

XM Cyber and Orca Security are competing in the cybersecurity solutions category. Orca Security appears to have an upper hand due to its emphasis on cloud-native protection, which is valuable for cloud-dependent infrastructures.
Features: XM Cyber provides advanced attack simulation, breach detection capabilities, and excels in attack path management and continuous exposure management to prevent cyber threats. Orca Security offers agentless cloud security, focuses on visibility in cloud environments, and provides automated compliance checks, making it beneficial for cloud-focused organizations.
Room for Improvement: XM Cyber could enhance its cloud security features, improve seamless integration for smoother deployment, and offer more cost-effective solutions for smaller enterprises. Orca Security may benefit from expanding its capabilities beyond cloud environments, bolstering advanced threat simulation tools, and enhancing customization options to cater to diverse enterprise needs.
Ease of Deployment and Customer Service: XM Cyber's deployment involves customized settings for complex environments and is supported by responsive customer service. Orca Security offers a smoother deployment with its agentless architecture, ensuring rapid integration. Its customer service is effective, resulting in high satisfaction rates.
Pricing and ROI: XM Cyber has higher initial setup costs due to sophisticated simulation technology, offering justified ROI for detailed attack path analysis. Orca Security provides a more cost-effective setup, delivering attractive ROI for cloud-centric operations with efficient cloud integration.
Orca Security significantly improved our visibility from 30% to 100%, enabling better security posture improvements rather than just general cost savings.
I see the benefits of Orca Security immediately because you can see the issues right after deployment, and you can correct the critical issues, so the proof of value is immediate.
Orca Security roughly reduced the operating expenses by around 20-50%.
There was a specific issue that our other security tooling did not pick up, but XM Cyber did.
It's reduced the timescale to remediate vulnerabilities that are identified as representing a high risk.
I would rate the quality of support as nine stars out of ten due to their quick and helpful responses.
The expertise levels could be improved.
The support team assists with issues and provides information on new updates.
The customer support is fantastic; it's probably some of the best we've received across all our security vendors.
Customer support for XM Cyber is good, responsive, and it follows up on issues.
When you onboard an organization, Orca will find new projects, folders, and resources without any additional effort required.
The seamless integration allows us to automatically reflect any connected project from our cloud into the console.
I believe Orca Security is scalable and can handle small and medium-enterprise businesses effectively.
Its scalability is great; it's easy to deploy and fully scalable.
We have not experienced any issues with scalability or reached its limits.
I personally have not encountered any bugs or issues with the console.
I have experienced very little downtime.
I do not experience downtime, bugs, or glitches.
We have quite a complex and large IT estate, and we've certainly experienced no limitations or problems arising from the ability of XM Cyber's product to scale across that estate.
Another improvement is in handling alerts for multiple files with the same CVE; it should provide an option to manage each file separately without affecting others.
Orca Security could improve in reporting OS package vulnerabilities, such as missing MS patches or Linux patches.
Security in today's age is important, and if a company can afford it, they should get it as it's the most valuable protection against threats.
We push the boundaries with digital twins; I understand XM Cyber uses a similar concept of graph databases to map environments.
They could improve support because when we need to create a super case and escalate to resolve with technical support, they resolve our ticket in approximately two weeks.
The part that can be improved is the mobile exposure and the IBM i specific equipment.
The initial price seemed high, however, after negotiation, the final price was ideal.
Orca Security's pricing is known to be a bit high.
Its license is a bit expensive.
We have a large, complicated estate, and in the licensing discussions, we were keen not to have the cost balloon because of the complication, the number of PCs and servers that we have.
Additionally, it covers a large scope of vulnerabilities, CVEs, malware, and misconfiguration.
It provided us with visibility from a central point, increasing our view from the previous thirty percent to a full one hundred percent of our cloud environment.
This technology allows for coverage of almost all cloud assets without interrupting their operations.
Our loss exposure amount has reduced significantly, leading to two big wins: our loss exposure amount has gone down, and we have direct savings from focusing our team's time on what's important, allowing them to work on other business benefits and generate value for the company.
By far, the best feature of XM Cyber is being able to map out the way vulnerabilities can be exploited based on what they call the choke points in the network where the path that a bad actor would take comes closest to assets within our environment that are most vulnerable but also most valuable.
XM Cyber allows us to quantify the risk, and we are able to track remediation, so we can quantify the risk at an executive level and also to a technical IT team.
| Product | Market Share (%) |
|---|---|
| Orca Security | 2.6% |
| XM Cyber | 1.0% |
| Other | 96.4% |

| Company Size | Count |
|---|---|
| Small Business | 12 |
| Midsize Enterprise | 7 |
| Large Enterprise | 8 |
Orca Security provides comprehensive security management with agentless visibility and SideScanning technology, ensuring efficient threat detection without performance impact.
Orca Security offers agentless visibility across multi-cloud environments, streamlining security management with features like SideScanning technology and centralized security tools. It focuses on automation, vulnerability management, and compliance checks, enhancing a company's security posture with real-time alerts and integrated threat detection. Its intuitive interface prioritizes critical issues, making it suitable for managing DevSecOps processes efficiently.
What are the key features of Orca Security?
What benefits and ROI should companies look for in Orca Security?
Companies in industries such as finance, healthcare, and technology leverage Orca Security for cloud security posture management, ensuring compliance with standards and securing applications and databases. Its agentless approach provides comprehensive visibility across AWS, GCP, and Azure, enhancing risk assessment and vulnerability management without impacting asset performance.
XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. Our attack path management platform continuously uncovers hidden attack paths to your critical assets across cloud and on-prem environments, so you can cut them off at key junctures and eradicate risk with a fraction of the effort. This overcomes the big disconnect that security teams experience when they’re presented with endless alerts, yet can’t see which exposures impact risk the most, how they come together to be exploited by an attacker, or how to efficiently eliminate them. This approach is a complete game-changer, which is why some of the world’s largest, most complex organizations choose XM Cyber to help eradicate risk. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.