

Both Imperva Data Security Fabric and Orca Security compete in the data security market, with Imperva showing strength in threat alerts and monitoring, and Orca's advantage being its cloud-native capabilities. Orca tends to be favored by organizations prioritizing cloud infrastructures due to its ease of use.
Features: Imperva Data Security Fabric offers comprehensive threat alerts, database activity monitoring, and a modular approach to compliance. It integrates database firewalls and web application security to address security and availability needs. Orca Security's standout feature is its SideScanning technology, providing deep insights without agents. It efficiently prioritizes vulnerabilities and supports strong cloud and container security management.
Room for Improvement: Imperva users suggest enhancing the design and user interface, improving documentation, and audit logging, and streamlining configuration management. On the other hand, Orca could benefit from better automation in remediation, expanding anti-malware capabilities, and providing more user education on new features.
Ease of Deployment and Customer Service: Imperva is preferable for robust on-premises and hybrid support, though it might involve significant effort initially. Customer service experiences are varied. Orca stands out in cloud deployments, offering efficient public cloud integration that often results in a smooth experience with generally positive feedback on support.
Pricing and ROI: Imperva's pricing is generally higher, targeting enterprises with substantial databases and promising good ROI on large deployments. Its flexibility in licensing is noted, but costs can be high for smaller entities. Orca offers competitive pricing for comprehensive cloud security, which is seen as fair given its capabilities, though some find it higher than competitors. Both solutions assure significant ROI through enhanced security and operational savings.
My thoughts on the pricing, setup cost, and licensing of the Imperva SecureSphere Database Security are that it could be more competitive.
Orca Security significantly improved our visibility from 30% to 100%, enabling better security posture improvements rather than just general cost savings.
Local vendors provide on-ground support, and if issues cannot be resolved, a support ticket is raised to the OEM via a portal.
Regarding customer support, I would like to see improvements in response time.
I would rate the quality of support as nine stars out of ten due to their quick and helpful responses.
The expertise levels could be improved.
The support team assists with issues and provides information on new updates.
The solution works well for large organizations and enterprise levels if appropriately sized during the setup.
The scalability of the Imperva SecureSphere Database Security in accommodating the organization's growth and database security needs is excellent.
When you onboard an organization, Orca will find new projects, folders, and resources without any additional effort required.
The seamless integration allows us to automatically reflect any connected project from our cloud into the console.
I believe Orca Security is scalable and can handle small and medium-enterprise businesses effectively.
It is important to manage it correctly by performing health checks with the vendor.
I rate the stability of Imperva SecureSphere Database Security as nine because there are ongoing integration processes between Imperva and Thales.
I personally have not encountered any bugs or issues with the console.
I have experienced very little downtime.
I do not experience downtime, bugs, or glitches.
The archiving functionalities should be enhanced to allow easy conversion of archived logs into CSV or Excel formats for data analysis.
We cannot be competitive by price alone, though in terms of quality, Imperva SecureSphere Database Security is the best compared to Russian import products and building products such as Garda, which attempt to copy Imperva's data activity monitoring and database firewall functionality.
Another improvement is in handling alerts for multiple files with the same CVE; it should provide an option to manage each file separately without affecting others.
Orca Security could improve in reporting OS package vulnerabilities, such as missing MS patches or Linux patches.
Security in today's age is important, and if a company can afford it, they should get it as it's the most valuable protection against threats.
The price is high, but it is not as high as competitors like IBM, Guardian, and Oracle.
The initial price seemed high, however, after negotiation, the final price was ideal.
Orca Security's pricing is known to be a bit high.
Its license is a bit expensive.
The Imperva SecureSphere Database Security has significantly aided my organization in forensic investigations and compliance audits.
Imperva SecureSphere Database Security provides one of the best solutions to analyze data, maintain GDPR compliance, and help investigate any incidents.
If something malicious occurs, I can set a policy to block it, review the action, and decide whether to release it if it's found not to be malicious.
Additionally, it covers a large scope of vulnerabilities, CVEs, malware, and misconfiguration.
It provided us with visibility from a central point, increasing our view from the previous thirty percent to a full one hundred percent of our cloud environment.
This technology allows for coverage of almost all cloud assets without interrupting their operations.
| Product | Market Share (%) |
|---|---|
| Orca Security | 5.3% |
| Imperva Data Security Fabric | 2.0% |
| Other | 92.7% |


| Company Size | Count |
|---|---|
| Small Business | 26 |
| Midsize Enterprise | 9 |
| Large Enterprise | 32 |
| Company Size | Count |
|---|---|
| Small Business | 10 |
| Midsize Enterprise | 8 |
| Large Enterprise | 6 |
Imperva Data Security Fabric provides cutting-edge database security, featuring capabilities like activity monitoring, web application firewalls, and real-time alerting for comprehensive data protection.
Imperva Data Security Fabric focuses on securing databases through advanced monitoring, logging, and user behavior analysis. With features designed for ease of configuration, it effectively blocks unauthorized access and maintains detailed audit logs. Integration with other systems and automated reporting enhance vulnerability assessments and compliance efforts. Imperva's data discovery, classification, and masking capabilities strengthen security by managing user rights and uncovering vulnerabilities, making it ideal for protecting sensitive data and supporting forensic and compliance needs.
What are the key features of Imperva Data Security Fabric?Imperva Data Security Fabric is widely used across industries like finance and government, focusing on database security, activity monitoring, and user behavior analysis. It is essential for detecting unauthorized access and preventing data breaches while ensuring compliance. Financial institutions and government agencies leverage its capabilities to maintain data integrity and monitor database activities, implementing firewalls and vulnerability assessments that secure on-premises and cloud environments.
Orca Security provides comprehensive security management with agentless visibility and SideScanning technology, ensuring efficient threat detection without performance impact.
Orca Security offers agentless visibility across multi-cloud environments, streamlining security management with features like SideScanning technology and centralized security tools. It focuses on automation, vulnerability management, and compliance checks, enhancing a company's security posture with real-time alerts and integrated threat detection. Its intuitive interface prioritizes critical issues, making it suitable for managing DevSecOps processes efficiently.
What are the key features of Orca Security?
What benefits and ROI should companies look for in Orca Security?
Companies in industries such as finance, healthcare, and technology leverage Orca Security for cloud security posture management, ensuring compliance with standards and securing applications and databases. Its agentless approach provides comprehensive visibility across AWS, GCP, and Azure, enhancing risk assessment and vulnerability management without impacting asset performance.
We monitor all Data Security Posture Management (DSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.