BMC Helix Cloud Security vs Orca Security comparison

Cancel
You must select at least 2 products to compare!
Wiz Logo
7,061 views|5,622 comparisons
BMC Logo
1,604 views|1,301 comparisons
Orca Security Logo
6,929 views|4,573 comparisons
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BMC Helix Cloud Security and Orca Security based on real PeerSpot user reviews.

Find out what your peers are saying about Palo Alto Networks, Microsoft, Morphisec and others in CWPP (Cloud Workload Protection Platforms).
To learn more, read our detailed CWPP (Cloud Workload Protection Platforms) Report (Updated: November 2022).
655,711 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
Information Not Available
  • "The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
  • "It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost."
  • "While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
  • "The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
  • "Overall, the pricing is reasonable and the discounts have been acceptable."
  • "I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
  • "Orca is very competitive when compared to the alternatives and is not the most expensive in the market, that's for sure."
  • More Orca Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which CWPP (Cloud Workload Protection Platforms) solutions are best for your needs.
    655,711 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Wiz and Lacework sucks... Buy Orca. 
    Top Answer:The features that I've found most valuable are its container security aspect. I also like its vulnerability management… more »
    Top Answer:The pricing is based on an annual subscription, upfront, and it's based on cloud assets. Whether your assets are in… more »
    Top Answer:I think its TOA interfaces are still not that comfortable. The UI could be more user-friendly, easier to use. Now, the… more »
    Top Answer:Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to… more »
    Top Answer:The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we… more »
    Top Answer:I use it for our cloud security posture. Initially, the idea was to increase visibility because we had zero visibility… more »
    Comparisons
    Also Known As
    TrueSight Cloud Security, SecOps Policy Service
    Learn More
    Overview

    Wiz is reinventing cloud security from the inside out.

    We’re on a mission to help organizations effectively reduce risks in their Cloud and Kubernetes environments. Purpose-built for the unique complexities of multi-environment, multi-workload, and multi-project cloud estates, Wiz automatically correlates the critical risk factors to deliver actionable insights that don't waste time.

    Wiz connects in minutes using a 100% API-based approach that scans both platform configurations and inside every workload. Our full security stack context surfaces the toxic combinations that show the attackers’ view to a breach. Security and development teams use Wiz workflows to proactively remove risks and prevent them from becoming breaches.

    Get a demo | Wiz

    BMC Helix Cloud Security is a SaaS tool designed to help organizations reduce compliance and security lapses resulting from next-gen container and cloud technologies. The solution offers a fully transparent, user-friendly view of all compliance data gathered throughout container resources, cloud, and data centers. BMC Helix Cloud Security can be used to insert compliance inquiries precisely in DevOps workflows for immediate assessment in relation to critical “go, no-go” conclusions throughout  the entire workflow. 

    BMC Helix Cloud Security offers enterprise organizations a unique compliance solution with robust functionalities to concentrate on numerous use processes that may interfere with digital transfigurations, such as:

    • Discovering resources, accounts, and configurations that are non-compliant with standard regulations or the organization's own policies and protocols.

    • Multi-source cloud compliance for PaaS service infrastructures, networks, storage, and containers.

    • DevOps workflows with melded security and compliance for WebApp application blueprints and weaknesses, and all application libraries.

    • Out-of-box capabilities for immediate compliance integration for DevOps workflows.

    BMC Helix Cloud Security is SaaS, which makes it a very flexible solution. It is able to integrate seamlessly with many of today’s enterprises’ demands. BMC Helix Cloud Security can easily perform as a policy-as-code (YAML) based protocol language, open RESTful APIs, or by seamlessly compiling extensible data connectors.

    Many of today's enterprise organizations must comply with numerous policies and regulations to maintain effective operations. BMC Helix Cloud Security ensures an enterprise organization is able to satisfy regulatory standards such as Sarbanes-Oxley (SOX) Act, Defense Information System Agency (DISA), or any other stringent government or internal organizational compliance standards. The solution has a comprehensive compliance policy that utilizes mode-two capabilities and will ensure that an enterprise organization will greatly minimize or even negate the threat of ransomware and data breaches throughout its network. 

    BMC Helix Cloud Security will also see that container and container hosts are configured correctly and will then regularly audit to ensure compliance at the three important levels of compliance - images, daemon configuration, and host configuration.

    BMC Helix Cloud Security is designed to identify vulnerabilities by dissecting and thoroughly investigating compliance data for container and cloud resources and delivering the outcomes through a friendly, easy-to-understand dashboard. The solution can also provide support for unique or custom sources, provided that data is in a JavaScript Object Notation (JSON) format.

    BMC Helix Cloud security is also able to help discover and minimize vulnerabilities created by new services, objects, and resources instituted by containers and public clouds. These can sometimes be forgotten, creating a tremendous risk to an organization. BMC Helix Cloud Security will ensure these new services will be carefully and continually monitored to ensure industry and government standards and regulations are not being compromised. The solution is continually dissecting data and then will deliver outcomes in a dynamic, easy-to-understand dashboard.

    BMC Helix Cloud Security offers a user-friendly, robust, complete compliance strategy to ensure organizations maintain the highest levels of productivity and profitability while negating the risk of any type of compliance vulnerabilities.

    The Orca Security Platform is a cloud-based platform that provides an end-to-end security solution for organizations. Orca helps to identify and prevent cyber attacks by scanning the network and identifying any vulnerabilities and breaches in the system. It also provides a detailed report of all the threats found on the system. It protects data from being compromised by encrypting it at all levels of storage and transmission. It also provides continuous monitoring of the system through its advanced AI engine, which detects any anomalies in your network activity while alerting you to them. The platform acts as a single agentless security tool that visualizes all cloud assets to detect security risks at every layer and prioritizes them.

    Orca Security has the capacity to detect zero-day attacks and can be used for endpoint protection. It also manages general IT security, ensuring that systems are up to date with the latest security patches.

    Orca offers deeper visibility into AWS, Azure, and Google Cloud without agents’ operational costs. The solution uses SideScanning technology to check for:

    • System vulnerabilities
    • Lateral movement risk
    • Malware
    • Misconfigurations
    • IAM risk
    • Compromised data

    Orca protects different forms of cloud assets, including serverless, containers, VPCs, keys, storage buckets, paused or stopped workloads, VMs, and devices that cannot support agents.

    Orca Security Goals

    Orca’s agentless cloud security tool is used to achieve three main goals:

    • Manage multi-cloud environments
    • Demonstrate regulatory compliance
    • Perform security due diligence

    Orca Security SideScanning Benefits

    Orca offers agentless cloud security with a patent-pending technology called SideScanning. SideScanning is a ground-breaking technology that is designed to find data leaks by passively monitoring the network perimeter for malicious activity. The technology is an enhancement to traditional network perimeter security. Its purpose is to provide a seamless view of the entire network, including endpoints, servers and infrastructure components. The success of Orca’s SideScanning technology lies in its ability to reduce the need for multiple tools to perform cloud vulnerability management.

    Orca Security Benefits

    • Agentless: SideScanning collects data externally. This is unlike parasitic agents that sit inside your workload. Orca creates a complete risk profile of your cloud estate in minutes by using read-only access to the workloads’ runtime block storage.

    • Unified data model: Orca combines workload-deep intelligence with cloud configuration metadata in order to build a visual risk context map of your entire cloud estate. This enables you to quickly discover all potential critical attack vectors.
    • Full visibility: Without running code or sending a single packet over the network, Orca’s SideScanning allows you to achieve complete visibility and coverage. This results in zero downtime and no impact on users or workloads.

    Reviews from Real Users

    Orca Security stands out among its competitors for a number of reasons. Two major ones are its ability to provide powerful dashboard visibility and its ability to gather specific intelligence through simple queries. PeerSpot users take note of the advantages of these features in their reviews:

    Shahar M., CISO at a recruiting firm, notes, “Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool.”

    Ty S., chief security and trust officer at SiSense, writes, “Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries.

    Offer
    Learn more about Wiz
    Learn more about BMC Helix Cloud Security
    Learn more about Orca Security
    Sample Customers
    Wiz is the fastest growing software company ever - $100M ARR in 18 months: Wiz becomes the fastest-growing software company ever | Wiz Blog  Discover why companies, including Salesforce, Morgan Stanley, Fox, and Bridgewater choose Wiz as their cloud security partner. Read their success stories here: Customers | Wiz
    NHS, Vodafone, Kansas City Life, SKY Italia, Cybera
    Autodesk, BeyondTrust, Carta, Databricks, Druva, Duolingo, Fiverr, Live Oak Bank, News Corp, NCR, Payoneer, Robinhood, Unity, and USA Today.
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company18%
    Financial Services Firm15%
    Manufacturing Company6%
    Healthcare Company5%
    VISITORS READING REVIEWS
    Computer Software Company25%
    Financial Services Firm11%
    Government9%
    Comms Service Provider6%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Financial Services Firm12%
    Comms Service Provider7%
    Manufacturing Company6%
    Company Size
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise17%
    Large Enterprise63%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise8%
    Large Enterprise66%
    REVIEWERS
    Small Business44%
    Midsize Enterprise56%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise14%
    Large Enterprise60%
    Buyer's Guide
    CWPP (Cloud Workload Protection Platforms)
    November 2022
    Find out what your peers are saying about Palo Alto Networks, Microsoft, Morphisec and others in CWPP (Cloud Workload Protection Platforms). Updated: November 2022.
    655,711 professionals have used our research since 2012.

    BMC Helix Cloud Security is ranked 23rd in CWPP (Cloud Workload Protection Platforms) while Orca Security is ranked 6th in CWPP (Cloud Workload Protection Platforms) with 9 reviews. BMC Helix Cloud Security is rated 0.0, while Orca Security is rated 9.6. On the other hand, the top reviewer of Orca Security writes "Agentless approach makes it simple, reducing the number of tools we use, while rankings helps focus our engineers". BMC Helix Cloud Security is most compared with Prisma Cloud by Palo Alto Networks, Guardicore Centra, IBM Turbonomic and VMware Aria Automation, whereas Orca Security is most compared with Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud, Lacework, Tenable.io Vulnerability Management and Amazon GuardDuty.

    See our list of best CWPP (Cloud Workload Protection Platforms) vendors and best Cloud Security Posture Management (CSPM) vendors.

    We monitor all CWPP (Cloud Workload Protection Platforms) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.