Orca Security provides comprehensive security management with agentless visibility and SideScanning technology, ensuring efficient threat detection without performance impact.
Product | Market Share (%) |
---|---|
Orca Security | 5.7% |
Wiz | 20.8% |
Prisma Cloud by Palo Alto Networks | 11.3% |
Other | 62.2% |
Type | Title | Date | |
---|---|---|---|
Category | Cloud Security Posture Management (CSPM) | Oct 17, 2025 | Download |
Product | Reviews, tips, and advice from real users | Oct 17, 2025 | Download |
Comparison | Orca Security vs Wiz | Oct 17, 2025 | Download |
Comparison | Orca Security vs Prisma Cloud by Palo Alto Networks | Oct 17, 2025 | Download |
Comparison | Orca Security vs SentinelOne Singularity Cloud Security | Oct 17, 2025 | Download |
Title | Rating | Mindshare | Recommending | |
---|---|---|---|---|
Wiz | 4.5 | 20.8% | 96% | 26 interviewsAdd to research |
Datadog | 4.3 | 1.9% | 97% | 201 interviewsAdd to research |
Company Size | Count |
---|---|
Small Business | 9 |
Midsize Enterprise | 7 |
Large Enterprise | 5 |
Company Size | Count |
---|---|
Small Business | 317 |
Midsize Enterprise | 179 |
Large Enterprise | 742 |
Orca Security offers agentless visibility across multi-cloud environments, streamlining security management with features like SideScanning technology and centralized security tools. It focuses on automation, vulnerability management, and compliance checks, enhancing a company's security posture with real-time alerts and integrated threat detection. Its intuitive interface prioritizes critical issues, making it suitable for managing DevSecOps processes efficiently.
What are the key features of Orca Security?Companies in industries such as finance, healthcare, and technology leverage Orca Security for cloud security posture management, ensuring compliance with standards and securing applications and databases. Its agentless approach provides comprehensive visibility across AWS, GCP, and Azure, enhancing risk assessment and vulnerability management without impacting asset performance.
BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino
Author info | Rating | Review Summary |
---|---|---|
Cloud Security Automation Engineer at a financial services firm with 10,001+ employees | 4.0 | We used Orca Security for cloud security, particularly for CSPM and vulnerability assessment. Its agentless setup simplified deployment, replacing many tools and improving visibility to 100%. However, the documentation and compliance framework could benefit from enhancements. |
Senior Information Security Engineer at a computer software company with 10,001+ employees | 4.0 | I use Orca Security for managing cloud security posture, finding its flexible filtering and visualization valuable. While it effectively identifies vulnerabilities and compliance issues, it needs better management options for snoozing alarms and handling alerts with multiple files. |
Software Developer at a tech vendor with 1,001-5,000 employees | 4.5 | I found Orca Security significantly enhanced our server access and security without relying on a VPN. While the multi-tenant architecture effectively managed alerts, I suggest improving two-step authentication features and timeout settings for added convenience. |
Vulnerability Assessment Analyst at a computer software company with 501-1,000 employees | 4.0 | I use Orca Security for cloud security and vulnerability alerts. Its seamless integration and side scanning technology are valuable. However, ticket creation could improve by allowing segregation for different projects, and reporting OS package vulnerabilities needs enhancement. |
enterprise architect at a tech services company with 1-10 employees | 4.5 | We implement Orca Security for clients who value its excellent GUI and threat intelligence features. However, it needs a central management system similar to Palo Alto Panorama. Customers often choose it due to its presence in Gartner's Top 5. |
Works at Ultraviolet Cyber | 4.0 | I use Orca Security primarily for cloud security and posture management. Its CIEM and CDR features are invaluable, but the automatic scan runs only every 24 hours, which limits timely detection. I have not used any alternatives. |
Presales Security Engineer / CSM at Cybersel Group | 4.5 | We use Orca Security to detect misconfigurations and vulnerabilities without needing an agent. The solution's detailed analysis can be overwhelming for nontechnical users, though it provides significant value to those with technical expertise, especially in cloud environments. |
Cloud Security Contractor at TripAdvisor | 5.0 | I use Orca Security for posture management to comply with frameworks like CIS and NIST. Its reporting and automated remediation are transformative. Although customization could improve, it offers good ROI and outperformed solutions like Lacework due to features and integration. |