Orca Security vs Wiz comparison

Cancel
You must select at least 2 products to compare!
Orca Security Logo
6,929 views|4,573 comparisons
Wiz Logo
Read 1 Wiz review
7,061 views|5,622 comparisons
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Orca Security and Wiz based on real PeerSpot user reviews.

Find out what your peers are saying about Tenable Network Security, Qualys, Morphisec and others in Vulnerability Management.
To learn more, read our detailed Vulnerability Management Report (Updated: November 2022).
657,397 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable features are ransomware protection and access controls. The solution has helped us secure some folders on our systems from unauthorized modifications.""It isn't a highly complex solution. It's something that a lot of analysts can use. Defender gives you a broad overview of what's happening in your environment, and it's a great solution if you're a Microsoft shop.""It helps you to identify the gaps in your solution and remediate them. It produces a compliance checklist against known standards such as ISO 27001, HIPAA, iTrust, etc.""One important security feature is the incident alerts. Now, with all these cyberattacks, there are a lot of incident alerts that get triggered. It is very difficult to keep monitoring everything automatically, instead our organization is utilizing the automated use case that we get from Microsoft. That has helped bring down the manual work for a lot of things.""It's got a lot of great features.""The security alerts and correlated alerts are most valuable. It correlates the logs and gives us correlated alerts, which can be fed into any security information and event management (SIEM) tool. It is an analyzed correlation tool for monitoring security. It gives us alerts when there is any kind of unauthorized access, or when there is any malfunctioning in multifactor authentication (MFA). If our Azure is connected with Azure Security Center, we get to know what types of authentication are happening in our infra.""The security policy is the most valuable feature for us. We can go into the environment settings and attach any globally recognized framework like ISO or any benchmark.""Using Security Center, you have a full view, at any given time, of what's deployed, and that is something that is very useful."

More Microsoft Defender for Cloud Pros →

"With its Cloud Security Posture Management capability, we have the ability to read across all of our cloud-based environments, which includes AWS and Azure. We have visibility into those environments. Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries.""Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks... You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca.""Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool.""Orca's platform provides an agentless data collection facility that collects information directly from the cloud using APIs, with zero impact on performance.""Orca's dashboard is excellent. My team needs to be able to focus on specific areas for improvement in our cloud environment. And most recently, we've started to get good use out of sonar, the search capabilities, and the alert creation.""The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments.""There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report.""Orca provides X-ray vision into everything within the cloud properties, whereas normally, this would require multiple tools."

More Orca Security Pros →

"Out of all the features, the one item that has been most valuable is the fact that Wiz puts into context all the pieces that create an issue, and applies a particular risk evaluation that helps us prioritize when we need to address a misconfiguration, vulnerability, or any issue that would put our environment into risk."

More Wiz Pros →

Cons
"After getting a recommendation, it takes time for the solution to refresh properly to show that the problem has been eliminated.""I would like to see better automation when it comes to pushing out security features to the recommendations, and better documentation on the step-by-step procedures for enabling certain features.""Another thing that could be improved was that they could recommend processes on how to react to alerts, or recommend best practices based on how other organizations do things if they receive an alert about XYZ.""The product was a bit complex to set up earlier, however, it is a bit streamlined now.""As an analyst, there is no way to configure or create a playbook to automate the process of flagging suspicious domains.""There is no perfect product in the world and there are always features that can be added.""Microsoft sources most of their threat intelligence internally, but I think they should open themselves up to bodies that provide feel intelligence to build a better engine. There may be threats out there that they don't report because their team is not doing anything on that and they don't have arrangements with another party that is involved in that research.""I felt that there was disconnection in terms of understanding the UI. The communication for moving from the old UI to the new UI could be improved. It was a bit awkward."

More Microsoft Defender for Cloud Cons →

"There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. But relative to my other security tools, Orca is definitely the most stable that I've seen.""We are PCI DSS compliant, so we need to scan our environment externally with tools vetted by the PCI DSS organization. Orca doesn't scan the environment externally. It only scans what's currently in the cloud.""The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see.""I would be happy if they offered more automatic remediation options. They're working on that, but the more the better. For example, if they want you to harden a server, they would offer a hardening script that would be more aware of what's going on.""They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it.""I would like to see an option to do security checks on a code level. This is possible because they have access to all of the code running in the cloud provider, and combining their site-scanning solution with that would be a nice add-on.""As with all software, the user interface can always be made simpler to use. It would be helpful for people with very little knowledge, like somebody sitting behind the SOC, to allow them to be able to drill down into things a little bit easier than it is currently.""I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click."

More Orca Security Cons →

"We wish there were a way, beyond providing visibility and automated remediation, to wait on a given remediation, due to a critical aspect, such as the cost associated with a particular upgrade... We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately."

More Wiz Cons →

Pricing and Cost Advice
  • "Azure Defender is a bit pricey. The price could be lower."
  • "This is a worldwide service and depending on the country, there will be different prices."
  • "Security Center charges $15 per resource for any workload that you onboard into it. They charge per VM or per data-base server or per application. It's not like Microsoft 365 licensing, where there are levels like E3 and E5. Security Center is pretty straightforward."
  • "There is a helpful cost-reducing option that allows you to integrate production subscriptions with non-production subscriptions."
  • "Its pricing is a little bit high in terms of Azure Security Center, but the good thing is that we don't need to maintain and deploy it. So, while the pricing is high, it is native to Azure which is why we prefer using this tool."
  • "I am not involved in this area. However, I believe its price is okay because even small customers are using Azure Security Center. I don't think it is very expensive."
  • "The cost of the license is based on the subscriptions that you have."
  • "Although I am outside of the discussion on budget and costing, I can say that the importance of security provided by this solution is of such importance that whatever the cost is, it is not a factor."
  • More Microsoft Defender for Cloud Pricing and Cost Advice →

  • "The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
  • "It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost."
  • "While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
  • "The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
  • "Overall, the pricing is reasonable and the discounts have been acceptable."
  • "I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
  • "Orca is very competitive when compared to the alternatives and is not the most expensive in the market, that's for sure."
  • More Orca Security Pricing and Cost Advice →

  • "The pricing seems pretty simple. We don't have to do a lot of calculations to figure out what the components are. They do it by enabling specific features, either basics or advanced, which makes it easy to select."
  • More Wiz Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    657,397 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Azure Security Center is very easy to use, integrates well, and gives very good visibility on what is happening across… more »
    Top Answer:The integration with Logic Apps allows for automated responses to incidents.
    Top Answer:This is a worldwide service and depending on the country, there will be different prices. There is a price calculator… more »
    Top Answer:Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to… more »
    Top Answer:The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we… more »
    Top Answer:I use it for our cloud security posture. Initially, the idea was to increase visibility because we had zero visibility… more »
    Top Answer:Wiz and Lacework sucks... Buy Orca. 
    Comparisons
    Also Known As
    Microsoft Azure Security Center, Azure Security Center, Microsoft ASC, Azure Defender
    Learn More
    Overview

    Microsoft Defender for Cloud protects your Azure and hybrid resources. Microsoft uses a wide variety of physical, infrastructure, and operational controls to help secure Azure—but there are additional actions you need to take to help safeguard your workloads. Turn on Azure Security Center to strengthen your cloud security posture. Within Azure Security Center, use Azure Defender to protect your hybrid cloud workloads. With Azure Security Center, you can:

    - Assess and visualize the security state of your resources in Azure, on-premises, and in other clouds with Azure Secure Score

    - Simplify enterprise compliance and view your compliance against regulatory requirements

    - Protect all your hybrid cloud workloads with Azure Defender, which is integrated with Security Center

    - Use AI and automation to cut through false alarms, quickly identify threats, and streamline threat investigation

    To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.

    The Orca Security Platform is a cloud-based platform that provides an end-to-end security solution for organizations. Orca helps to identify and prevent cyber attacks by scanning the network and identifying any vulnerabilities and breaches in the system. It also provides a detailed report of all the threats found on the system. It protects data from being compromised by encrypting it at all levels of storage and transmission. It also provides continuous monitoring of the system through its advanced AI engine, which detects any anomalies in your network activity while alerting you to them. The platform acts as a single agentless security tool that visualizes all cloud assets to detect security risks at every layer and prioritizes them.

    Orca Security has the capacity to detect zero-day attacks and can be used for endpoint protection. It also manages general IT security, ensuring that systems are up to date with the latest security patches.

    Orca offers deeper visibility into AWS, Azure, and Google Cloud without agents’ operational costs. The solution uses SideScanning technology to check for:

    • System vulnerabilities
    • Lateral movement risk
    • Malware
    • Misconfigurations
    • IAM risk
    • Compromised data

    Orca protects different forms of cloud assets, including serverless, containers, VPCs, keys, storage buckets, paused or stopped workloads, VMs, and devices that cannot support agents.

    Orca Security Goals

    Orca’s agentless cloud security tool is used to achieve three main goals:

    • Manage multi-cloud environments
    • Demonstrate regulatory compliance
    • Perform security due diligence

    Orca Security SideScanning Benefits

    Orca offers agentless cloud security with a patent-pending technology called SideScanning. SideScanning is a ground-breaking technology that is designed to find data leaks by passively monitoring the network perimeter for malicious activity. The technology is an enhancement to traditional network perimeter security. Its purpose is to provide a seamless view of the entire network, including endpoints, servers and infrastructure components. The success of Orca’s SideScanning technology lies in its ability to reduce the need for multiple tools to perform cloud vulnerability management.

    Orca Security Benefits

    • Agentless: SideScanning collects data externally. This is unlike parasitic agents that sit inside your workload. Orca creates a complete risk profile of your cloud estate in minutes by using read-only access to the workloads’ runtime block storage.

    • Unified data model: Orca combines workload-deep intelligence with cloud configuration metadata in order to build a visual risk context map of your entire cloud estate. This enables you to quickly discover all potential critical attack vectors.
    • Full visibility: Without running code or sending a single packet over the network, Orca’s SideScanning allows you to achieve complete visibility and coverage. This results in zero downtime and no impact on users or workloads.

    Reviews from Real Users

    Orca Security stands out among its competitors for a number of reasons. Two major ones are its ability to provide powerful dashboard visibility and its ability to gather specific intelligence through simple queries. PeerSpot users take note of the advantages of these features in their reviews:

    Shahar M., CISO at a recruiting firm, notes, “Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool.”

    Ty S., chief security and trust officer at SiSense, writes, “Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries.

    Wiz is reinventing cloud security from the inside out.

    We’re on a mission to help organizations effectively reduce risks in their Cloud and Kubernetes environments. Purpose-built for the unique complexities of multi-environment, multi-workload, and multi-project cloud estates, Wiz automatically correlates the critical risk factors to deliver actionable insights that don't waste time.

    Wiz connects in minutes using a 100% API-based approach that scans both platform configurations and inside every workload. Our full security stack context surfaces the toxic combinations that show the attackers’ view to a breach. Security and development teams use Wiz workflows to proactively remove risks and prevent them from becoming breaches.

    Get a demo | Wiz

    Offer
    Learn more about Microsoft Defender for Cloud
    Learn more about Orca Security
    Learn more about Wiz
    Sample Customers
    Microsoft Defender for Cloud is trusted by companies such as ASOS, Vatenfall, SWC Technology Partners, and more.
    Autodesk, BeyondTrust, Carta, Databricks, Druva, Duolingo, Fiverr, Live Oak Bank, News Corp, NCR, Payoneer, Robinhood, Unity, and USA Today.
    Wiz is the fastest growing software company ever - $100M ARR in 18 months: Wiz becomes the fastest-growing software company ever | Wiz Blog  Discover why companies, including Salesforce, Morgan Stanley, Fox, and Bridgewater choose Wiz as their cloud security partner. Read their success stories here: Customers | Wiz
    Top Industries
    REVIEWERS
    Computer Software Company18%
    Agriculture12%
    Consumer Goods Company12%
    Security Firm6%
    VISITORS READING REVIEWS
    Computer Software Company21%
    Financial Services Firm11%
    Comms Service Provider8%
    Government6%
    VISITORS READING REVIEWS
    Computer Software Company19%
    Financial Services Firm12%
    Comms Service Provider7%
    Manufacturing Company6%
    VISITORS READING REVIEWS
    Computer Software Company18%
    Financial Services Firm14%
    Manufacturing Company6%
    Healthcare Company5%
    Company Size
    REVIEWERS
    Small Business26%
    Midsize Enterprise11%
    Large Enterprise63%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise13%
    Large Enterprise68%
    REVIEWERS
    Small Business44%
    Midsize Enterprise56%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise15%
    Large Enterprise60%
    VISITORS READING REVIEWS
    Small Business21%
    Midsize Enterprise17%
    Large Enterprise63%
    Buyer's Guide
    Vulnerability Management
    November 2022
    Find out what your peers are saying about Tenable Network Security, Qualys, Morphisec and others in Vulnerability Management. Updated: November 2022.
    657,397 professionals have used our research since 2012.

    Orca Security is ranked 7th in Vulnerability Management with 9 reviews while Wiz is ranked 17th in Vulnerability Management with 1 review. Orca Security is rated 9.6, while Wiz is rated 9.0. The top reviewer of Orca Security writes "Agentless approach makes it simple, reducing the number of tools we use, while rankings helps focus our engineers". On the other hand, the top reviewer of Wiz writes "Multiple features help us prioritize remediation, and agentless implementation reduces overhead". Orca Security is most compared with Prisma Cloud by Palo Alto Networks, Lacework, Tenable.io Vulnerability Management, Amazon GuardDuty and Ermetic CSPM, whereas Wiz is most compared with Lacework, Prisma Cloud by Palo Alto Networks, Snyk, Tenable.io Container Security and Ermetic CSPM.

    See our list of best Vulnerability Management vendors, best CWPP (Cloud Workload Protection Platforms) vendors, and best Cloud Security Posture Management (CSPM) vendors.

    We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.