Try our new research platform with insights from 80,000+ expert users

Orca Security vs Trivy comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Orca Security
Ranking in Container Security
16th
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
21
Ranking in other categories
Vulnerability Management (14th), Cloud Workload Protection Platforms (CWPP) (10th), API Security (4th), Cloud Security Posture Management (CSPM) (11th), Cloud-Native Application Protection Platforms (CNAPP) (6th), Data Security Posture Management (DSPM) (8th), Cloud Detection and Response (CDR) (2nd)
Trivy
Ranking in Container Security
6th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
12
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2025, in the Container Security category, the mindshare of Orca Security is 4.8%, down from 5.9% compared to the previous year. The mindshare of Trivy is 5.9%, up from 1.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

CHINTAN MEHTA - PeerSpot reviewer
Consolidating security tools with comprehensive cloud visibility
The documentation for Orca Security could be improved. The compliance framework also needs enhancements, especially concerning integrations with other tools like ServiceNow's vulnerability modules, which are not as mature as expected. It should also increase its capability to ingest data from other security tools like CloudSight for endpoint detection and provide real-time monitoring.
Utsav Sharma - PeerSpot reviewer
Maintain operational efficiency by detecting misconfigurations and vulnerabilities
The vulnerability scanning feature is excellent as it supports various container capabilities like Docker and Sharma. It also offers repository scanning in the source code domain, allowing pre-push code scans. The misconfiguration detection works well for CloudFormation, Docker files, and Terraform. Its compliance support, like NIST, ensures that configurations align with standards. Trivy helps me significantly detect misconfigurations missed by the ops engineers or in Terraform by the naked eye. It ensures that my deployments are free of misconfigurations and vulnerabilities.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The reporting and automated remediation capabilities are valuable to me. They're real game-changers."
"I find Orca Security's CIEM feature invaluable, as it focuses on entitlement and posture management, identifying assets with older OS versions, and asset misconfiguration."
"There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report."
"The GUI features are very good. Threat intelligence is also very good."
"One of the valuable features of Orca Security is its design and options that allow flexible filtering and user-friendly visualization."
"Orca's dashboard is excellent. My team needs to be able to focus on specific areas for improvement in our cloud environment. And most recently, we've started to get good use out of sonar, the search capabilities, and the alert creation."
"Once our organization is configured, any cloud account under that organization is automatically detected in Orca Security, along with all the assets associated with it."
"Orca's SideScanning is the biggest feature. It's the 'wow' factor... With Orca's SideScanning, they just need permissions for your account and that makes it so simple."
"Overall, I would rate Trivy a ten out of ten."
"Trivy is very reliable and always has an up-to-date database to scan images and identify vulnerabilities."
"It is open-source."
"What I find valuable is the ease of setup with Trivy, including pre-defined operators that require minimal configuration."
"Trivy is particularly useful for checking if Docker images have critical vulnerabilities before they reach production."
"I can see vulnerabilities in the images of any applications deployed in the Kubernetes environment or as container applications."
"I rate Trivy a nine out of ten."
"The most valuable feature of Trivy is its easy integration with the CI/CD pipeline."
 

Cons

"The automatic scan only runs every 24 hours, and if an alert is remediated within an hour, it still remains until the next scheduled scan."
"Orca Security could improve its ticket creation process."
"The timeout settings could be made more customizable, as sometimes if I leave the office early, it's still running unless manually turned off."
"The documentation for Orca Security could be improved."
"A notable limitation with Orca Security is its scanning feature. The automatic scan only runs every 24 hours, and if an alert is remediated within an hour, it still remains until the next scheduled scan."
"Orca Security can be improved as there should be some kind of central pane of glass. Similar to how cloud management works, Orca Security should have something comparable."
"The solution could improve by making the dashboards more elaborative and more descriptive."
"Orca Security can be improved as there should be some kind of central pane of glass. Similar to how cloud management works, Orca Security should have something comparable."
"Trivy can improve by providing an output in PDF format."
"The reporting could be a little better."
"In our CI/CD pipelines, Trivy lacks built-in functionality for report analysis."
"The only problem is that Trivy does not support reporting features such as generating reports in CSV, which is useful for auditing and reporting."
"Trivy generates many false positives, flagging non-existent vulnerabilities. Improvements could include better contextual analysis or granular filtering."
"Trivy is not scalable; however, I have scanned very large projects with it. It is stable but not scalable according to my experience."
"Currently, the container image scanning is static. A dynamic scanning capability during runtime would be a significant advantage."
"The only problem is that Trivy does not support reporting features such as generating reports in CSV, which is useful for auditing and reporting."
 

Pricing and Cost Advice

"I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
"While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
"The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
"Overall, the pricing is reasonable and the discounts have been acceptable."
"Its license is a bit expensive."
"Orca Security is cheaper compared to other solutions in the same space."
"Orca Security charges are based on cloud workloads. So, it's based on workloads. If we look at one feature, it might be expensive."
"We have a total of 25 licenses for this solution. The solution is on a pay-and-you-use model."
Information not available
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
860,592 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
12%
Manufacturing Company
9%
University
5%
Computer Software Company
15%
Financial Services Firm
13%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Orca Security?
It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just scan the entire assets in the cloud.
What needs improvement with Orca Security?
Orca Security can be improved as there should be some kind of central pane of glass. Similar to how cloud management works, Orca Security should have something comparable. They have something right...
What is your primary use case for Orca Security?
Our clients use Orca Security for various reasons. We implement it for the clients.
What needs improvement with Trivy?
Trivy's marketing and awareness need improvement. Not everyone knows about it, which isn't ideal given its capabilities. There's potential to integrate AI and machine learning for enhanced function...
What is your primary use case for Trivy?
I use Trivy ( /products/trivy-reviews ) to scan code for vulnerabilities before deployment. Our projects, which are developed by different developers, involve various dependencies and third-party c...
What advice do you have for others considering Trivy?
I recommend Trivy to others due to its powerful and useful features. However, I suggest increasing its marketing to raise awareness. I rate Trivy an eight out of ten.
 

Comparisons

 

Overview

 

Sample Customers

BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino
Information Not Available
Find out what your peers are saying about Orca Security vs. Trivy and other solutions. Updated: June 2025.
860,592 professionals have used our research since 2012.