Orca Security OverviewUNIXBusinessApplication

Orca Security is the #3 ranked solution in top Vulnerability Management tools, #3 ranked solution in Cloud Workload Protection Platforms, #3 ranked solution in top Cloud-Native Application Protection Platforms (CNAPP) tools, and #5 ranked solution in top Cloud Security Posture Management (CSPM) tools. PeerSpot users give Orca Security an average rating of 9.4 out of 10. Orca Security is most commonly compared to Wiz: Orca Security vs Wiz. Orca Security is popular among the large enterprise segment, accounting for 62% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 17% of all views.
Orca Security Buyer's Guide

Download the Orca Security Buyer's Guide including reviews and more. Updated: May 2023

What is Orca Security?

Orca Security is a cloud security platform that offers agentless data collection, vulnerability management, compliance dashboard, and continuous monitoring for AWS, GCP, and Azure accounts. Its Cloud Security Posture Management capability provides visibility into cloud environments and identifies threats and vulnerabilities. 

Orca Security's automation and alerting capabilities simplify security and reduce overhead, while its non-intrusive approach enables monitoring of serverless applications and reduces attack surfaces. It provides a one-size-fits-all solution, simplifying security and reducing confusion and redundancy. Orca Security improves security by addressing high-risk threats first and providing assurance of coverage across multiple accounts.

The solution uses SideScanning technology to check for:

  • System vulnerabilities
  • Lateral movement risk
  • Malware
  • Misconfigurations
  • IAM risk
  • Compromised data

Orca protects different forms of cloud assets, including serverless, containers, VPCs, keys, storage buckets, paused or stopped workloads, VMs, and devices that cannot support agents.

Orca Security Goals

Orca’s agentless cloud security tool is used to achieve three main goals:

  • Manage multi-cloud environments
  • Demonstrate regulatory compliance
  • Perform security due diligence

Orca Security SideScanning Benefits

Orca offers agentless cloud security with a patent-pending technology called SideScanning. SideScanning is a ground-breaking technology that is designed to find data leaks by passively monitoring the network perimeter for malicious activity. The technology is an enhancement to traditional network perimeter security. Its purpose is to provide a seamless view of the entire network, including endpoints, servers and infrastructure components. The success of Orca’s SideScanning technology lies in its ability to reduce the need for multiple tools to perform cloud vulnerability management.

Orca Security Benefits

  • Agentless: SideScanning collects data externally. This is unlike parasitic agents that sit inside your workload. Orca creates a complete risk profile of your cloud estate in minutes by using read-only access to the workloads’ runtime block storage.

  • Unified data model: Orca combines workload-deep intelligence with cloud configuration metadata in order to build a visual risk context map of your entire cloud estate. This enables you to quickly discover all potential critical attack vectors.
  • Full visibility: Without running code or sending a single packet over the network, Orca’s SideScanning allows you to achieve complete visibility and coverage. This results in zero downtime and no impact on users or workloads.

Reviews from Real Users

Orca Security stands out among its competitors for a number of reasons. Two major ones are its ability to provide powerful dashboard visibility and its ability to gather specific intelligence through simple queries. PeerSpot users take note of the advantages of these features in their reviews:

Shahar M., CISO at a recruiting firm, notes, “Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool.”

Ty S., chief security and trust officer at SiSense, writes, “Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries.

Orca Security Customers

Autodesk, BeyondTrust, Carta, Databricks, Druva, Duolingo, Fiverr, Live Oak Bank, News Corp, NCR, Payoneer, Robinhood, Unity, and USA Today.

Orca Security Video

Orca Security Pricing Advice

What users are saying about Orca Security pricing:
  • "The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
  • "Orca is very competitive when compared to the alternatives and is not the most expensive in the market, that's for sure."
  • "The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
  • "It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost."
  • "I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
  • "While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
  • Orca Security Reviews

    Filter by:
    Filter Reviews
    Industry
    Loading...
    Filter Unavailable
    Company Size
    Loading...
    Filter Unavailable
    Job Level
    Loading...
    Filter Unavailable
    Rating
    Loading...
    Filter Unavailable
    Considered
    Loading...
    Filter Unavailable
    Order by:
    Loading...
    • Date
    • Highest Rating
    • Lowest Rating
    • Review Length
    Search:
    Showingreviews based on the current filters. Reset all filters
    CISO at a media company with 201-500 employees
    Real User
    Agentless approach makes it simple, reducing the number of tools we use, while rankings helps focus our engineers
    Pros and Cons
    • "Orca's SideScanning is the biggest feature. It's the 'wow' factor... With Orca's SideScanning, they just need permissions for your account and that makes it so simple."
    • "Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks... You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca."
    • "I would be happy if they offered more automatic remediation options. They're working on that, but the more the better. For example, if they want you to harden a server, they would offer a hardening script that would be more aware of what's going on."
    • "Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance."

    What is our primary use case?

    The first two things you need to do in security are to know what you have and keep it updated. If you can do that you're going to stop 90-plus percent of security attacks. That's our first use case. To know what we have and keep it updated. In general, it's really hard to do that in the cloud. It can take multiple systems and a lot of overhead to do it. That's one of the main things we use Orca for, so that we always know what we have and make sure it's updated.

    On top of that, we use it to build things that have to do with our security posture. For example, are the ports that are supposed to be closed actually closed? For the data that's going through PII, is something open that shouldn't be? Are the permissions as they should be, per best practices? Is the compliance level correct for PCI and CIS, et cetera? There are many use cases around the posture of our environment, including the endpoints and the workloads. 

    Overall, we use Orca for anything that has to do with making sure we check all the boxes and cover all our bases. It's a very core product for cloud security.

    How has it helped my organization?

    Orca is saving us at least one full-time role. As we scale, it will be more. When I started using Orca, we were a company of about 100 people. As we grow and get more complex, as our environment gets bigger, it saves us more time. It could be hours per account and hours per patching cycle. We're two years in with Orca and now we're somewhat spoiled because it's very seamless. But in the beginning it was very noticeable. There were all of those annoying tasks that I don't have to do anymore. I spent hours on Excel spreadsheets, frustrated by vulnerabilities that I didn't know what to do with. Now, I don't even have to look at spreadsheets. It saves our team hours and hours, especially in our field of Fintech, which is super-audited.

    It also helps with hardening our posture by baselining everything in our workloads and servers against best practices. It gives you a path to improvement. Even if you don't have a glaring gap or an open port, you can always improve your security posture. By way of analogy, if you as a person don't stand up straight, you can work on standing up straight. But then you can also go to the gym and get stronger. There are levels to posture. You can stand straight but you can also become super-buff. The same thing is true with any other posture. Orca helps us take care of the gaps because we get notified very fast, but then we want to improve. Maybe we can take down some services that nobody is using and improve based on other best-practice baselines. Orca has done an amazing job of adding more and more.

    Orca's platform provides agentless data collection directly from your cloud configuration, from the workloads, and from the servers running the workloads. The SideScanning ability can take a snapshot of an EC2 instance and they can do whatever they want with it because it's a snapshot. It's not being used by anyone, so nobody feels it. There is zero impact. Orca uses that to provide all this information and that's a great ability. They can do malware analysis and a lot of things that, in an agentless solution, it's hard to do. The lack of performance impact is important because, as a payments company, we can't try to pay Walmart and not be able to because the CISO decided to put some heavy agents in the backend. But another important aspect is that it keeps the maintenance and the overhead down. That is what excites me, aside from the performance. You can circumvent performance issues, but you need people to work on overhead-related tasks.

    The agentless approach decreases the number of tools we have to use. Orca covers off a few posture-related tools. For example, Palo Alto has a few modules, a few tools, that you have to run together to give you similar value.

    What is most valuable?

    Orca's SideScanning is the biggest feature. It's the "wow" factor. There are a few other solutions with that kind of functionality, but before Orca, nobody would do it. They would say, "You just have to put an agent somewhere, and we have to read your logs," and there was a lot of overhead and you had to make sure you kept these requirements happening. You always had to configure things to work. With Orca's SideScanning, they just need permissions for your account and that makes it so simple. It just works. And you get the insights that are super important.

    Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks. The one resource that's very finite is your engineers' time. Every CISO has the same problem: they have engineers, but not enough of them, and their engineers don't have enough time. Because of these limitations, the engineers need to focus on the most important tasks, and they need help to do that. The fact that Orca can take something that looks like a 10 out of 10, a critical CVE, and say, "Wait a second. It's not that important, because of A, B, C, D, E, and F reasons. You can delay it for your next patching cycle. But this issue, the one that's only a CVE 7, is explosive on the internet." That kind of ranking is super important because of the limited resources and time. I need to make sure that everybody is focused on the most important things. The ability to see that, seamlessly, along with the ranking, makes Orca a very good product.

    One thing that has been really surprising to me is its ability to give us container posture. Everybody is talking about containers and there are so many container-specific companies. At one point we were wondering if we needed a container solution. We talked to Orca and started testing what's out there, and we were surprised to see that Orca is very strong in containers as well, including Kubernetes and Docker. The way they see it, it all has to do with your posture and how secure you are. That's their goal: that you will have the most secure cloud possible, based on best practices.

    The fact that it's a cloud solution is also important. In the same way that I'm happy that Amazon maintains data centers and I don't have to, and that a lot of my solutions are maintained by their engineers, Orca allows my team to focus on more relevant tasks. I don't want anything on-prem. I don't want my team to deal with anything if they don't have to. Anything that would require in-house maintenance for us, is a no-go. The only admin with Orca is when you have a new account or there is a change to your account. You have to configure the Orca with it, but you can run an automation that helps you out with it.

    Orca is also very good at keeping our data safe and masking it and not picking anything they don't need to pick. In that sense, it's also good.

    What needs improvement?

    I would be happy if they offered more automatic remediation options. They're working on that, but the more the better. For example, if they want you to harden a server, they would offer a hardening script that would be more aware of what's going on.

    I would also be happy if they added more and more coverage. The cloud itself is changing, with Amazon and Azure adding more and more capabilities. Orca is working really hard to meet the challenge, but the more they add, the better it is for me.

    Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance.

    These are things that they're working on and their roadmap is very good. If they keep to the roadmap, I'm pretty sure they'll get to the places they want to get to. For instance, I really want them to add IAM permissions and they added that.

    They know where they're going—they understand how to secure a cloud—and they keep growing in that direction.

    One final suggestion I would add is for Orca to improve user education. A lot of times they have features and capabilities but they don't tell us about them. They don't even have a "What's New" newsletter. I have said to them, "Tell us what's going on. You've got a lot of cool stuff here. Why do I have to ask you? Let me know." If you have Google products, Google sends out a newsletter every week with new features. It's important to know that kind of information. It's also a marketing tool to let users know that they're constantly improving. Orca is constantly improving, but they don't always communicate that.

    Buyer's Guide
    Orca Security
    May 2023
    Learn what your peers think about Orca Security. Get advice and tips from experienced pros sharing their opinions. Updated: May 2023.
    709,643 professionals have used our research since 2012.

    For how long have I used the solution?

    I have been using Orca Security for about two years.

    What do I think about the stability of the solution?

    It's very stable. As long as you get your daily results and they find the issues, it's not something where stability is super crucial. But it doesn't crash. The product works. There's a lot of information but it's not slow. I'm not saying there have never been any problems, but we have not been aware of any.

    What do I think about the scalability of the solution?

    Orca is very scalable. So far it has grown with us easily. We have added a lot more accounts and a lot more endpoints. The bill has gone up accordingly, but it's there with us.

    We're using it as extensively as possible as a security tool, to the point that it's being used every day by the cloud security team. It's one of that team's core products and they love it.

    How are customer service and support?

    They give very good support to us. We don't need a lot of support, but sometimes we get audited and the auditors want a certain kind of format to the report. They are really helpful on that. If we're not sure about something or we have a question about containers, they're always very helpful. When there has been a new vulnerability and we wanted to make sure we're covered, they have been there for us every time.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We had vulnerability system coverage but we had to work hard on it. What we didn't have was a good ranking of priorities. Prior to Orca, we were using traditional tools. Those tools do the job; they can scan your environment. But what they don't really give you is the ability to rank issues. Those solutions would scan and say, "We found 100 servers vulnerable to this CVE, so you should patch it." But what they don't tell you is that there's no patch, or that your servers are down so you don't even have to. The information from those solutions was missing context and the ranking. You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca.

    With Orca, we have been able to replace all of the tools I just mentioned.

    Consolidating those tools has saved us a lot of time, but not that much money. Generally, vulnerability scanning tools are pretty cheap. In the cloud, they are more expensive and their abilities are greater, but they're cheaper than Orca. So we didn't save a lot of money, but we saved a lot of time. We are able to do more with less, which is definitely worth money.

    How was the initial setup?

    Another huge advantage that comes from being agentless and having the SideScanning is that it all works out-of-the-box. You don't have to implement anything. It takes five minutes to turn on. It scans and you get the data. That's one of the things we love about it because it's reducing overhead and saving time.

    Our business acquires companies and that means we add more accounts, so we have to set up Orca for those accounts. It's a matter of five minutes to give the proper permissions and the proper key and you're in. It's very straightforward.

    What was our ROI?

    We have definitely seen ROI from Orca by reducing overhead and saving time. It's a huge ROI. We see it daily.

    Cloud security engineers are hard to hire because there aren't a lot of experienced people out there. So you bring in juniors and all they have to do is "follow the yellow brick road." They just have to go on Orca, see what it says, and do it. When it gives remediation suggestions, they just need to go ahead and do that. Theoretically, you only need to be a little bit of an IT specialist to use it. You could be a system administrator who has never seen Amazon before, but you'll have 85 to 90 percent of the knowledge you'll need about what to do just by going to Orca. That's huge. You don't have to teach them how to SSH to the server to check this or to check that. It's all there. The simplicity is a giant ROI.

    Cloud security engineers are expensive. If I save having to hire one cloud security engineer positionץ The vendors know it and that's why these tools aren't cheap. They price it expensively, because they know they give a lot of ROI. 

    With Orca, the time to value is immediate. The second it scans, that's it. It's a whole new ball game, thanks to it being agentless and providing the rankings.

    What's my experience with pricing, setup cost, and licensing?

    With Orca, there are no costs in addition to their standard licensing fees. There are no networking costs or extra bills for compute.

    Which other solutions did I evaluate?

    We put Orca up against all the incumbent vendors. Orca beat them easily. When it was up for renewal, we were looking at Orca versus the other leaders offering the same abilities. Again, Orca proved to be the most mature and the strongest product.

    The agentless aspect of Orca is a big pro. And I really like the simplicity of Orca. It has a lot of options, but the way you experience it as an engineer, it's very easy to understand. You know what you have to do and what's important. The other systems proved to be complex. 

    When I was looking for a posture management solution and they said, "This is agentless, it's amazing." My thoughts were, "Oh yeah? That's baloney. How can it even be agentless?" I was shocked. I said to my engineers, "If this actually works in the demo, it's going to be a game-changer for cloud security," and it was.

    I also feel Orca's ranking system is much more mature. All the others show you a lot of things that they mark as important, but they aren't important. That means there could be 200 things to take care of but if you drill down, they're sort of like false positives, meaning "it's important, but it can wait." Orca would rank those kinds of issues a "medium." It would let you feel that they can wait a little bit, as opposed to things that are "high" and "critical."

    What other advice do I have?

    The biggest lesson I've learned from using Orca is that agents suck. Until you see the difference, you're just not aware of how much time you spend on that stuff. Another lesson is how important the ranking is that Orca provides. They should blow that up and emphasize it a lot more. They always talk about the agentless side, but the fact that they can prioritize tasks is equally important. A lot of tools do that, but Orca is exceptionally good at it.

    If somebody were looking into Orca, I would ask how his stack is built, how much on-prem he has versus cloud, and which cloud? I would recommend it wholeheartedly if he has a cloud presence. It's the go-to posture management tool. Start with Orca and test them. It's always good to have a PoC, understand the pros and cons, and make an educated buy. But I would definitely recommend Orca to anybody who has substantial data or substantial risk in the cloud.

    We really enjoy using Orca. It's a very well-designed, well-executed product. I'm really super-impressed. This is a game-changer. This approach has never been done; at least, I haven't seen anything like it. Kudos to them.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    Chief Risk Officer at a financial services firm with 51-200 employees
    Real User
    Top 20
    Provides good visibility, improves security, scales well, and the interface is easy to use
    Pros and Cons
    • "Orca provides X-ray vision into everything within the cloud properties, whereas normally, this would require multiple tools."
    • "As with all software, the user interface can always be made simpler to use. It would be helpful for people with very little knowledge, like somebody sitting behind the SOC, to allow them to be able to drill down into things a little bit easier than it is currently."

    What is our primary use case?

    We use Orca Security in the cloud to protect all of our cloud-based AWS applications.

    It secures all of our perimeter and AWS, as well as all of our databases, applications, and transport. For every facet of AWS, right down to operating systems, we use Orca to take a look at it.

    How has it helped my organization?

    Orca provides the capability for agentless data collection directly from your cloud configuration and from the workloads' runtime block storage, which is one of the massive advantages of the tool. The tool gives us the ability to monitor things as we spin them up and as we tear them down. I can't state emphatically enough how important the agentless tool is.

    For example, when most people move their applications from on-premises to the Cloud, which is what we in IT call a forklift, they just copy it over or re-create it there. Very seldom do people actually re-engineer or re-architect their applications to take full advantage of the cloud.

    With the cloud, you can create serverless applications and serverless databases, so that when you need something you can spin it up and use it. When you don't need it, you can tear it down or destroy it so that it's gone. This not only saves money and is very efficient but from a security perspective, it's critical because every time you have something running somewhere, it could be attacked. This is what is referred to as an attack surface.

    By using serverless tools and agentless monitoring, you can tear it down when you're done and that reduces your attack surface dramatically. Without a tool like Orca, that's agentless, you would not be able to do that. You would have to install software on the application and keep it running in order to monitor it, which really defeats the whole purpose of the cloud.

    In terms of performance, because it's agentless, it's not stealing cycles from your application. It's not what's called a heavy application.

    The agentless and direct collection of data enables Orca to see assets within its environmental and business contexts and prioritize truly critical security issues. This is one of the huge advantages of Orca. It sees everything in the environment and through its AI, properly categorizes what the threats are and shows them to you in a much better way. It aggregates all of the alerts and determines what's really important, and then shows them to you. It greatly reduces the need for additional staff to pore through all of the alerts to try and determine what's real, what's critical, and what the real problems are. It does all of that work for you.

    Prior to Orca, our cloud visibility was perhaps 20% of what it is now. This is the reason that we were delaying moving to the cloud. The additional coverage has allowed us to move critical applications to the web that we had been holding off on because of the lack of cloud visibility. We have now moved multiple critical applications and we're able to view them in a way that we would not have been able to without Orca.

    An important thing to consider is that Orca is a one-size-fits-all solution, which is very rare in the security world where everything is piecemeal. Normally, to protect something, you need five or six different tools or products. In this case, one product gives you all of the visibility that you need for your landscape, into all of your cloud properties. It is really the best of all worlds.

    It's critically important to keep things simple, and it helps that Orca has everything included out-of-the-box. You only need one tool and it's helpful because there are so many security solutions on the market that a lot of security people get confused and they end up with products that overlap each other. Part of the reason for this is that all of the security solutions are trying to expand into other areas, and become more useful on the whole.

    When you end up with these overlaps in products, it confuses people including end-users and support staff. Oftentimes, you end up with redundancy or things that conflict because the software isn't designed to be compatible with all of the other tools that are out there in the market. You end up with a messy collage of tools trying to accomplish something and it doesn't work well. It ends up with gaps, overlaps, and it just creates problems for security.

    With Orca, it's as if they took a whiteboard and set out to fix all of that, and do everything in one tool. What they built architecturally is a beautiful, simple, and easy-to-use product. 

    We are frequently audited by our clients, which are Fortune companies in the finance, automotive, utility, and telecom industries. They audit us from a security perspective quite frequently. By using Orca, we can prove to them that we are secure in all of the core areas that they're looking at.

    Like a lot of cloud SaaS tools, which is the new generation of technology, you expect things to be automatically updated for you. It's like using Chrome, where when you decide to take an update, you don't have to pay for it. You assume that the company behind the product is constantly updating it on your behalf. This is a model that is critically important from a security perspective.

    Imagine buying an antivirus product and the company says that they're not giving you updates until you pay for them. A lot of companies do that but more of the newer companies will instead license you the product for a year or two at a time. During the license period, you get all of your version updates and everything you need. It's included and it's done automatically. That's the model that Orca chose and from a security perspective, it's the best model for a customer like me.

    What is most valuable?

    Orca provides X-ray vision into everything within the cloud properties, whereas normally, this would require multiple tools. As an analogy, for on-premises equipment, you would need different tools to be able to see the performance of a system, determine what versions of software applications are installed, and look at the security. You would need yet another one to give you a holistic view of all of the hardware inside of the system.

    From this one platform, we can get visibility right down into the hardware through all of the applications, and through the operating system. One application provides an entire view of our security. Gartner coined the name Cloud-Native Application Protection Platform, in reference to this product, because Orca created did not exist previously. Orca literally invented a whole new way to view security in the cloud.

    Because the interface is so simple, you don't need people that have tons of experience. You can take a lower-level person and give them basic instructions on what to watch for. If anything comes up with a high-level or medium-level alert, then they have to contact somebody else. It's literally that easy.

    What needs improvement?

    As with all software, the user interface can always be made simpler to use. It would be helpful for people with very little knowledge, like somebody sitting behind the SOC, to allow them to be able to drill down into things a little bit easier than it is currently.

    For how long have I used the solution?

    I have been using Orca Security for approximately two and a half years.

    What do I think about the stability of the solution?

    We haven't had a single stability issue. From my perspective, it's awesome.

    What do I think about the scalability of the solution?

    Scalability is built into the product. We've scaled this pretty tremendously up and down as we've needed to, based on serverless needs across VPCs, across servers, and across various instances. It scales perfectly across our environment.

    It monitors all of our AWS instances. We give it everything. In fact, as we add more and more to the cloud, Orca is there already, ready to protect us, so we're scaling it. Every month we add more to it.

    How are customer service and support?

    We have been in touch with technical support a few times. It's been very few and far between but it was to ask about the meaning of some of the error messages that we saw.

    I would rate the technical support a nine out of ten. We don't use it very much and as such, I don't have enough touchpoints to be able to assess it. I'm leery about rating something the highest possible score without having enough visibility into it.

    There was a situation where we provided feedback to the vendor and they incorporated it into the product very quickly. We were very surprised that they listened and acted upon it so quickly and I think that this is more important than support because no product is perfect. They were eager to improve their product because they strive to be better. I can't say enough good things about them.

    Which solution did I use previously and why did I switch?

    There was nothing on the market, anything like their solution, prior to Orca coming along. It literally created a whole new category. It was the right tool at the right time and they had the vision to create it.

    We were using a myriad of bolt-on tools at the time, to try to cobble things together, but we never really accomplished very much using them. That is why we went looking for the product that we did. Ultimately, we weren't moving anything to the cloud because we couldn't find the visibility that we wanted.

    In order to move to the cloud, you need a tool like Orca to have visibility of all of your real estate, architecture, and applications that are out there. Without it, you literally have gaps you don't know about and you are running blind. It's like running with blinders on and you can only see where you're looking, versus being able to look 360 degrees around you. It gives you that level of visibility. It's truly X-ray visibility.

    How was the initial setup?

    The initial setup was amazingly easy. You don't have to really do anything outside of creating an account with them. It was absolutely simplistic. It exceeded our expectations from an installation perspective. It couldn't be easier.

    Because there are no agents, you have no deployment time. Another beauty of it is that you don't have to sit there and try to install agents on every device and every server and every application and every instance or every VPC. It's just automatically done.

    Once you give them access and they scan your environment, it's done for you. You don't have to do anything at all. It learns about your environment. You don't have to install anything, so it saves your time because you really don't do anything at all. It's the way that all software should be. They should do all of their learning on their own without you having to install things the whole way.

    What about the implementation team?

    We implemented it with our in-house team.

    What was our ROI?

    This product has saved us tremendous amounts of time and money.

    I would just say that you're doing yourself, your business, and your customers a disservice if you're not using Orca, or a tool like it, that provides a deep X-ray-like view into your environment to properly secure it.

    We would not be in the cloud or have as much in the cloud without this tool. It's really a precursor to moving anything major into the cloud. In that regard, it's our future. Cloud is our future and without Orca carrying that future, we can't do the things that we want to do. It's very difficult for me to put a return on investment on it because it's so intertwined with everything that we do. We wouldn't be able to do the things that we do without it.

    Which other solutions did I evaluate?

    Our search for this product began because we wanted to move to the cloud and we knew that we were vulnerable if we moved up there. We didn't have the visibility that we needed so I actually went looking for this solution. I looked throughout the industry. I talked to everybody I knew and there was nothing. Everybody was cobbling solutions together, trying to achieve some sort of visibility.

    A lot of people didn't even know that they were vulnerable or that they had gaps. We did and we saw it. We figured it out and we went looking for a solution.

    Coincidentally, I was speaking with somebody at a conference who had recently learned about Orca and they told me about the product. Within a couple of months, he put me in contact with their co-founder and we entered discussions from that point.

    What other advice do I have?

    The analogy that I like to use when discussing Orca is similar to that of purchasing a used house. When you look at it from the street or after doing a walkthrough, you have no idea what is going on under the floors, or above the ceiling, or behind the walls. There can be all kinds of problems like faulty wiring or leaking plumbing, and you wouldn't know that they existed. This is where the beauty of Orca and the X-ray vision comes in.

    You can see all of these things right down to the chip that's used in your cloud instance. It's literally an amazing perspective that to my knowledge, no other tool prior to Orca provided. In my analogy about the house, there is no tool that you can use to see behind everything before you buy a house. However, with Orca, you can see everything.

    Everything is laid bare to you before you move your apps up there, or once you move them to the cloud and you begin to build out your real estate. Without a tool like Orca, you're flying blind like a pilot in an airplane without radar. You just can't do that.

    When I first looked at Orca, I was somewhat skeptical about whether it could do everything that they claimed. In fact, I'm always skeptical to a degree. In this case, it's different. It literally blew me away based on what I could see. If I consider the analogy of the house, I expected to be able to see under the floor. What I didn't expect was to be able to see behind all of the walls and through the ceiling and through the roof and into the basement, and everywhere. I thought to myself that we couldn't live without this tool. That's how good it is.

    If I could rate this product a 15 out of 10, I would. It has well exceeded my expectations and I remember that when I first looked at the Orca environment, I thought that it was amazing. I was able to click, drill down, do everything that I wanted to be able to do, and more.

    I would rate this solution a ten out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    Buyer's Guide
    Orca Security
    May 2023
    Learn what your peers think about Orca Security. Get advice and tips from experienced pros sharing their opinions. Updated: May 2023.
    709,643 professionals have used our research since 2012.
    CISO at a tech services company with 501-1,000 employees
    Real User
    Top 20
    I just drop Orca in and it shows me the abstract risk of everything in that cloud, forming the basis of my security program
    Pros and Cons
    • "The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
    • "There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. But relative to my other security tools, Orca is definitely the most stable that I've seen."

    What is our primary use case?

    Orca is the inceptive tool that I deploy when I join a company. It will be one of the first things I do after an awareness training program. The reason is that Orca serves the function of giving me insights into the resting risk state, abstractly, because it combines so many signals without actually having to govern the assets. As soon as I have access to the AWS or GCP or Azure accounts, I just drop Orca in and it shows me the abstract risk of everything in that cloud.

    How has it helped my organization?

    Using Orca, I build up a security program. Orca not only attests to and assesses these risks and helps me identify risks that need to be mitigated, but it also helps me build an entire security program because it does it —and this is key—in a deterministic fashion, where it's wholly governing the ecosystem.

    Orca’s platform provides agentless data directly from your cloud configuration with zero performance impact. The way they do it is brilliant: They pull snapshots. So it just cannot affect the performance of the machine. From my understanding, the snapshot process in the major clouds is completely benign and does not affect the performance. First of all, that means it can analyze machines that I don't have access to. That in itself is the most game-changing thing I have seen, not just in security but in technology, in my 25-year career. Agents are a huge problem in security. They're necessary for certain things, but even if an agent doesn't cause performance issues it's not about having performance issues. It's about the perception, the concern, the fear, the accountability, and the confidence in the tool because of the small risk of those performance issues being caused.

    Orca does more than allow you to see assets within their environmental and business contexts to prioritize critical security issues. The trend in security over the last two or three years ago has been to raise risks that are real. But Orca is doing more than that. Orca combines all these signals to aggregate risk. There is a discipline that they exercise in the way they process all the signals together. Whenever there is an Orca alert that there is an imminent compromise or an actual compromise, which are the two highest severities out of four, they're actionable, every time. We might have encountered a couple that weren't actionable, out of a couple of hundred. 

    What is most valuable?

    The visibility Orca provides into my environment is at the highest level. I was super skeptical about Orca when I interviewed the Orca team. When they told me that you can just drop their software in and you don't need to log in to the machines, nor do they need to be powered on, I said, "How the heck are you doing that?" When they told me how it worked I said, "Woah, that's pretty simple. Why didn't I think of that?" When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here.

    What needs improvement?

    I'm thinking about room for improvement that is really grand, in terms of ways that may not be possible. I like to partner with innovators and that's why I partnered with Orca. I don't think what I have in mind is possible—but I didn't think Orca was possible either when I met them. 

    If they could disrupt the host intrusion detection space (HIDS) that would be huge. If I could have them assess risk in real-time—which does not seem possible from the block storage analysis perspective—and they could figure that out without an agent, there would be no need for other security tools except for CI/CD pipeline analysis. 

    I'm thinking about "omniscient" and "omnipresent." That's what Orca does from a resting state risk standpoint. It's the "all-seeing eye." If it could do that from an active state standpoint in real-time, or even to the second, minute, or hour, that would be big stuff. If they could crack that I don't know what would stop them from dominating the market completely.

    On a more practical level, Orca doesn't work in data centers right now. If a company has a large data center footprint, Orca is not necessarily the best solution for that business. If 20 percent of my risk lies in the cloud, and 80 percent is in data centers, I should probably go with an agent-based solution, assuming I can deploy it.

    For how long have I used the solution?

    We became an Orca customer in February of 2020. We use their SaaS solution which is deployed on the three major public clouds.

    What do I think about the stability of the solution?

    There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. That was pretty bad. What if I was trying to attend to an emergency security issue?

    But relative to my other security tools, Orca is definitely the most stable that I've seen.

    What do I think about the scalability of the solution?

    It is deployed everywhere in our company. It is a requirement that when we build a cloud or we have a new business joining the company, that it be deployed at inception. It is one of the very first things that I require before any integration is done.

    How are customer service and support?

    We have used their technical support, but we haven't needed it very much.

    When Orca was a very early stage startup and they were working out the kinks, one of our clouds, GCP, was not as easy to deploy in because we have 400 workloads running there. We didn't ask for any support but their CEO stepped up, worked all night, and did it himself.

    Orca is focusing on what is right when it comes to customer success. Every business has a limited amount of resources and has to take a certain amount of risk. They didn't build a sales team until pretty late in the game. That speaks to why they're respected so much in the industry. They have a relatively new customer success team, maybe because they haven't had a need for it. When I encounter a problem I will want to put it to the test. I think they'll do pretty well. They have scaled up a bit.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We did not have a previous solution. Before I had Orca, my option for governing at the level that Orca governs was to use network TAP devices from companies like ExtraHop Networks, but they're not capable of gleaning the information that Orca can.

    How was the initial setup?

    Deploying it only takes a couple of minutes and it hasn't required any maintenance at all. It's so easy to deploy that you can switch away from it pretty easily too. I just don't know anyone who wants to. The stickiness is only in their excellence. For the consumer that's a win-win.

    For our deployment they brought in a junior CSM who was brilliant, a wonderful CSM. I was pressuring him and making him very nervous, but he explained the install process: "You copy this URL and paste it here." My DevOps engineer who was onsite messaged me and said, "It's actually really easy. We just put the card in and it was installed two minutes later."

    What was our ROI?

    It wasn't very important to me that Orca’s solution includes everything “out-of-the-box." But it was certainly a positive thing to have. My view on security is that I'll deploy something that nobody else has emulated. I'll have a very big, cumbersome stack to manage because I want to support excellence in each space. I believe in the Unix philosophy: Do one thing and do it well. But Orca is doing a lot of things well. I can't deny that. And that means I haven't secured some of these other solutions because it does things well. It's among the best cloud configuration auditing software there is. It has replaced a couple of things that were in my environment and avoided the need for an additional couple of things that would be in my environment. One of them is a portion of host intrusion detection, and that has enabled me to move to a solution that is half the cost. That particular move has saved me about $450,000. That's not my total spend in Orca but it's close to it.

    Also, it is updated daily and new features are available at no additional cost. It's a "it just works" thing. And it actually mitigates the need for human expenses of around $80,000 a year in payroll. When you factor in the 1.4 times overhead for human resources, that's going to be $112,000 a year and the perceived liability of the company is probably three times that. We're looking at a replacement of $336,000 a year.

    In addition, the time to value is better than any other security product in the market. Even if I wanted somebody else to do all the work, I would have to give them more information than I need to give Orca. It would take a couple of hours to filter the data for a mid-sized company, whereas Orca literally installed in two minutes.

    Which other solutions did I evaluate?

    I called my security team and we were talking about all the various players in the security space, and all the technical aspects. They were saying, "Orca does this, Orca does that," going on about it. I don't really see Orca as being the next Palo Alto displacer, but that's probably because I'm super skeptical. But that's how amazing the governance is. My security said, "Yeah, Orca is the tool that we use, even though you made us PoC all these other solutions."

    I spoke with someone who knows the space well and I said, "Okay, Steve, please help me here. You guys know this field. Is there anything else that competes with Orca in this space?" I believe this was before Wiz was on peoples' radars. Steve said, "No, I haven't heard of anything else." I was worried that I would spend all this money on a tool that did something that doesn't exist but it turned out it actually existed.

    Every CSO says they don't want false positives, but what CSOs never say is, "I don't want to have false negatives." That bothers me. They're happy because a solution doesn't say, "You need to fix this thing" when it doesn't need to be fixed. But they're ignoring the fact that solutions are not identifying things that do need to be fixed. That's where Orca comes in perfectly. By running it in tandem with my HIDS or some other system, it's validating or invalidating the attestation of security risks from the other software. I had one solution that never gave me any false positives but it did give me a lot of false negatives. After Orca exposed that, I was no longer a customer of that product.

    Because I had Orca first and it attested to the risk, it demonstrated the need to employ their competitor. If I had deployed their competitor first, it would not have attested to that risk and the need to deploy Orca. Orca justifies the spend, a multi-hundred-thousand-dollar spend by a mid-sized company on one of their known competitors. That's cool because that means it's not really a competitor.

    Whenever people ask me what Orca does, and I say vulnerability assessment, I always say, "But that is really downplaying it." We use Nexus to do vulnerability scanning, which costs almost nothing. But I have almost never acted on a single alert from Nexus because there are so many false positives and the risk categorization is not very good.

    What other advice do I have?

    I was skeptical about whether it could do all the things they say it can do, and now that I have used it I would say to that skeptic: "Continue to be a skeptic." But the skepticism was blown away by Orca very quickly, at every single turn, on every single angle, and at every single opportunity. Orca destroyed my skepticism. But you have to be skeptical. Still, I would also say to that skeptic: "Just give it a shot. It takes two minutes to deploy." If I had just done that, I would have saved myself time.

    Orca is much better than their competitor. They're the best in their space. They're the best in the security tool industry. And they're probably the best in terms of companies that I've worked with in general. Are they the best in mitigating actual risk versus the investment? I will always have to say that security awareness training, not as a service but as an abstract concept, is the best thing that we can do in security. Orca might help with awareness training by being so simple. I can use Orca to make technical leaders aware of security issues.

    But technical leaders aren't the ones who need to be made aware of security issues. It's the general staff and public. That means customers and employees. Orca falls right in behind security awareness training. What CSOs out there need to do to make the greatest impact on their company is to get up on stage and tell people why security matters. But in all other areas, Orca is definitely the best. The first thing I'm going to spend my money on is Orca. I can do awareness training for free just by being vocal onstage. Orca requires no time. It doesn't compete with awareness training because I can do that while Orca is spending its time attesting to the pragmatic technical risks in my cloud environment.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    Shahar Geiger Maor - PeerSpot reviewer
    CISO at a recruiting/HR firm with 11-50 employees
    Real User
    Top 10
    Prioritizes vulnerabilities and findings, helping us to focus on the most important issues, unlike other solutions
    Pros and Cons
    • "Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool."
    • "The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see."

    What is our primary use case?

    I use it for our cloud security posture. Initially, the idea was to increase visibility because we had zero visibility into our cloud environment.

    How has it helped my organization?

    Orca provides agentless data collection directly from your cloud configuration and from the workload runtime block storage. They call it SideScanning. What it does is it copies the image of the assets and then the solution does all its analysis on the side. It just records the image and then looks at it. It sees everything that is installed on the image, like type of data, packages, applications, and the audit log. It can even see into ODD and other activity logs that are not collected by default by DevOps. It provides you with great visibility into each asset, including containers, storage devices such as RDS, CCS, and EC2, and S3—all the basic and major components in cloud environments. And that's true not only for AWS, but for all three cloud providers.

    This agentless approach means there is zero performance impact. That's the whole idea. The only thing it does is copy the image and then it does the scan which is a read-only operation. It doesn't use the computing resources. That makes it very lightweight.

    The agentless collection of data enables Orca to see assets within their environmental and business contexts and prioritize truly critical security issues. It sees things very clearly and you get a notification, alerts to Slack or whatever system you are using. We have also exported the alerts to our Splunk environment, to cross-reference them with other systems as well. It provides great focus on the right and the most important topics that we should attend to first.

    In terms of consolidating vendors, Orca solved a few issues for us. Because we came across it very early in the process of picking tools for our cloud environment, we saved a lot of money by not having to pick multiple different tools to cover different aspects of cloud security. We had good timing when we picked Orca, rather than various tools to do the same job. If you have multiple scanners and you install Orca, you can remove the other ones. That's great and will save you money and a lot of working hours. A lot of the work we did previously was done manually. Now, we get good visibility and it saves manpower as well.

    We didn't have anything, and Orca solved three or four different problems in a single tool. If I had had to buy three different tools, obviously it would cost more, but I can't estimate how much the difference would have been. What I can say is that Orca has saved us at least half of a SecOps FTE, at least in the beginning when I didn't have a team and did most of the work and the monitoring myself. It has saved me a lot of time, because I needed a lot of DevOps resources to help me before we had Orca. When I installed Orca, I became very independent. That was really a great feeling.

    What is most valuable?

    Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool.

    The fact that it prioritizes vulnerabilities and findings, and doesn't present you with hundreds of unuseful findings, is important. They focus the information and make you concentrate on the high-priority items. This is something that differentiates it from the others.

    They also now have the ability to filter findings based on best practices, like CIS, PCI, and even GDPR. That means you can filter your environment based on a specific filter, and that helped us when doing our PCI audit. We were able to show the auditors what our environment looks like from a PCI perspective. That's another great feature that it offers.

    It's also very easy to use, very intuitive, and very detailed.

    Another new feature shows you outliers and abnormalities for IAMs and access. It focuses on users with too many permissions and provides you with recommendations on what to do as a result.

    There is a feature that searches for secrets on your infra and what can be done with those secrets.

    You can also do very complex search queries to find assets that you think may be relevant. For example, searching for Log4g references in the infrastructure was very easy.

    I also like the fact that the solution includes the most potentially painful parts, out-of-the-box, like malware and secrets scans, IAM, attack vectors, and benchmarks against CIS and other best practices. That full suite is something that every security professional needs. It solves the issue of having to run multiple tools, such as a vulnerability scanner, a secrets scanner, and a role management/permission/authorization tool that searches for abnormalities. I think it's a no-brainer, given that it runs everything, and you don't need to pick and choose anything. Everything comes out-of-the-box and is very easy to use, plug-and-play, and you get an instant view of things on the dashboard.

    What needs improvement?

    The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments. If you make mistakes, you can cause huge damage to your environment and, when it comes to production, there is zero tolerance for errors. And realistically, you can't use the most important feature of an agent, which is the remediation, because remediating on production is not something that is easy to do.

    Orca's agentless approach makes more sense. Even if you have an agent, it takes resources. In addition, you need to deploy, maintain, and update an agent, which amounts to a lot of unnecessary work. And lastly, while it's true that an agent sees more when compared with an agentless solution, the gap is very small.

    In the end, to make sure that we progress and that our security level is increasing, we need to take action. Orca is only a detection tool. It shows you the problems, but you need to make sure that the problems are fixed. It's a fair trade-off because production is a different environment. It's not like endpoint security where the cost of ruining an endpoint is worth the risk. You would rather kill an endpoint than risk being infected with malware. But this is not the same approach for data center or cloud security.

    Ultimately, the ability to auto-remediate is something that I would like to see.

    For how long have I used the solution?

    I've been using Orca Security for two years or so.

    What do I think about the stability of the solution?

    It's very available. We have never faced issues with the platform not functioning or not responding. It's a very stable tool that works and runs as expected.

    What do I think about the scalability of the solution?

    We haven't noticed any scalability issues because we haven't had any performance issues with the tool. It's always up and running and we consume it as a service.

    We have more than 10 Amazon accounts with tens of thousands of assets, including containers, which are a huge piece of the resource pool.

    How are customer service and support?

    The team is fully supportive and we get everything we need. They're very responsive to our needs and feature requests. We benefit very much from the team and from the tool. They're doing a great job.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    At first, we used an open-source solution and we did periodic scans on the cloud environment, but we were quite blind. Later, when I met the Orca team, they were in a very early stage and I decided to onboard them. The fact that we were blind was the main motivation for installing Orca. Now, the scanning happens constantly.

    We now see everything, the whole cloud environment, including a small GCP implementation that we have. We have better coverage than our DevOps because DevOps doesn't have access to some of our subsidiaries, for example. We deployed Orca very quickly after buying some new companies and it gave us an edge over the DevOps team, because we saw way more compared to what they see.

    How was the initial setup?

    It was super easy to connect the solution to all accounts, which is something that is not always so easy when you're taking it from a DevOps perspective. You do this from the dashboard. The fact that it is very easy to deploy is something that makes it stand out. Getting the coverage is very easy and it's super lightweight.

    Deploying Orca for a single account takes a matter of minutes, if you have the right permissions or are an admin on the AWS environment. You just go to the console, copy-paste the ARN from AWS and put it in the Orca environment, and run a scan. The solution then does everything else in the background and starts the scanning process. It then takes a few more minutes, depending on the size of the environment. If it's a very large environment, it can take up to half an hour or so to show all the different assets. But from then on, that's it. Most of the work is done in the background.

    What's my experience with pricing, setup cost, and licensing?

    The licensing is per-VM, but it really depends on the type of the environment. They offer large discounts if they see a customer as a potential strategic partner. Orca is very competitive when compared to the alternatives and is not the most expensive in the market, that's for sure.

    Which other solutions did I evaluate?

    At the time we looked at Orca, there weren't any competitors. I did meet with Palo Alto Prisma and Dome9, which were the main two alternatives to Orca then.

    Now, there are other players. The main competitor is Wiz, which offers a very good suite. Lightspin offers the same type of solution, as does Aqua. You might include Ermatic if you count permissions/roles/IAM monitoring. Datadog also offers an agent-based system.

    The main difference among these solutions is that there are two types of CSPMs. The first is agentless, such as Orca, Wiz, and Lightspin. The other vendors are agent-based, including Prisma Cloud, Dome9, Datadog, and, possibly Aqua. There are, of course, vulnerability scanners, like Qualys or Tenable, that are not based on agents, but they're limited to vulnerability scanning and are not full competitors.

    The main advantage of Orca is that it is agentless, but still has great visibility into the assets and the cloud environment.

    The second differentiator is the ability of Orca to prioritize and show you what you need to act upon. It doesn't bombard you with a lot of alerts that are meaningless and just create a lot of noise.

    Another advantage is that Orca is very easy to deploy and very lightweight, compared to competitors, especially Wiz.

    Orca was the first. I remember, as a design partner, at first there was something of a learning curve, especially for scanning S3 buckets. That can require a lot of resources and may result in an increase in billing. That is something that takes time to do properly. Orca has the advantage of being the first, and they bring a lot of field expertise and experience to avoid pitfalls and problems for newcomers to this market.

    It's also a huge advantage that Orca is a SaaS offering. I don't like on-prem solutions. They require a lot of overhead and resources and you need to manage them. We work mostly with SaaS vendors.

    What other advice do I have?

    Do a trial of Orca and check it against the current solution you have in place. You can assess how lightweight it is and the depth of insights that you get into the environment. Look at the new angles of visibility it will give you. It's very easy and you will see the differences instantly.

    It's a great solution. It has solved so many problems for us. Before starting with Orca, I was blind. Think about someone who was blind and now they can see. It's a new world.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    Co-founder at a tech services company with 1-10 employees
    Real User
    Top 20
    Provides good visibility, automated alerting for vulnerabilities, and responsive support
    Pros and Cons
    • "Orca's platform provides an agentless data collection facility that collects information directly from the cloud using APIs, with zero impact on performance."
    • "I would like to see an option to do security checks on a code level. This is possible because they have access to all of the code running in the cloud provider, and combining their site-scanning solution with that would be a nice add-on."

    What is our primary use case?

    We are a solution provider and Orca Security is one of the products that we implement for our clients. Most of them are start-ups and scale-ups that are building their software on the cloud platform. If they don't have cloud services, they cannot use Orca, so that's the first requirement. They need to use a cloud platform like Amazon Web Services or Microsoft Azure or Google Cloud.

    Then to use Orca, they need to make a connection with the cloud platform's API. This means that they don't need to install any software or hardware. At that point, the site-scanning technology in Orca Security will check for vulnerabilities in the environment, and then check whether there are any configuration issues.

    Our clients can see the progress in compliance after they implement Orca. For example, there is a weekly report to show how things change. Most of the time, our clients start with perhaps 30% compliance. It gives you the option to select which standards you want to comply with, for example to the ISO standard, or the GDPR standard. Orca Security also has its own standards for specific cloud platforms.

    You can see that the security improves by changing the configuration and tightening your cloud set-up. Similarly, when you start reducing the vulnerabilities that you have, the number of alerts you are receiving will decrease compared to what it was in the beginning. It takes some time to achieve a healthy state of cloud security but once a baseline is achieved, you will immediately see the problem if there is a critical alert. When a new vulnerability appears, it can be solved as soon as possible.

    Orca's platform provides an agentless data collection facility that collects information directly from the cloud using APIs, with zero impact on performance. This is something that is very important because now, there is a need to have full visibility of your cloud security every day. One cannot rely on only a penetration test once a year, because our customers are start-ups and scale-ups that are really innovating. They are deploying code almost every day. They make changes to the configuration of their clouds using automated tools like Terraform, and they really need to have a solution like Orca to have the guarantee and the confidence that there is nothing new and critical being configured or added to that environment. For me, it's a no-brainer to have Orca running in your cloud.

    By using the agentless approach, our clients avoid the need to deploy and maintain multiple tools. Also, if you're using an agent then you need to have it installed. This means that you have something running in your production environment, so that can have an impact.

    Secondly, if you forget to deploy the agent on the new machine, you will not know that machine is there. You will not have a complete picture, and that's an important thing to consider. With Orca, you will have a full inventory of all of your assets, your configuration, your network setup, even assets that are not internet-facing. The old-school agent approach will not work, because even if you have the agents installed, you will still need to have something in the cloud doing scans. You will also need something that will look at the configuration of your cloud platform, which is not possible if you are just installing an agent on a VM.

    Prior to Orca, our clients had considerably less coverage for their environments. When we compared the results of Orca against a typical vulnerability scan using Tenable, for example, the classical solutions only found 20%. This is because Orca is scanning behind the security configuration of your cloud provider, which is possible with integration using the API.

    What is most valuable?

    The compliance dashboard is one of the features that our customers find very interesting. Instead of having to run checklists and provide access to auditors, you can just generate a report from Orca.

    The automation and alerting capabilities are very good. When there is a new vulnerability or a new issue, you can get an automated alert in Microsoft Teams or in Slack.

    The visibility that Orca gives into the environment is really in-depth because of their site-scanning technology. They provide full visibility into everything running in the cloud environment. They can look at virtual machines; they can look at serverless; they can look at the configuration of users and roles. They can also see, for example, that a specific administrative user has no multifactor authentication configured. It covers the full stack and not only one specific item.

    The alerting capabilities are now being added, which is a very good evolution.

    The integration with SIEM tools is now in place, which is a nice feature.

    What needs improvement?

    I would like to see an option to do security checks on a code level. This is possible because they have access to all of the code running in the cloud provider, and combining their site-scanning solution with that would be a nice add-on. This would guarantee our customers that whatever is running in their cloud production is secure on all layers.

    It would be nice if this solution had the capability of fixing issues. As it is now, it only reports them. Having a button to patch a product, disable a service, or delete a VM would be nice. At this point, this is something they might not want to do because they are only doing audits rather than making changes. It is also something that would require having additional permissions, including write access using the API.

    For how long have I used the solution?

    I have been working with Orca Security for more than two years.

    What do I think about the stability of the solution?

    In the beginning, when we started to work with them more than two years ago, they were still just in the first phase of going live. At that point, we had some problems with the user interface and some bugs, but they have been developing very hard to solve those issues. For example, they migrated to a new version of the user interface, which is very good.

    When there is a problem with stability, we can contact their support and they solve it immediately. These days, most issues have been solved and they're adding more functionality because they now have more developers working on it.

    What do I think about the scalability of the solution?

    In terms of scalability, we have customers that have a lot of assets, and some that only have a few. Of course, the more assets you have, the more vulnerabilities you have, and the more work that has to be done to solve those issues. That is something that takes time.

    Our largest customer used to have more than 250 assets.

    The customer is responsible for solving problems but because of Orca, we can track the progress and we can follow up on the vulnerability management and remediation.

    How are customer service and support?

    Technical support is very good. I would rate them a ten out of ten.

    When you send an email, you get an answer immediately. They really try to determine what the problem is and identify the root cause. Either it's because it's something that we didn't know of or were unable to find in the documentation, or it's a bug or feature that is not known yet.

    Which solution did I use previously and why did I switch?

    We have seen customers moving from other solutions to Orca. When you are running your entire software solution in the cloud, and you make a lot of changes, have new deployments and new features, as well as configuration changes, your classical vulnerability scanners will miss things. 

    For example, a traditional scanner will miss scanning a specific IP address or domain. When you are working in the cloud, everything is more elastic. Another problem is that you have new IP addresses not being used, but get allocated to another cloud customer. You can have a situation where you're scanning with those classical solutions, and it is actually somebody else's infrastructure. This is not the ideal situation.

    These are some of the reasons that we have moved to Orca Security, replacing those classical mobility scanners.

    Using Orca has helped consolidate vendors and services because it gives a better overall view. It's much easier to install and maintain than the typical vulnerability scanning approach. Our clients have replaced solutions such as Tenable, Qualys, and manual consultancy. In this last instance, if you don't have Orca or another product and you need to have a compliance check, then a security consultant will need to use a checklist and perform a manual inspection of all of the configurations.

    Consolidating services has saved our clients both time and money. For instance, if you need to generate a compliance report every quarter, it will normally consume five to ten days. However, using Orca, it's checked every day and you can generate a report whenever you want.

    Alternatively, you can use open-source tools but you don't always know what they are doing. 

    How was the initial setup?

    The initial setup is very straightforward. Everything is clearly documented and there is a video. They just need to log in and provide the API keys, which is very easy.

    We have customers that first start with a trial or proof-of-concept, and then they immediately see the added value of the solution.

    With the right access to the cloud platform, the deployment can take about 15 minutes.

    What about the implementation team?

    Our customers are responsible for doing the setup because we don't have access to their cloud platform.

    Orca is a SaaS product that is always up to date.

    What's my experience with pricing, setup cost, and licensing?

    The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them. But, you can start gradually because you can analyze one environment at a time. For example, you can begin with the production environment and fix all of the vulnerabilities there first. Then, add the test or acceptance environments, and then add your dev environments.

    You really need to learn how Orca helps to improve your attack surface, and you don't want to start with everything at once. Instead, you want to start small and progress gradually, otherwise it will be a lot of work.

    Pricing also depends on how you use your cloud provider. If you are working very cloud-native then it is much cheaper than a situation where you have a lot of virtual machines configured and running.

    Which other solutions did I evaluate?

    We generally look at the most innovative solution and start using it. We do not do benchmark testing because we don't have time for it.

    What other advice do I have?

    We normally set up customers on a trial basis to show them what the product is capable of. When you run a trial for a specific customer environment, you immediately see the benefits and value. You see that it does what they say it will and there are no hidden features. You immediately see the results in the dashboard, and how it works.

    My advice for anybody who is considering Orca Security is to start with a proof of concept, as it will only take five minutes to set it up. Let it run for a few days and then look at the results. It will show you how it benchmarks against your existing tools, including things that you didn't know of and you need to solve. After the evaluation, purchase it to make sure that it keeps monitoring your existing environments.

    I would rate this solution a ten out of ten.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    Chief Security & Trust Officer at SiSense
    Real User
    Top 20
    Provides visibility into all of our cloud-based environments and allows us to gather really specific intelligence through simple queries
    Pros and Cons
    • "With its Cloud Security Posture Management capability, we have the ability to read across all of our cloud-based environments, which includes AWS and Azure. We have visibility into those environments. Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries."
    • "They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it."

    What is our primary use case?

    With Orca, the main thing that we're leveraging is their Cloud Security Posture Management capability. 

    It is a SaaS solution.

    How has it helped my organization?

    It provides the assurance that we have coverage across AWS specifically because we have so many accounts. As a large organization, we have prod environments for customers, and then we have our corporate environments and our playground environments where there are various levels of interactions, data flows, and business use cases. Because we have Orca, we have the competence and assurance that we know where our fleet and where our assets are.

    The big thing for us was just making sure that the side channel scanning, which is their proprietary tech, does not really create any burden or load by adding an agent onto the box. It should just do another snapshot. It gives us a better performance overall because there is no implication down to the actual environment or AWS.

    It provides agentless data directly from our cloud configuration and from the workload's runtime block storage. The agentless approach means that there is zero performance impact. That's kind of a big part. When you typically add an agent to any system, it's going to use some of the compute or the memory, but this has no performance implications. That part is exciting because when you think of the security realm, often, as a team out of the cost center and a business enabler, there are situations where if we do affect performance, it's not great for the business. So, we have the understanding and the Corporate EQ that we don't want to have any impact on performance. This enables us again with the confidence that we're getting the right information out without having that impact down to our engineers or our production support.

    The agentless and direct collection of data enable Orca to see assets within our environmental and business contexts and prioritize truly critical security issues. It provides another notch up on confidence in terms of knowing what's in our production environment and having the ability to rapidly query in case there's a new CVE that's coming up. So if we know there is a drop in data, we have the ability to scan and see the assets and do the patch management as necessary or tear down boxes that don't need to be up there anymore. With the way it works, having visibility across the org is hands down the biggest benefit for us.

    The agentless approach also means that we're able to avoid the need to deploy and maintain multiple tools.

    What is most valuable?

    With its Cloud Security Posture Management capability, we have the ability to read across all of our cloud-based environments, which includes AWS and Azure. We have visibility into those environments. Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries.

    Given the agentless deployment, its time-to-value is less than 24 hours. It took less than 24 hours, and we had intelligence and insight. Ultimately, it is getting access to the API, and then from there, it is about getting the side channel scanning going on. Once that is complete, the real-time proprietary nature of new assets pops up. We also have the visibility if an old asset has been sitting out there unused for a really long time.

    What needs improvement?

    They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it.

    For how long have I used the solution?

    We've been using the Orca solution for about a year and a half. 

    What do I think about the stability of the solution?

    It had maybe two periods of downtime if my memory serves me correctly, but it was hard to even know that the service was down because we weren't actively querying during those windows. These downtimes were probably for less than a few hours. I read about them through an email from the founder. We wouldn't have even noticed them if they didn't update us on it.

    What do I think about the scalability of the solution?

    We started with our production account, and then we kept scaling to our test environments, to our corporate environments, ultimately to every AWS account that we have out there. It is being used as extensively as we can in our environment. We have about 14 AWS accounts. If we need more environments, it will be included as part of the practice.

    How are customer service and support?

    Luckily, we have a shared Slack channel. So, we have an extended Slack channel, and we're in there with the founders, as well as key engineers and members. So, it's real-time for us. If we have an issue, we go in and just message out, and then we can have that full loop within that Slack channel. We were customer number nine, and having this Slack channel was just something that made sense at the time.

    I would rate them a 10 out of 10. We get everything addressed pretty quickly.

    Which solution did I use previously and why did I switch?

    In terms of vulnerability assessment coverage, a lot of it was native tooling. We were using AWS GuardDuty across the environment as step one for anomaly detection, but for vulnerability management, there was very limited capacity.  We could leverage some of the existing tools that were out there to scan and perform analysis, but in reality, we're using a lot of what AWS offers. So, for the most part, it was native AWS tooling with GuardDuty and then just doing our best to query the fleet through AWS itself. Orca has really filled the gap for us.

    How was the initial setup?

    Because of its agentless nature, there is zero deployment time. It is mostly just getting the connection and performing the analysis. The deployment strategy is mostly, "Choose the accounts that are there and then hookup Orca." It took less than 24 hours, and we had intelligence and insight. 

    What's my experience with pricing, setup cost, and licensing?

    It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost.

    Which other solutions did I evaluate?

    We were looking at a few other tools out there. Dome9 and Lacework were the big key ones that were out there. There were some of the old heavy hitters, but they really didn't add a ton of value to what we were looking for. Some of them were just AWS GuardDuty on steroids. 

    For us, Orca just offered a better comprehensive solution. We had done enough demos and discussions, and we felt like, "Hey, it's worth the gamble on someone that's trying to solve something and maybe we can help drive the backlog or some of the features as well by being an early customer". That's a part of our strategy when it comes to choosing security solutions. It definitely fits our business needs.

    When choosing to go with Orca, the fact that it is a SaaS solution that is updated daily, and that new features are available at no additional cost was useful for us. That's the way it should be. There shouldn't be paywalls and all these other things. You're paying for the proprietary technology of the company and how they kind of package that up. They've been very open in terms of what features are available when and how they work.

    When we first looked at Orca, we weren't skeptical about whether it could do all the things that they said it can do. That's because the way it was presented was very logical in terms of how they instrumented the technological approach, and then the background of the founders made a lot of sense. So, either it was going to work, or it wasn't going to work, and if it didn't work, then we'd have an issue. When we did a PoC, it worked very well for us in a short window of time, and we had the confidence that this was going to be the right tool for us.

    What other advice do I have?

    I would advise others to not just set it and forget it. This is an ongoing capability. Just like every vulnerability management process, it is an ongoing continuous cycle. So, I wouldn't leverage this for one-time use or quarterly use. This is real-time that you should be analyzing, and on top of that, as new vulnerabilities are set, use the search function.

    Everything is included in Orca’s package, but Orca hasn't helped us to consolidate vendors or services. That's because we weren't replacing any existing ones. We didn't have six other things doing what they were doing. We were venturing out into a solution that has not ever been in place and figuring out exactly how to integrate it, how to leverage, and ultimately how to level up the organization.

    I would rate this solution a 10 out of 10.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    CISO at a financial services firm with 51-200 employees
    Real User
    Top 20
    It gives us visibility across all the assets in our multi-cloud environment in a single dashboard
    Pros and Cons
    • "There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report."
    • "We are PCI DSS compliant, so we need to scan our environment externally with tools vetted by the PCI DSS organization. Orca doesn't scan the environment externally. It only scans what's currently in the cloud."

    How has it helped my organization?

    Orca gives us visibility across all the assets in our multi-cloud environment in a single dashboard. That kind of visibility is rare for us and most organizations within the Fintech space. You could understand particular vulnerabilities in a pocket of your environment, but not to the extent that Orca provides today. To protect a business, you first want to look at your environment and inventory all your assets. All of these assets are still managed in a spreadsheet in many organizations today. Some of them are using tools that list all of the assets. We had an inventory, but the Orca tool could identify assets we thought were no longer operational.

    It isn't easy to quantify right now, but I can say that Orca gives us greater visibility of assets that we thought were gone but were correctly configured. Using Orca, we were able to identify certain assets that were still lying around and using an older operating system. Some of these were actually unpatched even though we thought they were patched.

    What is most valuable?

    We like that Orca is continuously monitoring our environment. When you open the tool, you instantly get an overview of your current state of affairs. You see everything happening across your multi-cloud environment in one view. When you're working on GCP or Azure, and you also have some other elements within AWS, it isn't easy to have a tool that spans all these cloud environments. It's great to have a single dashboard that puts all your cloud environments at your fingertips.

    Orca tool spans all our environments and gives us a compliance report. It can tell us where there are vulnerabilities within our environment and provide us with access to the logs of specific assets.

    What needs improvement?

    With any security tool, there's always room for improvement. We were among the early adopters, and many of the major improvements that we were looking for have already been added. Right now, we're looking at what the other players in that space are offering and if it can be integrated into Orca. I had a discussion with Orca six months ago about implementing these features. But once you start customizing your tool for specific customers, it doesn't necessarily mean that it will match the needs of other customers, and you begin to branch out. In general, I think the Orca's roadmap is pretty well aligned to what we need today.

    For how long have I used the solution?

    We are fortunate to have been using Orca since its inception. I think we were among Orca's first customers. We're always searching for new tools with intriguing capabilities that can help us better protect our organization. When I came across Orca, I felt it offered something others on the market didn't. 

    How are customer service and support?

    I rate Orca support 9.5 out of 10. Whenever we've sent a support ticket, Orca responds in less than an hour to tell us that they've received the request and are looking into it. We get a reply a couple of hours later most of the time. Sometimes it needed more work, but I think it was pretty fast.

    Support is one of the essential features you look for when purchasing a tool. Of course, you could buy a SaaS product, but if there is no support behind it, you'll have difficulty configuring it properly within your environment. Sometimes, you expect certain features to work correctly, but maybe you are configuring the solution wrong, so it's great to have support personnel available to respond to all your queries. 

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    When we started using the Orca tool, we already had some tools offering some of these features. However, we realized we didn't need to have all these agent-based tools installed across our environment to understand our risk footprint. We quickly understood that it would be easier to deploy across our entire multi-cloud environment if we went agentless with the Orca tool. It would offer us more capabilities than Qualys or even some of the AWS tooling available today, and we could consolidate everything under one tool.

    AWS has some tools that give you visibility into your environment. They can tell you where your PII is or if your assets are correctly configured. However, every new feature that AWS releases is only available in the US first. Sometimes they're not available in Japan, Canada, and Europe until months or years later. We're still waiting for these features to be available here in Japan. For example, AWS Macie is still not available in Japan today, and it has been two years now. There are many capabilities like this that we want the cloud provider to release in other countries, but it's not available today.

    What's more, if I run some AWS tooling, it will only scan my AWS environment but not my GCP or Azure environments. It's complicated to consolidate all of these reports in one place at the end of the month. Orca gives me a single view across all my environments.

    How was the initial setup?

    One of Orca's most significant advantages is that you can deploy it within your environment with a single click. There were no agents to install, so the deployment was quite easy. We simply entered the information about the cloud that we wanted to gain visibility into, and it was done. It can take days or weeks to deploy some other tools within an environment, especially if you're on-prem and sometimes on the cloud as well. We could deploy Orca in a matter of minutes. It was up and running within 15 minutes the first time we set it up.  

    What was our ROI?

    When you're talking about return on investment, you have to consider the resources needed to implement, maintain, and support a tool. With Orca, we didn't need to deploy or upgrade anything, and we didn't need to understand anything about support because they already had great support. I think we're saving hundreds of thousands of dollars every year in staffing costs alone. The time-to-value was instant. 

    What's my experience with pricing, setup cost, and licensing?

    When we purchased Orca, it came with everything we needed. We didn't need to buy any additional features, extensions, etc. You pay one price, and you have access to everything. I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing.

    Which other solutions did I evaluate?

    When we purchased Orca, there was some overlap with tools like Qualys that scan your environment for vulnerabilities. But Qualys is not well-suited for specific microservices. It doesn't give you all the visibility that you need in a particular area of your environment. 

    We are PCI DSS compliant, so we need to scan our environment externally with tools vetted by the PCI DSS organization. Orca doesn't scan the environment externally. It only scans what's currently in the cloud. There is some overlap between Orca and other tools, but others can scan externally. I still don't think Orca is in the business of scanning assets externally because they only scan internally. That's why we purchased it.

    What other advice do I have?

    I would rate Orca 9.5 out of 10. It covers our entire multi-cloud environment in a single view and tells us everything we need to know about our vulnerability footprint. For example, it can tell us whether our S3 bucket is misconfigured. There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report. Someone asked me if I would recommend Orca the other day, and I told them not to take my word for it. They should just try it.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    CISO at Lemonade Inc.
    Real User
    Top 20
    Allows agentless data collection directly from the cloud
    Pros and Cons
    • "Orca's dashboard is excellent. My team needs to be able to focus on specific areas for improvement in our cloud environment. And most recently, we've started to get good use out of sonar, the search capabilities, and the alert creation."
    • "I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click."

    What is our primary use case?

    We're using Orca Security to identify threats and vulnerabilities, manage our cloud security posture, and alert us to CSPM and threat issues.

    How has it helped my organization?

    Orca has improved our security by helping us address high-risk threats first. I don't have to spend time determining the risk myself because Orca does that. Now we can resolve issues based on absolute risk, which is a huge relief. 

    If we see an SSH key put up onto an externally facing machine by a developer, Orca will notify us, and we can deal with it immediately. Our other products don't tell us about that.

    What is most valuable?

    Orca's dashboard is excellent. My team needs to be able to focus on specific areas for improvement in our cloud environment. Most recently, we've started to get good use out of sonar, the search capabilities, and the alert creation. We plan on using that to automate notifications and remediations. So we have high hopes for that, but we haven't used much of that yet.

    The visibility Orca provides is excellent. Orca allows agentless data collection directly from the cloud, so I assume there is no performance impact. It's important for a product not to get in the way of performance, but it's not my biggest concern. I mainly care about coverage. It was important for us to have a SaaS solution, but it wasn't critical. We prefer not to manage a service ourselves, so it matters.

    What needs improvement?

    Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click. This is one area where I feel Datadog is better. Datadog has something called Security Signals, where they give you a dashboard, and you can structure it by the day or specify a period. It just tells you the different security signals that have occurred with a very obvious risk designation by color. That makes it easier than Orca's current view. So I think Orca could improve its interface.

    Another shortcoming of Orca is that it doesn't integrate with our particular non-standard ticketing system. So we have to finish developing an appropriate webhook for it. Other than that, it's integrated well with our identity provider and with our cloud environments.

    For how long have I used the solution?

    I've been using Orca Security since 2019, but my company has been using it since 2020.

    What do I think about the stability of the solution?

    We've never had an issue at all with it for as long as I've been running Orca. So I'm confident that it's perfectly stable and can handle the load.

    What do I think about the scalability of the solution?

    We have not seen any issues with scalability because our scale increases in a nonlinear way. Primarily, Orca is used only for security, so a handful of people—fewer than five—are using it. The roles are mainly cloud security engineers, and some DevOps people sometimes use it.

    We use it to monitor all of our cloud environments. So our usage is extensive, and it will monitor all of our cloud environments as we increase our cloud size.

    How are customer service and support?

    Orca's support is extremely responsive and competent.

    Which solution did I use previously and why did I switch?

    I used Lacework previously, and Orca is much better. My biggest concern is coverage. With Orca, I feel confident that I have full coverage of all of my resources. When I had Lacework, I found out that wasn't the case. I'm wary of any agent-based service like Lacework because we consistently fail to cover resources when the agents aren't applied correctly. I compared Lacework to Orca by running them side by side for several months. Lacework failed to cover about 23 percent of our resources.

    What's more, Lacework required way too much effort to dig through the hundreds — if not thousands — of false positives. In effect, we got zero value out of it. We could never resolve an issue, which means the issue just sat there forever because there were so many false positives. And the way Lacework presents information was very difficult to use. It was a useless product.

    How was the initial setup?

    Setting up Orca is straightforward. It took almost no effort. It was just a matter of doing the read-only integration for various accounts. That took less than two hours of someone's time. We started seeing results immediately.

    The fact that Orca is agentless is a significant reason it was easy to deploy. It didn't require me to test it in different environments by DevOps. All of those things would've added up a couple of weeks to the deployment time. Instead, it only required the security team to do a pretty easy integration with our cloud environments. And because there's no impact, there is no heavy testing required, so we got it done in a couple of hours.

    What was our ROI?

    We've seen a return on investment insofar as that can be measured for an essential tool. We're not planning on giving Orca up, but it all depends on the price of competitors like Wiz. If their price drops and it's significantly cheaper than Orca, it's easy to switch. Also, the time to value for Orca was immediate — 24 hours — so it's much better than other solutions. With Lacework, it took at least a month before we saw any value, and then the value was extremely low.

    What's my experience with pricing, setup cost, and licensing?

    While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services. 

    Which other solutions did I evaluate?

    We weren't using Datadog for security before Orca. We were using Orca. Datadog, of which we're a customer, started offering security in February. We used Datadog as a design partner, and I like aspects of it. But now that they're charging for it, we won't continue to use it. Datadog is overpriced for what it offers, and Orca gives us what we need. Orca tells us about vulnerabilities in a straightforward, manageable way. We haven't had many active threats, but Orca can also tell us about those. Datadog has something they call the workload security component, which is their agent-based component, and we found that to be very immature and inaccurate. We had to turn it off because it gave us so many false positives it was overwhelming us. So that's one area where Orca is superior to Datadog.

    Still, Datadog is an excellent product. We didn't start with Datadog security, though. We were using Datadog for application performance monitoring. We added Datadog security when Datadog began to offer it to design partners like us. It has some qualities we like and others we don't. But in the end, we're not going to stay with Datadog. I've also evaluated Palo Alto Prisma multiple times, and I've used and evaluated Lacework. I've also used other services like Threat Stack and Tenable Nessus. Compared to Palo Alto Prisma, I like that I don't have to pick and choose with Orca. I expect all of my products to give me everything for the price and not have to select from a menu.

    What other advice do I have?

    I rate Orca Security nine out of 10. When I first came across it a couple of years ago, I was skeptical about whether Orca could do everything they say it can do. At first, it was like magic. Now that I'm used to it, it's not magic anymore, but it does do a great job. I would advise anyone to try it. You'll immediately see the value.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    Buyer's Guide
    Download our free Orca Security Report and get advice and tips from experienced pros sharing their opinions.
    Updated: May 2023
    Buyer's Guide
    Download our free Orca Security Report and get advice and tips from experienced pros sharing their opinions.