


Illumio and Orca Security compete in the cybersecurity space, focusing on visibility and security in different environments. Orca Security holds an edge due to its rapid deployment and robust cloud environment integration.
Features: Illumio offers excellent visibility and monitoring, application dependency mapping, and micro-segmentation. Orca Security, with its agentless SideScanning technology, provides comprehensive visibility, ranking vulnerabilities based on severity and integrating with CI/CD pipelines.
Room for Improvement: Illumio needs better support for additional operating systems, improved technical support, and interactive support sessions. Orca Security requires expanded real-time risk assessment capabilities and better alignment with data center environments, enhanced user education, and more automatic remediation options.
Ease of Deployment and Customer Service: Illumio excels with on-premises support focusing on East-West traffic control, though its technical support has mixed reviews. Orca Security simplifies deployment with its agentless approach, supporting multi-cloud environments and offering responsive customer support available 24/7.
Pricing and ROI: Illumio is seen as affordable with significant ROI from its traffic visibility and audit capabilities, though initial subscription costs may seem high. Orca Security's pricing feels steep but aligns with its wide range of features, offering a flexible workload-based model for scaling.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
Illumio is known to be the cheapest solution among the security solutions we evaluated.
Orca Security significantly improved our visibility from 30% to 100%, enabling better security posture improvements rather than just general cost savings.
I see the benefits of Orca Security immediately because you can see the issues right after deployment, and you can correct the critical issues, so the proof of value is immediate.
Orca Security roughly reduced the operating expenses by around 20-50%.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
Even if we raise an issue on non-working days like Saturdays or Sundays, we receive prompt responses.
From my experience, they are very responsive.
I would rate the quality of support as nine stars out of ten due to their quick and helpful responses.
The expertise levels could be improved.
The support team assists with issues and provides information on new updates.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
I would rate the scalability of PingSafe 10 out of 10.
Scaling it to a large level is not an issue for us.
When you onboard an organization, Orca will find new projects, folders, and resources without any additional effort required.
The seamless integration allows us to automatically reflect any connected project from our cloud into the console.
I believe Orca Security is scalable and can handle small and medium-enterprise businesses effectively.
SentinelOne Singularity Cloud is incredibly reliable.
We contacted Cloud Native Security, and they addressed it in a day.
The only downtime we had was when switching from V1 to V2 but it was smooth.
Illumio is a stable solution with no glitches or bugs reported, making it a reliable product for us.
I personally have not encountered any bugs or issues with the console.
I have experienced very little downtime.
I do not experience downtime, bugs, or glitches.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
I would also like to see Cloud Native Security offer APIs that allow us to directly build dashboards within the platform.
There could also be more examples of how the automations can be done using Illumio.
That's why I'm looking for comparisons with other products.
There should be an option to upgrade from the console to the latest version instead of performing manual upgrades.
Another improvement is in handling alerts for multiple files with the same CVE; it should provide an option to manage each file separately without affecting others.
Orca Security could improve in reporting OS package vulnerabilities, such as missing MS patches or Linux patches.
Security in today's age is important, and if a company can afford it, they should get it as it's the most valuable protection against threats.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
There are some tools that are double the cost of Cloud Native Security.
I recall Cloud Native Security charging a slightly higher premium previously.
I know that Illumio is the cheapest solution in the security area.
I think it's not very expensive if we compare it with Guardicore.
The initial price seemed high, however, after negotiation, the final price was ideal.
Orca Security's pricing is known to be a bit high.
Its license is a bit expensive.
The infrastructure-as-code feature is helpful for discovering open ports in some of the modules.
This tool has been helpful for us. It allows us to search for vulnerabilities and provides evidence directly on the screen.
Cloud Native Security's cloud SIEM feature has been essential in preventing our most critical security incidents.
Illumio helps in audit purposes by saving data and showing blocked traffic, ensuring no outside traffic is allowed.
The most important feature is the traffic review analysis, where we use the draft view and the reported view that helps us understand how the application interacts with other applications in the environment, and based on that, we are able to define the policies.
The dependency map is the most valuable aspect.
Additionally, it covers a large scope of vulnerabilities, CVEs, malware, and misconfiguration.
It provided us with visibility from a central point, increasing our view from the previous thirty percent to a full one hundred percent of our cloud environment.
This technology allows for coverage of almost all cloud assets without interrupting their operations.
| Product | Market Share (%) |
|---|---|
| SentinelOne Singularity Cloud Security | 4.2% |
| Orca Security | 5.2% |
| Illumio | 5.3% |
| Other | 85.3% |
| Company Size | Count |
|---|---|
| Small Business | 48 |
| Midsize Enterprise | 22 |
| Large Enterprise | 54 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 12 |
| Midsize Enterprise | 7 |
| Large Enterprise | 8 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Illumio Zero Trust Segmentation is a cloud and data center security solution that helps stop breaches from spreading across hybrid and multi cloud IT environments. The solution is designed to stop ransomware, contain cyber attacks, and reduce risk. With Illumio Zero Trust Segmentation, users can understand relationships and communications to map exposure risk of systems and data, identify the right security posture and secure applications through least-privilege policies, and ensure a Zero Trust security posture.
Illumio Zero Trust Segmentation Features
Illumio Zero Trust Segmentation has many valuable key features. Some of the most useful ones include:
Illumio Zero Trust Segmentation Benefits
There are many benefits to implementing Illumio Zero Trust Segmentation. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Illumio Zero Trust Segmentation is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has a good auto policy writing feature, great mapping, and useful monitoring.
Shashi, Technical Consultant at a financial services firm, explains which features she really likes. “The auto policy writing is great. The feature will give you the option of inbound-outbound traffic. The Explorer allows you to know the traffic between source and destination. The illumination definitely stands out. Mapping is great. The application group mapping is useful.”
The solution has “helpful support, useful monitoring, and high availability,” according to Edwin L., Security Architect at MGM.
Orca Security provides comprehensive security management with agentless visibility and SideScanning technology, ensuring efficient threat detection without performance impact.
Orca Security offers agentless visibility across multi-cloud environments, streamlining security management with features like SideScanning technology and centralized security tools. It focuses on automation, vulnerability management, and compliance checks, enhancing a company's security posture with real-time alerts and integrated threat detection. Its intuitive interface prioritizes critical issues, making it suitable for managing DevSecOps processes efficiently.
What are the key features of Orca Security?
What benefits and ROI should companies look for in Orca Security?
Companies in industries such as finance, healthcare, and technology leverage Orca Security for cloud security posture management, ensuring compliance with standards and securing applications and databases. Its agentless approach provides comprehensive visibility across AWS, GCP, and Azure, enhancing risk assessment and vulnerability management without impacting asset performance.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.