We changed our name from IT Central Station: Here's why

Lightspin vs Orca Security comparison

Cancel
You must select at least 2 products to compare!
Lightspin Logo
51 views|35 comparisons
Orca Security Logo
1,631 views|1,295 comparisons
Featured Review
Find out what your peers are saying about Palo Alto Networks, Microsoft, Check Point and others in Cloud Workload Security. Updated: January 2022.
564,322 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
  • "The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
  • "It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost."
  • "While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
  • "The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
  • "Overall, the pricing is reasonable and the discounts have been acceptable."
  • "I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
  • More Orca Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Cloud Workload Security solutions are best for your needs.
    564,322 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer: 
    The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments.
    Top Answer: 
    In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties. I would like to see support for FedRAMP… more »
    Top Answer: 
    We manufacture cloud solutions and we employ Orca Security to monitor them.
    Ranking
    30th
    Views
    51
    Comparisons
    35
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    7th
    Views
    1,631
    Comparisons
    1,295
    Reviews
    7
    Average Words per Review
    2,052
    Rating
    9.7
    Comparisons
    Learn More
    Overview

    Continuously visualize, detect, and block any attack path in your cloud and Kubernetes environment.

    Orca Security, the cloud security innovation leader, provides instant-on security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents or sidecars.

    Give your team superpowers and simplify cloud security operations with a single CNAPP platform for workload and data protection, cloud security posture management, vulnerability management, and compliance management. Instead of disparate tools operating in silos, Orca Security builds a graph that encompasses all cloud assets, software, connectivity, and trust - then prioritizes risk based on the severity of the underlying security issue, its accessibility, and business impact. This eliminates thousands of meaningless security alerts and helps you focus on what matters most.

    With Orca Security, no code runs within your cloud environment. Orca SideScanning™ reads your cloud configuration and workloads’ runtime block storage out-of-band, detecting vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and unsecured PII. There are no overlooked assets, no DevOps headaches, and no performance hits on live environments.

    Offer
    Learn more about Lightspin
    Learn more about Orca Security
    Sample Customers
    Information Not Available
    Autodesk, BeyondTrust, Carta, Databricks, Druva, Duolingo, Fiverr, Live Oak Bank, News Corp, NCR, Payoneer, Robinhood, Unity, and USA Today.
    Top Industries
    No Data Available
    VISITORS READING REVIEWS
    Comms Service Provider27%
    Computer Software Company27%
    Financial Services Firm10%
    Manufacturing Company4%
    Company Size
    No Data Available
    REVIEWERS
    Small Business38%
    Midsize Enterprise63%
    Find out what your peers are saying about Palo Alto Networks, Microsoft, Check Point and others in Cloud Workload Security. Updated: January 2022.
    564,322 professionals have used our research since 2012.

    Lightspin is ranked 30th in Cloud Workload Security while Orca Security is ranked 7th in Cloud Workload Security with 8 reviews. Lightspin is rated 0.0, while Orca Security is rated 9.6. On the other hand, the top reviewer of Orca Security writes "Agentless approach makes it simple, reducing the number of tools we use, while rankings helps focus our engineers". Lightspin is most compared with , whereas Orca Security is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Lacework, Salt Security API Protection Platform and Skybox Security Suite.

    See our list of best Cloud Workload Security vendors and best Cloud Security Posture Management (CSPM) vendors.

    We monitor all Cloud Workload Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.