We performed a comparison between Check Point CloudGuard Posture Management and Orca Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Orca Security is strong in container security and has an easy-to-use compliance dashboard. Check Point CloudGuard Posture Management provides comprehensive 360 security and detailed reports and recommendations for errors. Orca Security could increase its coverage and provide code-level security checks, while also improving its collaboration with third-party vendors. Meanwhile, Check Point CloudGuard Posture Management should enhance its reporting options, lower its price, and enhance its ability to investigate security events.
Service and Support: Orca Security's customer service receives positive feedback for their efficient and knowledgeable technical support staff, fast response times, and openness to receive feedback. In comparison, Check Point CloudGuard Posture Management has a mixed reputation, with some satisfied customers and others expressing dissatisfaction with technical support.
Ease of Deployment: Orca Security's initial setup is user-friendly, agentless, efficient, and requires minimal maintenance compared to Check Point CloudGuard Posture Management. While Check Point's setup is generally simple, it may require professional deployment and team collaboration.
Pricing: Orca Security has a straightforward and reasonable pricing system for setup costs, which includes all standard licensing fees and does not require any additional expenses for networking or computing. In comparison, Check Point CloudGuard Posture Management has a variable pricing and licensing system that is viewed differently by different users. While some consider the setup cost to be manageable and simple, others find it costly. CloudGuard's licensing model is based on the cloud infrastructure's size, which is seen by some as rigid and expensive.
ROI: Orca Security saves users money by replacing multiple solutions and offering a deep view into the environment with minimal IT knowledge required. On the other hand, Check Point CloudGuard Posture Management is priced higher but offers security and compliance solutions that can result in a 35% ROI growth rate.
Comparison Results: Orca Security is a preferred option over Check Point CloudGuard Posture Management due to its agentless approach, user-friendly interface, and competitive pricing. Its SideScanning feature is particularly impressive, providing excellent visibility into cloud environments. On the other hand, Check Point CloudGuard Posture Management has received mixed reviews regarding its customer service and support, and its pricing is considered expensive by some users.
"The vulnerability management modules and the discovery and inventory are the most valuable features. Before using Wiz, it was a very manual process for both. After implementing it, we're able to get all of the analytics into a single platform that gives us visibility across all the systems in our cloud. We're able to correspond and understand what the vulnerability landscape looks like a lot faster."
"I like Wiz's reporting, and it's easy to do queries. For example, it's pretty simple to find out how many servers we have and the applications installed on each. I like Wiz's security graph because you can use it to see the whole organization even if you have multiple accounts."
"The solution is very user-friendly."
"The automation roles are essential because we ultimately want to do less work and automate more. The dashboards are easy to read and visually pleasing. You can understand things quickly, which makes it easy for our other teams. The network and infrastructure teams don't know as much about security as we do, so it helps to have a tool that's accessible and nice to look at."
"The product supports out-of-the-box reporting with context about the asset and allows us to perform complex custom queries on UI."
"The first thing that stood out was the ease of installation and the quick value we got out of the solution."
"The CSPM module has been the most effective. It was easy to deploy and covered all our accounts through APIs, requiring no agents. Wiz provides instant visibility into high-level risks that we need to address."
"The security baseline and vulnerability assessments is the valuable feature."
"Check Point CloudGuard CNAPP's initial configuration is very easy. It is plug-and-play. It also gives regular updates."
"I can take proactive actions based on an alert without having to interact with the platform directly."
"The product allows us to enhance the security of the implementations we have."
"We really liked its ease of implementation against our Microsoft Azure environment."
"The automatic learning and an AI engine help to find more modern vulnerability problems."
"This solution helps to keep everything visible, and it also alerts us if something is wrong, such as if someone opened extra ports or services that they are not supposed to. This is a valuable tool for monitoring and maintaining our cloud environment."
"It provides the most useful tools for protecting our financial account records from hackers."
"Assets Management as it provide complete visibility of our workload inkling EC2 instance or Serverless"
"Orca Security has updated its interface, making it more user-friendly. I find it particularly useful as it allows me to easily navigate the dashboard and prioritize actions based on severity and criticality."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just scan the entire assets in the cloud."
"The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments."
"The reporting and automated remediation capabilities are valuable to me. They're real game-changers."
"There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report."
"The most valuable feature of Orca Security is the automated scanning tool, user-friendliness, and ease of use."
"Orca's dashboard is excellent. My team needs to be able to focus on specific areas for improvement in our cloud environment. And most recently, we've started to get good use out of sonar, the search capabilities, and the alert creation."
"We wish there were a way, beyond providing visibility and automated remediation, to wait on a given remediation, due to a critical aspect, such as the cost associated with a particular upgrade... We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately."
"We would like to see improvements to executive-level reporting and data reporting in general, which we understand is being rolled out to the platform."
"The only small pain point has been around some of the logging integrations. Some of the complexities of the script integrations aren't supported with some of the more automated infrastructure components. So, it's not as universal. For example, they have great support for cloud formation and other services, but if you're using another type of management utility or governance language for your infrastructure-as-code automation components, it becomes a little bit trickier to navigate that."
"The reporting isn't that great. They have executive summaries, but it's only a compliance report that maps all current issues to specific controls. Whether you look at one subscription or project, regardless of the size, you will get a multipage report on how the issues in that account map to that control. Our CSO isn't going to read through that. He won't filter that out or show that to his leadership and say, "Here's what we're doing." It isn't a helpful report. They're working on it, but it's a poor executive summary."
"One significant issue is that the searches are case-sensitive, so finding a misconfigured resource can become very challenging."
"Wiz's reporting capabilities could be refined a bit. They are making headway on that, but more executive-style dashboards would be nice. They just implemented a community aspect where you can share documents and feedback. This was something users had been requesting for a while. They are listening to customer feedback and making changes."
"We're looking at some of the data compliance stuff that they've got Jon offer. I know they're looking at container security, which we gonna be looking at next."
"The remediation workflow within the Wiz could be improved."
"It should have some options to activate API calls to the platform in the cloud, another improvement would be that when the rules are colonized and they want to be published."
"The price of this solution should be reduced so that it is more affordable to scale."
"The false positives can be annoying at times."
"Currently, I would like this solution extended to cellular devices or tablets."
"The reporting has a lot of opportunities to continuously improve so that we can continue to show value."
"We want to be able to customize the solution more in order to meet the needs of our company."
"In general, for the product to be successful, they need to improve security, and configuration detection."
"The Check Point solution is somewhat expensive."
"Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance."
"The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see."
"I would like to see better customization options for security frameworks and better integration with reporting tools like Power BI or Grafana dashboards."
"There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. But relative to my other security tools, Orca is definitely the most stable that I've seen."
"In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties."
"The solution could improve by making the dashboards more elaborative and more descriptive."
"The presentation of the data in the dashboard is a little bit chaotic."
"The interface can be a bit cranky and sometimes takes a lot of time to load."
Check Point CloudGuard CNAPP is ranked 5th in Vulnerability Management with 60 reviews while Orca Security is ranked 7th in Vulnerability Management with 14 reviews. Check Point CloudGuard CNAPP is rated 8.6, while Orca Security is rated 9.4. The top reviewer of Check Point CloudGuard CNAPP writes "Threat intel integration provides us visibility in case any workload is communicating with suspicious or blacklisted IPs". On the other hand, the top reviewer of Orca Security writes "Allows agentless data collection directly from the cloud". Check Point CloudGuard CNAPP is most compared with Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Microsoft Defender for Cloud, Qualys VMDR and Trend Vision One - Cloud Security, whereas Orca Security is most compared with Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud, Tenable Vulnerability Management, CrowdStrike Falcon Cloud Security and Lacework. See our Check Point CloudGuard CNAPP vs. Orca Security report.
See our list of best Vulnerability Management vendors, best Cloud Workload Protection Platforms (CWPP) vendors, and best Cloud-Native Application Protection Platforms (CNAPP) vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.