Lacework vs Orca Security comparison

Cancel
You must select at least 2 products to compare!
Lacework Logo
4,572 views|3,619 comparisons
Orca Security Logo
6,929 views|4,573 comparisons
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Lacework and Orca Security based on real PeerSpot user reviews.

Find out what your peers are saying about Tenable Network Security, Qualys, Morphisec and others in Vulnerability Management.
To learn more, read our detailed Vulnerability Management Report (Updated: November 2022).
655,994 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It is very intuitive when it comes to policy administration, alerts and notifications, and ease of setting up roles at different hierarchies. It has also been good in terms of the network technology maps. It provides a good overview, but it also depends on the complexity of your network.""It's got a lot of great features.""The first valuable feature was the fact that it gave us a list of everything that users were surfing on the web. Having the list, we could make decisions about those sites.""Defender lets you orchestrate the roll-out from a single pane. Using the Azure portal, you can roll it out over all the servers covered by the entire subscription.""With respect to improving our security posture, it helps us to understand where we are in terms of compliance. We can easily know when we are below the standard because of the scores it calculates.""It isn't a highly complex solution. It's something that a lot of analysts can use. Defender gives you a broad overview of what's happening in your environment, and it's a great solution if you're a Microsoft shop.""Technical support is helpful.""The integration with Logic Apps allows for automated responses to incidents."

More Microsoft Defender for Cloud Pros →

"The best feature, in my opinion, is the ease of use."

More Lacework Pros →

"With its Cloud Security Posture Management capability, we have the ability to read across all of our cloud-based environments, which includes AWS and Azure. We have visibility into those environments. Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries.""There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report.""Orca provides X-ray vision into everything within the cloud properties, whereas normally, this would require multiple tools.""Orca's dashboard is excellent. My team needs to be able to focus on specific areas for improvement in our cloud environment. And most recently, we've started to get good use out of sonar, the search capabilities, and the alert creation.""The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments.""Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool.""Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks... You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca.""The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."

More Orca Security Pros →

Cons
"From my own perspective, they just need a product that is tailored to micro-segmentation so I can configure rules for multiple systems at once and manage it.""We would like to have better transparency as to how the security score is calculated because as it is now, it is difficult to understand.""You cannot create custom use cases.""Most of the time, when we log into the support, we don't get a chance to interact with Microsoft employees directly, except having it go to outsource employees of Microsoft. The initial interaction has not been that great because outsourced companies cannot provide the kind of quality or technical expertise that we look for. We have a technical manager from Microsoft, but they are kind of average unless we make noise and ask them to escalate. We then can get the right people and the right solution, but it definitely takes time.""The overview provides you with good information, but if you want more details, there is a lot more customization to do, which requires knowledge of the other supporting solutions.""One of the main challenges that we have been facing with Azure Security Center is the cost. The costs are really a complex calculation, e.g., to calculate the monthly costs. Azure is calculating on an hourly basis for use of the resource. Because of this, we found it really complex to promote what will be our costs for the next couple of months. I think if Azure could reduce the complex calculation and come up with straightforward cost mapping that would be very useful from a product point of view.""Consistency is the area where the most improvement is needed. For example, there are some areas where the UI is not uniform across the board.""Azure Security Center takes a long time to update, compared to the on-premises version of Microsoft Defender."

More Microsoft Defender for Cloud Cons →

"Visibility is lacking, and both compliance-related metrics and IAM security control could be improved."

More Lacework Cons →

"I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click.""Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance.""In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties.""They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it.""The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see.""We are PCI DSS compliant, so we need to scan our environment externally with tools vetted by the PCI DSS organization. Orca doesn't scan the environment externally. It only scans what's currently in the cloud.""There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. But relative to my other security tools, Orca is definitely the most stable that I've seen.""As with all software, the user interface can always be made simpler to use. It would be helpful for people with very little knowledge, like somebody sitting behind the SOC, to allow them to be able to drill down into things a little bit easier than it is currently."

More Orca Security Cons →

Pricing and Cost Advice
  • "Azure Defender is a bit pricey. The price could be lower."
  • "This is a worldwide service and depending on the country, there will be different prices."
  • "Security Center charges $15 per resource for any workload that you onboard into it. They charge per VM or per data-base server or per application. It's not like Microsoft 365 licensing, where there are levels like E3 and E5. Security Center is pretty straightforward."
  • "There is a helpful cost-reducing option that allows you to integrate production subscriptions with non-production subscriptions."
  • "Its pricing is a little bit high in terms of Azure Security Center, but the good thing is that we don't need to maintain and deploy it. So, while the pricing is high, it is native to Azure which is why we prefer using this tool."
  • "I am not involved in this area. However, I believe its price is okay because even small customers are using Azure Security Center. I don't think it is very expensive."
  • "The cost of the license is based on the subscriptions that you have."
  • "Although I am outside of the discussion on budget and costing, I can say that the importance of security provided by this solution is of such importance that whatever the cost is, it is not a factor."
  • More Microsoft Defender for Cloud Pricing and Cost Advice →

  • "The licensing fee was approximately $80,000 USD, per year."
  • More Lacework Pricing and Cost Advice →

  • "The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
  • "It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost."
  • "While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
  • "The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
  • "Overall, the pricing is reasonable and the discounts have been acceptable."
  • "I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
  • "Orca is very competitive when compared to the alternatives and is not the most expensive in the market, that's for sure."
  • More Orca Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    655,994 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Azure Security Center is very easy to use, integrates well, and gives very good visibility on what is happening across… more »
    Top Answer:The integration with Logic Apps allows for automated responses to incidents.
    Top Answer:This is a worldwide service and depending on the country, there will be different prices. There is a price calculator… more »
    Top Answer:Wiz and Lacework sucks... Buy Orca. 
    Top Answer:The best feature, in my opinion, is the ease of use.
    Top Answer:We purchase the license here. The licensing fee was approximately $80,000 USD, per year. There may be some discounts… more »
    Top Answer:Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to… more »
    Top Answer:The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we… more »
    Top Answer:I use it for our cloud security posture. Initially, the idea was to increase visibility because we had zero visibility… more »
    Comparisons
    Also Known As
    Microsoft Azure Security Center, Azure Security Center, Microsoft ASC, Azure Defender
    Polygraph
    Learn More
    Overview

    Microsoft Defender for Cloud protects your Azure and hybrid resources. Microsoft uses a wide variety of physical, infrastructure, and operational controls to help secure Azure—but there are additional actions you need to take to help safeguard your workloads. Turn on Azure Security Center to strengthen your cloud security posture. Within Azure Security Center, use Azure Defender to protect your hybrid cloud workloads. With Azure Security Center, you can:

    - Assess and visualize the security state of your resources in Azure, on-premises, and in other clouds with Azure Secure Score

    - Simplify enterprise compliance and view your compliance against regulatory requirements

    - Protect all your hybrid cloud workloads with Azure Defender, which is integrated with Security Center

    - Use AI and automation to cut through false alarms, quickly identify threats, and streamline threat investigation

    To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.

    Lacework is a cloud security platform whose Polygraph Data Platform automates cloud security at scale so customers can innovate with speed and safety. Lacework is the only security platform that can collect, analyze, and accurately correlate data across an organization’s AWS, Azure, GCP, and Kubernetes environments, and narrow it down to the handful of security events that matter. As a breach detection and investigation tool, Lacework provides information on when and how a breach happened, including the users, machines, and applications involved in the breach. By using machine learning and behavioral analytics, the solution can automatically learn what's normal for your environment and reveal any abnormal behavior. In addition, Lacework gives you continuous visibility to find vulnerabilities, misconfigurations, and malicious activity across your cloud environment.

    Lacework Features

    Lacework has many valuable key features. Some of the most useful ones include:

    • Dashboards
    • Reports
    • Workflow management
    • Administration console
    • Governance
    • Policy enforcement
    • Auditing
    • Access control
    • Workflow management
    • Compliance monitoring
    • Anomaly detection
    • Data loss prevention
    • Cloud gap analytics
    • Host compliance

    Lacework Benefits

    There are many benefits to implementing Lacework. Some of the biggest advantages the solution offers include:

    • Security visibility: Get deep observability into your cloud accounts, workloads, and microservices to give you tighter security control.
    • Threat detection: By using Lacework, your organization can identify common security events that target your cloud servers, containers, and infrastructure-as-a-service (IaaS) accounts so you can take action on them quickly.
    • Flexible deployment: With Lacework, you have the option to deploy the way you prefer - either agent or agentless - which provides the visibility needed to have maximum security for cloud accounts and systems. Because Lacework offers an easy-to-deploy layered approach, you gain quick time to value.
    • Configuration compliance: With the Lacework solution, you can easily spot IaaS account configurations that are non-compliant and identify opportunities to apply security best practices.
    • Synced teams: Lacework allows your teams to operate smarter and bridge the gap between security, Dev, and Ops regardless of your team's size or experience level.
    • Gain meaningful security insights: Lacework provides meaningful security insights, alerting you of issues before they reach production from your existing workflows. This way you can build apps quickly and confidently.
    • Increased revenue streams: Because the solution has built-in security from the first line of code early on, it helps users unlock higher revenue streams.
    • Helps avoid development delays: The Lacework solution helps you better prioritize security fixes by making security information accessible to DevOps and security teams for earlier risk mitigation that speeds innovation.
    • Increased productivity: Lacework provides alerts with all the context you need and eliminates data silos and costly investigations, enabling you to boost productivity.
    • Correlate and contextualize behaviors: Lacework can take attributes and data points from your unique environment and correlate them together into behaviors.
    • Simplified cloud security posture and compliance: With the Lacework platform, you can get comprehensive visibility and continuous tracking to reduce risks and meet compliance requirements so you can improve your bottom line.
    • Address vulnerabilities before it is too late: Lacework enables you to limit your attack surface so you can address the riskiest vulnerabilities early in the development cycle.

    The Orca Security Platform is a cloud-based platform that provides an end-to-end security solution for organizations. Orca helps to identify and prevent cyber attacks by scanning the network and identifying any vulnerabilities and breaches in the system. It also provides a detailed report of all the threats found on the system. It protects data from being compromised by encrypting it at all levels of storage and transmission. It also provides continuous monitoring of the system through its advanced AI engine, which detects any anomalies in your network activity while alerting you to them. The platform acts as a single agentless security tool that visualizes all cloud assets to detect security risks at every layer and prioritizes them.

    Orca Security has the capacity to detect zero-day attacks and can be used for endpoint protection. It also manages general IT security, ensuring that systems are up to date with the latest security patches.

    Orca offers deeper visibility into AWS, Azure, and Google Cloud without agents’ operational costs. The solution uses SideScanning technology to check for:

    • System vulnerabilities
    • Lateral movement risk
    • Malware
    • Misconfigurations
    • IAM risk
    • Compromised data

    Orca protects different forms of cloud assets, including serverless, containers, VPCs, keys, storage buckets, paused or stopped workloads, VMs, and devices that cannot support agents.

    Orca Security Goals

    Orca’s agentless cloud security tool is used to achieve three main goals:

    • Manage multi-cloud environments
    • Demonstrate regulatory compliance
    • Perform security due diligence

    Orca Security SideScanning Benefits

    Orca offers agentless cloud security with a patent-pending technology called SideScanning. SideScanning is a ground-breaking technology that is designed to find data leaks by passively monitoring the network perimeter for malicious activity. The technology is an enhancement to traditional network perimeter security. Its purpose is to provide a seamless view of the entire network, including endpoints, servers and infrastructure components. The success of Orca’s SideScanning technology lies in its ability to reduce the need for multiple tools to perform cloud vulnerability management.

    Orca Security Benefits

    • Agentless: SideScanning collects data externally. This is unlike parasitic agents that sit inside your workload. Orca creates a complete risk profile of your cloud estate in minutes by using read-only access to the workloads’ runtime block storage.

    • Unified data model: Orca combines workload-deep intelligence with cloud configuration metadata in order to build a visual risk context map of your entire cloud estate. This enables you to quickly discover all potential critical attack vectors.
    • Full visibility: Without running code or sending a single packet over the network, Orca’s SideScanning allows you to achieve complete visibility and coverage. This results in zero downtime and no impact on users or workloads.

    Reviews from Real Users

    Orca Security stands out among its competitors for a number of reasons. Two major ones are its ability to provide powerful dashboard visibility and its ability to gather specific intelligence through simple queries. PeerSpot users take note of the advantages of these features in their reviews:

    Shahar M., CISO at a recruiting firm, notes, “Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool.”

    Ty S., chief security and trust officer at SiSense, writes, “Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries.

    Offer
    Learn more about Microsoft Defender for Cloud
    Learn more about Lacework
    Learn more about Orca Security
    Sample Customers
    Microsoft Defender for Cloud is trusted by companies such as ASOS, Vatenfall, SWC Technology Partners, and more.
    J.Crew, AdRoll, Snowflake, VMWare, Iterable, Pure Storage, TrueCar, NerdWallet, and more.
    Autodesk, BeyondTrust, Carta, Databricks, Druva, Duolingo, Fiverr, Live Oak Bank, News Corp, NCR, Payoneer, Robinhood, Unity, and USA Today.
    Top Industries
    REVIEWERS
    Computer Software Company18%
    Agriculture12%
    Consumer Goods Company12%
    Real Estate/Law Firm6%
    VISITORS READING REVIEWS
    Computer Software Company21%
    Financial Services Firm11%
    Comms Service Provider8%
    Government6%
    VISITORS READING REVIEWS
    Computer Software Company25%
    Comms Service Provider7%
    Financial Services Firm7%
    Retailer5%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Financial Services Firm12%
    Comms Service Provider7%
    Manufacturing Company6%
    Company Size
    REVIEWERS
    Small Business26%
    Midsize Enterprise11%
    Large Enterprise63%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise13%
    Large Enterprise68%
    VISITORS READING REVIEWS
    Small Business29%
    Midsize Enterprise18%
    Large Enterprise54%
    REVIEWERS
    Small Business44%
    Midsize Enterprise56%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise14%
    Large Enterprise60%
    Buyer's Guide
    Vulnerability Management
    November 2022
    Find out what your peers are saying about Tenable Network Security, Qualys, Morphisec and others in Vulnerability Management. Updated: November 2022.
    655,994 professionals have used our research since 2012.

    Lacework is ranked 12th in Vulnerability Management with 1 review while Orca Security is ranked 7th in Vulnerability Management with 9 reviews. Lacework is rated 8.0, while Orca Security is rated 9.6. The top reviewer of Lacework writes "Detects pivotal anomalies faster, easy to install, and the technical support is helpful". On the other hand, the top reviewer of Orca Security writes "Agentless approach makes it simple, reducing the number of tools we use, while rankings helps focus our engineers". Lacework is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Amazon GuardDuty, Snyk and Threat Stack Cloud Security Platform, whereas Orca Security is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Tenable.io Vulnerability Management, Amazon GuardDuty and Ermetic CSPM.

    See our list of best Vulnerability Management vendors, best CWPP (Cloud Workload Protection Platforms) vendors, and best Cloud-Native Application Protection Platforms (CNAPP) vendors.

    We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.