. Creates reports outlining log activity and relevant metrics. | 99% (Based on 45 reviews) |
Compliance
Governance | Based on 43 SentinelOne Singularity Cloud Security reviews. Allows users to create, edit, and relinquish user access privileges. | 98% (Based on 43 reviews) | |
Data Governance | Based on 31 SentinelOne Singularity Cloud Security reviews. Ensures user access management, data lineage, and data encryption. | 100% (Based on 31 reviews) | |
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 44 SentinelOne Singularity Cloud Security reviews. | 99% (Based on 44 reviews) |
Performance
Issue Tracking | Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. 43 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 98% (Based on 43 reviews) | |
Detection Rate | Based on 42 SentinelOne Singularity Cloud Security reviews. The rate at which scans accurately detect all vulnerabilities associated with the target. | 98% (Based on 42 reviews) | |
False Positives | Based on 35 SentinelOne Singularity Cloud Security reviews. The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | 95% (Based on 35 reviews) | |
Automated Scans | Based on 42 SentinelOne Singularity Cloud Security reviews. Runs pre-scripted vulnerability scans without requiring manual work. | 98% (Based on 42 reviews) |
Network
Compliance Testing | Allows users to scan applications and networks for specific compliance requirements. 28 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 100% (Based on 28 reviews) | |
Perimeter Scanning | Analyzes network devices, servers and operating systems for vulnerabilities. This feature was mentioned in 19 SentinelOne Singularity Cloud Security reviews. | 99% (Based on 19 reviews) | |
Configuration Monitoring | Based on 30 SentinelOne Singularity Cloud Security reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | 100% (Based on 30 reviews) |
Application
Manual Application Testing | As reported in 19 SentinelOne Singularity Cloud Security reviews. Allows users to perfrom hands-on live simulations and penetration tests. | 100% (Based on 19 reviews) | |
Static Code Analysis | As reported in 21 SentinelOne Singularity Cloud Security reviews. Scans application source code for security flaws without executing it. | 100% (Based on 21 reviews) | |
Black Box Testing | Scans functional applications externally for vulnerabilities like SQL injection or XSS. This feature was mentioned in 16 SentinelOne Singularity Cloud Security reviews. | 100% (Based on 16 reviews) |
Activity Monitoring
Usage Monitoring | Tracks infrastructure resource needs and alerts administrators or automatically scales usage to minimize waste. 27 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 99% (Based on 27 reviews) | |
Database Monitoring | Monitors performance and statistics related to memory, caches and connections. This feature was mentioned in 28 SentinelOne Singularity Cloud Security reviews. | 99% (Based on 28 reviews) | |
API Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. 29 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 96% (Based on 29 reviews) | |
Activity Monitoring | Actively monitors status of work stations either on-premise or remote. This feature was mentioned in 24 SentinelOne Singularity Cloud Security reviews. | 98% (Based on 24 reviews) |
Configuration
DLP Configuration | As reported in 22 SentinelOne Singularity Cloud Security reviews. Offers data loss prevention tools to protect data from leaving the environments it is allowed to. | 100% (Based on 22 reviews) | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. This feature was mentioned in 43 SentinelOne Singularity Cloud Security reviews. | 98% (Based on 43 reviews) | |
Unified Policy Management | Allows users to track and control security policies across cloud services and providers. This feature was mentioned in 43 SentinelOne Singularity Cloud Security reviews. | 97% (Based on 43 reviews) | |
Adaptive Access Control | Provides a risk-based approach to determining trust within the network. 29 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 99% (Based on 29 reviews) | |
API / Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 30 SentinelOne Singularity Cloud Security reviews. | 100% (Based on 30 reviews) |
Visibility
Multicloud Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. This feature was mentioned in 43 SentinelOne Singularity Cloud Security reviews. | 100% (Based on 43 reviews) | |
Asset Discovery | Based on 46 SentinelOne Singularity Cloud Security reviews. Detect new assets as they enter a cloud environments and networks to add to asset inventory. | 98% (Based on 46 reviews) |
Vulnerability Management
Threat Hunting | Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks. 39 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 99% (Based on 39 reviews) | |
Vulnerability Scanning | Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised. 47 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 99% (Based on 47 reviews) | |
Vulnerability Intelligence | Based on 47 SentinelOne Singularity Cloud Security reviews. Stores information related to new and common vulnerabilities and how to resolve them once incidents occur. | 99% (Based on 47 reviews) | |
Risk-Prioritization | Based on 45 SentinelOne Singularity Cloud Security reviews. Allows for vulnerability ranking by customized risk and threat priorities. | 99% (Based on 45 reviews) |
Asset Management
Asset Discovery | Detects new assets as they enter cloud environments and networks to add to asset inventory. 41 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 96% (Based on 41 reviews) | |
Shadow IT Detection | Identifies unsanctioned software. This feature was mentioned in 18 SentinelOne Singularity Cloud Security reviews. | 98% (Based on 18 reviews) | |
Change Management | Based on 36 SentinelOne Singularity Cloud Security reviews. Provides tools to track and implement required security policy changes. | 94% (Based on 36 reviews) |
Risk Management
Risk-Prioritization | Allows for vulnerability ranking by customized risk and threat priorities. 51 reviewers of SentinelOne Singularity Cloud Security have provided feedback on this feature. | 98% (Based on 51 reviews) | |
Reconnaissance | As reported in 42 SentinelOne Singularity Cloud Security reviews. Gathers information about the system and potential exploits to be tested. | 98% (Based on 42 reviews) | |
At-Risk Analysis | As reported in 34 SentinelOne Singularity Cloud Security reviews. Uses machine learning to identify at-risk data. | 98% (Based on 34 reviews) | |
Threat Intelligence | As reported in 27 SentinelOne Singularity Cloud Security reviews. Stores information related to common threats and how to resolve them once incidents occur. | 98% (Based on 27 reviews) |
Alerts management
Multi-mode alerts | Alerts over email, text, phone call, or more to multiple parties. | Not enough data | |
Opimization alerts | Provides information related to unnecessary spending and unused resources. | Not enough data | |
Incident alerts | Gives alerts when incidents arise. | Not enough data |
Automation
Resolution automation | Diagnoses and resolves incidents without the need for human interaction. | Not enough data | |
Automation | Efficiently scales resource usage to optimize spend whith increased or decreased resource usage requirements. | Not enough data |
Analysis
Search | Allows users to search logs for troubleshooting and open-ended exploration of data. | Not enough data | |
Reporting | Creates reports outlining resource, underutilization, cost trends, and/or functional overlap. | Not enough data | |
Visualization | Presents information and analytics in a digestible, intuitive, and visually appealing way. | Not enough data | |
Track trends | Allows users to track log trends. | Not enough data |
Issue Resolution
Root cause identification | Directly identifies, or increases identification speed for, root causes for container issues. | Not enough data | |
Resolution guidance | Provides paths, suggestions, or other general assistance towards issue resolution. | Not enough data | |
Proactive identification | Proactively identifies trends on container systems that could lead to failures or errors. | Not enough data |
Security - Cloud-Native Application Protection Platform (CNAPP)
Workload and container security | Scans containers, workloads, and kubernetes clusters for any misconfigurations or vulnerabilities. | Not enough data | |
Threat detection and response | Monitor live environments for anomalies, risks and threats to ensure rapid response. | Not enough data | |
DevSecOps Integrations | Integrates with CI/CD pipelines to detect security risks early in the development life cycle. | Not enough data | |
Unified Visibility | Consolidate all security data across the tech and cloud stacks into one dashboard. | Not enough data |
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Intelligent remediations and suggestions | Offers an AI-powered engine to provide remediation guidance to the user based on the type of threat. | Not enough data | |
Risk prioritization | Uses context-aware analysis to identify critical and non-critical risks across vulnerabilities. | Not enough data | |
Anomaly detection using machine learning | Help detect anomalies across cloud workloads which could help present a potential breach. | Not enough data |
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Multi-cloud visibility | Offers a unified view of all cloud assets across multi-cloud platforms such as AWS, Azure, GCP etc. | Not enough data | |
Cloud Security Posture Management (CSPM) | Continuously scans cloud environments for any misconfigurations, and provide benchmarks and guided remediation. | Not enough data |