Try our new research platform with insights from 80,000+ expert users

Imperva Data Security vs Orca Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Imperva Data Security
Ranking in Data Security Posture Management (DSPM)
12th
Average Rating
8.0
Reviews Sentiment
6.1
Number of Reviews
5
Ranking in other categories
No ranking in other categories
Orca Security
Ranking in Data Security Posture Management (DSPM)
9th
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
21
Ranking in other categories
Vulnerability Management (14th), Container Security (14th), Cloud Workload Protection Platforms (CWPP) (10th), API Security (5th), Cloud Security Posture Management (CSPM) (11th), Cloud-Native Application Protection Platforms (CNAPP) (6th), Cloud Detection and Response (CDR) (2nd)
 

Mindshare comparison

As of August 2025, in the Data Security Posture Management (DSPM) category, the mindshare of Imperva Data Security is 1.6%, up from 0.6% compared to the previous year. The mindshare of Orca Security is 7.3%, down from 10.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Security Posture Management (DSPM)
 

Featured Reviews

Samuel Adeyemi - PeerSpot reviewer
Real-time data monitoring and policy-based activity blocking enhance security and awareness
The development mode on the platform needs improvement. For example, the archiving functionalities should be enhanced to allow easy conversion of archived logs into CSV or Excel formats for data analysis. When I need to investigate with archived data, the inability to export to these formats can be limiting. Making this process easier would be beneficial for reviews.
CHINTAN MEHTA - PeerSpot reviewer
Consolidating security tools with comprehensive cloud visibility
The documentation for Orca Security could be improved. The compliance framework also needs enhancements, especially concerning integrations with other tools like ServiceNow's vulnerability modules, which are not as mature as expected. It should also increase its capability to ingest data from other security tools like CloudSight for endpoint detection and provide real-time monitoring.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I recommend the product to other users."
"The benefits are operational. The outcome comes from preventing an attack on the organization. On the operational side, you generally have good, decent security measures for your application, database, and digital assets."
"The most valuable features include a great level of automation, machine learning for attack validation, and a very flexible and comfortable management console."
"The time to detect vulnerabilities has gotten a lot quicker."
"If something malicious occurs, I can set a policy to block it, review the action, and decide whether to release it if it's found not to be malicious."
"There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report."
"One of the valuable features of Orca Security is its design and options that allow flexible filtering and user-friendly visualization."
"The reporting and automated remediation capabilities are valuable to me. They're real game-changers."
"I would rate the quality of support as nine stars out of ten due to their quick and helpful responses."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"Orca provides X-ray vision into everything within the cloud properties, whereas normally, this would require multiple tools."
"The best features of Orca Security include its ability to perform a lot of security controls without requiring any installation of agents, making it very easy to set up."
"With its Cloud Security Posture Management capability, we have the ability to read across all of our cloud-based environments, which includes AWS and Azure. We have visibility into those environments. Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries."
 

Cons

"The deployment is not easy."
"One area for improvement is the inclusion of a load balancer in on-premises solutions."
"Imperva Data Security needs to improve first-level support."
"The development mode on the platform needs improvement."
"The development mode on the platform needs improvement. For example, the archiving functionalities should be enhanced to allow easy conversion of archived logs into CSV or Excel formats for data analysis."
"I would like to see better customization options for security frameworks and better integration with reporting tools like Power BI or Grafana dashboards."
"They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it."
"Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance."
"Orca needs improvement in snoozing or dismissing specific alarms. Currently, snoozing dismisses all future vulnerabilities related to a CVE."
"Orca Security could improve its ticket creation process. Currently, it allows for creating tickets in only one bucket, which requires monitoring to redirect tickets to the appropriate team."
"The timeout settings could be made more customizable, as sometimes if I leave the office early, it's still running unless manually turned off."
"As with all software, the user interface can always be made simpler to use. It would be helpful for people with very little knowledge, like somebody sitting behind the SOC, to allow them to be able to drill down into things a little bit easier than it is currently."
"There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. But relative to my other security tools, Orca is definitely the most stable that I've seen."
 

Pricing and Cost Advice

"The pricing is reasonably good in South Africa."
"The price is a bit expensive for smaller organizations."
"The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
"The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
"While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
"Its license is a bit expensive."
"Orca Security charges are based on cloud workloads. So, it's based on workloads. If we look at one feature, it might be expensive."
"It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost."
"I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
report
Use our free recommendation engine to learn which Data Security Posture Management (DSPM) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Insurance Company
13%
Computer Software Company
12%
University
11%
Computer Software Company
15%
Financial Services Firm
12%
Manufacturing Company
10%
University
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Imperva Data Security?
The experience with pricing, setup cost, and licensing of Imperva Data Security varies; it depends from company to company.
What needs improvement with Imperva Data Security?
Areas of Imperva Data Security have room for improvement. I don't think every solution is perfect, but they need some kind of improvement in the future because if they have to survive in the market...
What is your primary use case for Imperva Data Security?
The typical use case for our clients using Imperva Data Security is that data is almost the most important asset for any organization. In case they lose their customer data, their reputation will b...
What do you like most about Orca Security?
It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just scan the entire assets in the cloud.
What needs improvement with Orca Security?
I really love the way Orca Security worked. A potential improvement could be additional security features for the two-step authentication, such as fingerprint recognition similar to what Checkpoint...
What is your primary use case for Orca Security?
We used Orca Security ( /products/orca-security-reviews ) for about two to three months until I left the company. The product itself is really good. It helped us streamline the way we access our se...
 

Overview

 

Sample Customers

Information Not Available
BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino
Find out what your peers are saying about Imperva Data Security vs. Orca Security and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.