No more typing reviews! Try our Samantha, our new voice AI agent.

Orca Security vs WithSecure Elements Exposure Management (XM) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 18, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Orca Security
Ranking in Vulnerability Management
10th
Ranking in Cloud Security Posture Management (CSPM)
7th
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
32
Ranking in other categories
Container Security (8th), Cloud Workload Protection Platforms (CWPP) (5th), API Security (3rd), Cloud-Native Application Protection Platforms (CNAPP) (5th), Data Security Posture Management (DSPM) (7th), Cloud Detection and Response (CDR) (2nd), AI Security (3rd)
WithSecure Elements Exposur...
Ranking in Vulnerability Management
78th
Ranking in Cloud Security Posture Management (CSPM)
37th
Average Rating
10.0
Reviews Sentiment
6.6
Number of Reviews
1
Ranking in other categories
Continuous Threat Exposure Management (CTEM) (27th)
 

Mindshare comparison

As of May 2026, in the Vulnerability Management category, the mindshare of Orca Security is 2.2%, down from 3.9% compared to the previous year. The mindshare of WithSecure Elements Exposure Management (XM) is 0.5%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Mindshare Distribution
ProductMindshare (%)
Orca Security2.2%
WithSecure Elements Exposure Management (XM)0.5%
Other97.3%
Vulnerability Management
 

Featured Reviews

reviewer2799597 - PeerSpot reviewer
Soc Analyst at a tech consulting company with 11-50 employees
Agentless cloud security has improved attack path visibility but still needs stronger real-time blocking
Yes, as per my experience, it has been very helpful. In our organization, we did not find any major or priority one kind of alerts or risks because we had a very good infrastructure structure and cybersecurity architecture built in our organization. Orca Security helped us find what vulnerabilities or gaps existed which we could improve within our architecture. It helped us in such a way that we used to close the open ports and only allowed internal IPs for necessity. For staging environments and for prod we had DOS protection. If network traffic showed that anybody was trying to flood our systems, we would only accept all and our client-related IPs or an approved list of vendor lists we would have. We would get to know where the gaps are and where the improvements we could make. Being an analyst class engineer, I could use my brain in those areas and it was very helpful to have Orca Security in my arsenal.
PP
System Specialist at Fix-Forum Oy
Stable, scalable, and can be deployed on both cloud and on-premises
We usually need the solution to have extra protection against data breaches, as we have seen with our customers. The solution is deployed on the public cloud The solution works both outside and on-premises of the company, thus preventing secondary breaches from reaching the company's data. The…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I find Orca Security's CIEM feature invaluable, as it focuses on entitlement and posture management, identifying assets with older OS versions, and asset misconfiguration."
"It covers our entire multi-cloud environment in a single view and tells us everything we need to know about our vulnerability footprint."
"Orca Security is easier to use than other alternatives; you need a little skill to dominate Orca Security compared to other options and Orca Security is more user-friendly and in this case is more enjoyable."
"With its Cloud Security Posture Management capability, we have the ability to read across all of our cloud-based environments, which includes AWS and Azure. We have visibility into those environments. Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries."
"Orca Security integration was one of the easiest we have done because it is cloud-native and agentless."
"I appreciate Orca Security because I can see CSPM, KSPM, and DSPM, and it works with major security frameworks such as NIST and CIS, allowing me to see comprehensive insights on my cloud environment, with CI/CD integration and shift-left configuration that helps me improve cloud maturity and DevSecOps maturity as a complete CNAPP platform with the most capabilities to work with cloud security."
"The most valuable feature of Orca Security is the automated scanning tool, user-friendliness, and ease of use."
"The best features of Orca Security include its ability to perform a lot of security controls without requiring any installation of agents, making it very easy to set up."
"The solution works both outside and on-premises of the company, thus preventing secondary breaches from reaching the company's data."
 

Cons

"The difference between agentless and agent solutions is that while agentless provides great visibility, it does not offer real-time blocking."
"There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. But relative to my other security tools, Orca is definitely the most stable that I've seen."
"The interface can be a bit cranky and sometimes takes a lot of time to load."
"Orca needs improvement in snoozing or dismissing specific alarms."
"Orca Security could improve its ticket creation process."
"I experienced some problems with custom tags in Orca Security where I tried to separate the environment for business units so I could ask the tech lead responsible for that vulnerability to fix them."
"Orca Security can be improved as there should be some kind of central pane of glass. Similar to how cloud management works, Orca Security should have something comparable."
"Orca Security could improve its ticket creation process. Currently, it allows for creating tickets in only one bucket, which requires monitoring to redirect tickets to the appropriate team."
"The cost of the solution has room for improvement."
 

Pricing and Cost Advice

"I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
"We have a total of 25 licenses for this solution. The solution is on a pay-and-you-use model."
"The price is a bit expensive for smaller organizations."
"Its license is a bit expensive."
"The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
"The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
"While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
"It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost."
"The cost of the solution is mid-ranged but worth the price."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
893,221 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
12%
Manufacturing Company
9%
Comms Service Provider
5%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise8
Large Enterprise9
No data available
 

Questions from the Community

What do you like most about Orca Security?
It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just scan the entire assets in the cloud.
What needs improvement with Orca Security?
The price is one thing I would like to see improved because the pricing is a little elevated, as the pricing is based on the quantity of workloads. However, I think that since Orca Security is a me...
What is your primary use case for Orca Security?
My use cases for Orca Security include working with the sales team and the pre-sales team to offer Orca Security in the Chilean market with an integrator or a partner of Orca Security. The real imp...
Ask a question
Earn 20 points
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino
Information Not Available
Find out what your peers are saying about Wiz, Tenable, Qualys and others in Vulnerability Management. Updated: May 2026.
893,221 professionals have used our research since 2012.