At Orca Security, we’re on a mission to make it fast, easy, and cost effective for organizations to address critical cloud security issues so they can operate in the cloud with confidence.
Product | Market Share (%) |
---|---|
Orca Security | 5.9% |
Wiz | 23.2% |
Prisma Cloud by Palo Alto Networks | 12.3% |
Other | 58.599999999999994% |
Type | Title | Date | |
---|---|---|---|
Category | Cloud Security Posture Management (CSPM) | Aug 29, 2025 | Download |
Product | Reviews, tips, and advice from real users | Aug 29, 2025 | Download |
Comparison | Orca Security vs Wiz | Aug 29, 2025 | Download |
Comparison | Orca Security vs Prisma Cloud by Palo Alto Networks | Aug 29, 2025 | Download |
Comparison | Orca Security vs SentinelOne Singularity Cloud Security | Aug 29, 2025 | Download |
Title | Rating | Mindshare | Recommending | |
---|---|---|---|---|
Wiz | 4.5 | 23.2% | 95% | 22 interviewsAdd to research |
Datadog | 4.3 | 1.8% | 97% | 188 interviewsAdd to research |
Company Size | Count |
---|---|
Small Business | 9 |
Midsize Enterprise | 7 |
Large Enterprise | 5 |
Company Size | Count |
---|---|
Small Business | 349 |
Midsize Enterprise | 195 |
Large Enterprise | 806 |
Key Platform Features:
Agentless: Complete, centralized coverage of the entire cloud estate, without the need for installing and configuring agents or layering together multiple siloed tools. Full visibility of cloud misconfigurations, vulnerabilities, workload protection, malware scanning, image scanning, file integrity monitoring and more.
Asset Inventory: Get a complete inventory of all your public cloud assets, including detailed information on installed OSes, software, and applications, as well as data and network assets such as storage buckets, Virtual Private Clouds (VPCs), and Security Groups.
Attack Path Analysis: Visualize attack vectors to critical assets or crown jewels. See which assets are susceptible to lateral movement, assume roles, privilege escalation, and more.
Risk Prioritization: Prioritize the 1% of risks that matter the most, based on impact scores. Secure the vulnerabilities and misconfigured targets (critical assets) and eliminate the potential risks residing on the attack paths to those targets.
Cloud Threat Detection: Monitor for malicious activity within your entire cloud estate. Be aware of detected threats, user behavior anomalies and more.
Breach Forensics: Log every change and all activity into a central repository for investigation procedures to confirm or deny entry and compromises within the cloud estate.
Cloud To Dev (Shift Left): Orca’s built-in shift left capabilities enables DevOps to focus more security attention earlier in the CI/CD pipelines. Security teams are able to trace a production risk (misconfiguration or vulnerability) directly to the original source code repository from which it came, even down to the exact line of code that is at the root of the identified risk.
Compliance: Choose from over 60 preconfigured compliance frameworks, cloud security best practices, CIS Benchmarks, or design and build your own compliance framework for fast and continuous reporting.
Security Score: The Orca Security Score is found on Orca’s Risk Dashboard and is updated daily. The overall score is calculated based on performance in the following five categories - Suspicious Activity, IAM, Data at Risk, Vulnerable Assets, and Responsiveness. Since the scores are percentage based and not raw numbers, you can objectively make comparisons to other organizations within your industry or business units of different sizes. In addition to reporting to senior management, the Orca Security Score can help with internal self-monitoring, as a way of measuring risk mitigation efforts, to know where to focus efforts, and track progress.
Orca Security Benefits
Consolidate technologies to reduce costs and complexity:
“The more I can get out of this one solution, the better. I see Orca as the tool where we get all cloud-related security data.” - Joshua Scott, Head of Security and IT | Postman
Avoid costly breaches:
"I look at proactive asset discovery, configuration management, and vulnerability management as being able to find a vulnerability before the bad guys do and being able to deal with it before something exploits it. This is what Orca does for us." - Doug Graham, CSO & CPO | Lionbridge
Increase team productivity and efficiency by focusing on high-value activities and solving the 1% of risks that matter most:
"Orca is unique in that it locates vulnerabilities with precision and delivers tangible, actionable results – without having to sift through all the noise." - Aaron Brown, Senior Cloud Security Engineer | Sisense
Quick Time-to-Value with Immediate ROI:
"Orca told us we could have some visibility within 5 or 10 minutes, and I thought, ‘There’s no way.’ Well, I was wrong. They really did it." - Thomas Hill, CISO | Live Oak Bank
Reduce MTTR and remove operational friction:
“We can’t ask developers things like ‘Did you think about security? When you start a new VM on AWS, can you please let me know so I’m able to scan it? Can you please deploy an agent on that machine for me?’ We need a better way to work. Orca provides that better way by eliminating organizational friction.” - Erwin Geirnaert, Cloud Security Architect | NG Data
BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino
Author info | Rating | Review Summary |
---|---|---|
Cloud Security Automation Engineer at a financial services firm with 10,001+ employees | 4.0 | We used Orca Security for cloud security, particularly for CSPM and vulnerability assessment. Its agentless setup simplified deployment, replacing many tools and improving visibility to 100%. However, the documentation and compliance framework could benefit from enhancements. |
Senior Information Security Engineer at a computer software company with 10,001+ employees | 4.0 | I use Orca Security for managing cloud security posture, finding its flexible filtering and visualization valuable. While it effectively identifies vulnerabilities and compliance issues, it needs better management options for snoozing alarms and handling alerts with multiple files. |
Software Developer at a tech vendor with 1,001-5,000 employees | 4.5 | I found Orca Security significantly enhanced our server access and security without relying on a VPN. While the multi-tenant architecture effectively managed alerts, I suggest improving two-step authentication features and timeout settings for added convenience. |
Vulnerability Assessment Analyst at a computer software company with 501-1,000 employees | 4.0 | I use Orca Security for cloud security and vulnerability alerts. Its seamless integration and side scanning technology are valuable. However, ticket creation could improve by allowing segregation for different projects, and reporting OS package vulnerabilities needs enhancement. |
enterprise architect at a tech services company with 1-10 employees | 4.5 | We implement Orca Security for clients who value its excellent GUI and threat intelligence features. However, it needs a central management system similar to Palo Alto Panorama. Customers often choose it due to its presence in Gartner's Top 5. |
Works at Ultraviolet Cyber | 4.0 | I use Orca Security primarily for cloud security and posture management. Its CIEM and CDR features are invaluable, but the automatic scan runs only every 24 hours, which limits timely detection. I have not used any alternatives. |
Presales Security Engineer / CSM at Cybersel Group | 4.5 | We use Orca Security to detect misconfigurations and vulnerabilities without needing an agent. The solution's detailed analysis can be overwhelming for nontechnical users, though it provides significant value to those with technical expertise, especially in cloud environments. |
Cloud Security Contractor at TripAdvisor | 5.0 | I use Orca Security for posture management to comply with frameworks like CIS and NIST. Its reporting and automated remediation are transformative. Although customization could improve, it offers good ROI and outperformed solutions like Lacework due to features and integration. |