No more typing reviews! Try our Samantha, our new voice AI agent.

Orca Security vs Sysdig Monitor comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
118
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd), AI Observability (2nd)
Orca Security
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
30
Ranking in other categories
Vulnerability Management (10th), Container Security (10th), Cloud Workload Protection Platforms (CWPP) (5th), API Security (4th), Cloud Security Posture Management (CSPM) (7th), Cloud-Native Application Protection Platforms (CNAPP) (5th), Data Security Posture Management (DSPM) (8th), Cloud Detection and Response (CDR) (2nd), AI Security (3rd)
Sysdig Monitor
Average Rating
8.0
Reviews Sentiment
6.2
Number of Reviews
4
Ranking in other categories
Container Monitoring (9th)
 

Mindshare comparison

Cloud-Native Application Protection Platforms (CNAPP) Mindshare Distribution
ProductMindshare (%)
Orca Security6.3%
Wiz17.4%
Prisma Cloud by Palo Alto Networks12.4%
Other63.9%
Cloud-Native Application Protection Platforms (CNAPP)
Container Monitoring Mindshare Distribution
ProductMindshare (%)
Sysdig Monitor2.1%
Dynatrace28.5%
Datadog24.6%
Other44.8%
Container Monitoring
 

Featured Reviews

SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.
reviewer2799597 - PeerSpot reviewer
Soc Analyst at a tech consulting company with 11-50 employees
Agentless cloud security has improved attack path visibility but still needs stronger real-time blocking
Yes, as per my experience, it has been very helpful. In our organization, we did not find any major or priority one kind of alerts or risks because we had a very good infrastructure structure and cybersecurity architecture built in our organization. Orca Security helped us find what vulnerabilities or gaps existed which we could improve within our architecture. It helped us in such a way that we used to close the open ports and only allowed internal IPs for necessity. For staging environments and for prod we had DOS protection. If network traffic showed that anybody was trying to flood our systems, we would only accept all and our client-related IPs or an approved list of vendor lists we would have. We would get to know where the gaps are and where the improvements we could make. Being an analyst class engineer, I could use my brain in those areas and it was very helpful to have Orca Security in my arsenal.
Bharath Nadar - PeerSpot reviewer
Senior Staff Site Reliability Engineer at a tech vendor with 501-1,000 employees
Centralized host monitoring has reduced operational overhead and provides trusted dashboards
Sysdig Monitor could be improved, particularly regarding application monitoring. There are specific areas or features where improvement is needed, specifically in application-level monitoring. While other monitoring solutions provide APM capabilities, Sysdig Monitor does not and targets only host-based monitoring. Many applications require APM support, and we want to introduce OpenTelemetry into some applications to gain more insights, but with Sysdig Monitor, we could not implement this functionality, so we have to opt for solutions from other vendors for those applications. Beyond the APM and OpenTelemetry support limitations, I would appreciate seeing Sysdig Monitor offer a unified solution for all monitoring needs, including logging as well, eventually bringing whole observability under one roof. That would be ideal.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Singularity Cloud Workload Security provides us with better security detection and more visibility. It is another resource that we can use to detect vulnerabilities in our company's systems. For example, it can help us detect new file processes that we are not familiar with, which could be used by attackers to exploit our systems. Singularity Cloud Workload Security can also help us diagnose and analyze data to determine whether it is malicious or not. Singularity Cloud Workload Security is like another pair of eyes that can help us protect our systems from cyberattacks."
"The visibility provided by SentinelOne Singularity Cloud Security around infrastructure was very valuable."
"We've seen a reduction in resources devoted to vulnerability monitoring. Before SentinelOne Singularity Cloud Security we spent a lot of time monitoring and fixing these issues. SentinelOne Singularity Cloud Security enabled us to divert more resources to the production environment."
"The most valuable features of SentinelOne Singularity Cloud Security are cloud misconfiguration, Kubernetes, and IaC scanning."
"The features that stand out are threat detection using advanced artificial intelligence and machine learning, helping to identify and respond to threats in real-time."
"The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue."
"The solution helped free other staff to work on other projects or other tasks. We basically just had to do a bunch of upfront configuring. With it, we do not have to spend as much time in the console."
"SentinelOne Singularity Cloud Security has saved up to 50 percent in engineering time."
"The most valuable feature of Orca Security is the automated scanning tool, user-friendliness, and ease of use."
"Orca's platform provides an agentless data collection facility that collects information directly from the cloud using APIs, with zero impact on performance."
"Before starting with Orca, I was blind; think about someone who was blind and now they can see, it's a new world."
"With the way it works, having visibility across the org is hands down the biggest benefit for us."
"The GUI features are very good. Threat intelligence is also very good."
"I find Orca Security's CIEM feature invaluable, as it focuses on entitlement and posture management, identifying assets with older OS versions, and asset misconfiguration."
"I would rate the quality of support as nine stars out of ten due to their quick and helpful responses."
"Orca Security has patented technologies. It's an agentless solution, so you don't need to install an agent. Instead, it contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure."
"Sysdig Monitor impressed me with its in-depth visibility into my infrastructure."
"The ability to stop/pause and capture logs when something happens is the most valuable feature."
"Docker containers are completely supported, kind of like "first class citizens"."
"Sysdig Monitor has positively impacted my organization by significantly reducing operational costs and improving our ability to monitor our systems effectively."
"Docker containers are completely supported, kind of like first class citizens."
"The ability to stop/pause and capture logs when something happens is the most valuable feature."
 

Cons

"The dashboard can be more detailed."
"We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks."
"There is no break-glass account feature. They should implement this as soon as possible because we can't implement SSO without a break-glass feature."
"One area that could be improved in SentinelOne Singularity Cloud Security is their policies; the way they have configured the policies could be enhanced."
"If I had to pick a complaint, it would be the way the hosts are listed in the tool. You have different columns separated by endpoint name, Cloud Account, and Cloud Instances ID. I wish there was something where we could change the endpoint name and not use just the IP address. We would like to have custom names or our own names for the instances. If I had a complaint, that would be it, but so far, it meets all the needs that we have."
"There is room for improvement in the current active licensing model for SentinelOne Singularity Cloud Security."
"We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in SentinelOne Singularity Cloud Security."
"Orca Security can improve the way that a customer can create auto-remediation without depending on support to do that."
"In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties."
"Orca Security can be improved as there should be some kind of central pane of glass. Similar to how cloud management works, Orca Security should have something comparable."
"I think the downside of Orca Security is the reports."
"A notable limitation with Orca Security is its scanning feature. The automatic scan only runs every 24 hours, and if an alert is remediated within an hour, it still remains until the next scheduled scan."
"They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it."
"It's not all clouds that they are currently onboarded with. For instance, they are not yet with public cloud and many other private clouds."
"I would be happy if they offered more automatic remediation options."
"Sysdig Monitor could be improved, particularly regarding application monitoring."
"It is needs to automate the actions to take when an alert is triggered."
""Events" reporting (errors, crashes, etc.) is not clear at all in a Mesos environment (i.e., it's not clear what specific container is the one that went down). In a Docker Compose environment, it may be way better."
"It needs to automate the actions to take when an alert is triggered."
""Events" reporting (errors, crashes, etc.) is not clear at all in a Mesos environment (i.e., it's not clear what specific container is the one that went down). In a Docker Compose environment, it may be way better."
"I had difficulty installing Sysdig Monitor on Windows."
 

Pricing and Cost Advice

"SentinelOne offers excellent pricing and licensing options."
"The tool is cost-effective."
"PingSafe's primary advantage is its ability to consolidate multiple tools into a single user interface, but, beyond this convenience, it may not offer significant additional benefits to justify its price."
"We have an enterprise license. It is affordable. I'm not sure, but I think we pay 150,000 rupees per month."
"PingSafe is priced reasonably for our workload."
"Singularity Cloud Security by SentinelOne is cost-efficient."
"The features included in PingSafe justify its price point."
"It's a fair price for what you get. We are happy with the price as it stands."
"Orca Security is cheaper compared to other solutions in the same space."
"While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
"The price is a bit expensive for smaller organizations."
"It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost."
"We have a total of 25 licenses for this solution. The solution is on a pay-and-you-use model."
"Overall, the pricing is reasonable and the discounts have been acceptable."
"Orca is very competitive when compared to the alternatives and is not the most expensive in the market, that's for sure."
"The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
"Sysdig Monitor is not expensive."
report
Use our free recommendation engine to learn which Cloud-Native Application Protection Platforms (CNAPP) solutions are best for your needs.
885,789 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
9%
Government
5%
Financial Services Firm
15%
Computer Software Company
12%
Manufacturing Company
9%
Healthcare Company
5%
Financial Services Firm
14%
Outsourcing Company
13%
Computer Software Company
10%
Construction Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business49
Midsize Enterprise22
Large Enterprise55
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise8
Large Enterprise8
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
Regarding the pricing for SentinelOne Singularity Cloud Security, I do not think it is something I can compare.
What needs improvement with PingSafe?
I do not see room for improvement in SentinelOne Singularity Cloud Security. In the future, I would like to see the i...
What do you like most about Orca Security?
It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just ...
What needs improvement with Orca Security?
The price is one thing I would like to see improved because the pricing is a little elevated, as the pricing is based...
What is your primary use case for Orca Security?
My use cases for Orca Security include working with the sales team and the pre-sales team to offer Orca Security in t...
What is your experience regarding pricing and costs for Sysdig Monitor?
My experience with pricing, setup cost, and licensing was good. Before moving forward with Sysdig Monitor, we analyze...
What needs improvement with Sysdig Monitor?
Sysdig Monitor could be improved, particularly regarding application monitoring. There are specific areas or features...
What is your primary use case for Sysdig Monitor?
Sysdig Monitor has become essential for overseeing a vast array of hosts and EC2 instances across our environment. We...
 

Also Known As

PingSafe
No data available
No data available
 

Overview

 

Sample Customers

Information Not Available
BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino
SAP Concur, Goldman Sachs, Worldpay by FIS, Cisco, Experian, Home Office, Societe Generale, Sunrun. More here: https://sysdig.com/customers/
Find out what your peers are saying about Orca Security vs. Sysdig Monitor and other solutions. Updated: July 2025.
885,789 professionals have used our research since 2012.