At Orca Security, we’re on a mission to make it fast, easy, and cost effective for organizations to address critical cloud security issues so they can operate in the cloud with confidence.
Orca Security's most valuable features include its user-friendly interface which allows for easy navigation and prioritization of critical issues. The automated scanning tool, compliance dashboard, and ability to filter findings based on best practices like CIS and GDPR are also highly valued. Orca provides great visibility into assets and prioritizes vulnerabilities and findings to focus on high-priority items. Its SideScanning feature is particularly impressive as it allows for easy access to insights without requiring agent technology.
Users have identified several areas where Orca Security could improve. These include optimizing the deployment of APIs to address loading issues, adding more integrations with security solutions beyond the cloud, and providing an option for automated remediation. Additionally, users would appreciate more elaborate and descriptive dashboards, expanded anti-malware detection, and simplified user interfaces. Some users suggest improving user education by better communicating new features and capabilities.
Orca Security has provided significant ROI for businesses that have used it. The time-to-value is immediate, and it has saved companies hundreds of thousands of dollars in staffing costs, reduced overhead, and saved time. Orca's simplicity and agentless approach have made it easy for even non-experienced IT specialists to use it effectively. It has replaced other solutions and avoided the need for additional tools, saving businesses up to $450,000. Orca is updated daily, and new features are available at no additional cost. The time to filter data for a mid-sized company using Orca is a couple of minutes, whereas it would take a couple of hours for other security products on the market.
Orca Security's pricing can be expensive for smaller organizations, but it's competitive compared to alternatives in the market. The licensing is per-VM and depends on the type of environment, but discounts are offered for potential strategic partners. Their pricing model is aligned with market demand, but could be better aligned with the needs of smaller businesses and larger-scale enterprises. The cost depends on the number of assets and environments you have, but it's reasonable and there are no extra costs in addition to their standard licensing fees.
Orca Security is primarily used for cloud security management by identifying and addressing vulnerabilities across applications and operating systems in cloud environments like AWS and Azure. It allows for the monitoring of cloud security posture and provides remediation steps and compliance reports. Orca is used to ensure full visibility of cloud security every day, as start-ups and scale-ups are deploying code almost every day. It is also used to manage cloud security posture, including checking closed ports, permissions, and compliance levels. Orca is a core product for cloud security and is used as an inceptive tool to gain insights into the resting risk state of cloud assets.
Orca Security's customer service and support have been rated positively by customers. While some have experienced longer response times, most have found the team to be responsive and competent, with quick turnaround times for support tickets. Customers appreciate the availability of technical support to address queries and provide assistance with configuring the tool. The team is praised for their willingness to improve the product and respond to customer feedback. Orca Security's CEO has also been commended for going above and beyond to ensure customer success, even working through the night to resolve a deployment issue.
Orca Security's initial setup is described as straightforward, easy, and quick by multiple reviewers. The deployment process is said to be intensive and responsive with low latency. Setting up Orca Security is praised for being agentless, requiring no heavy testing or installation of agents. The process involves entering information about the cloud to gain visibility and can take as little as a matter of minutes to complete. Some reviewers even describe the deployment process as taking only a couple of minutes and requiring no maintenance.
Orca Security is highly scalable according to multiple users with various amounts of cloud assets and users. It has been used extensively in both large and small organizations with no issues. The product is designed to scale up and down easily, and it is being used as one of the core products in some cloud security teams.
Orca Security is generally regarded as a stable platform with few issues. Some users have reported minor problems in the past, but the company has been responsive in addressing these concerns. The platform is dependable and functional, with no major issues affecting its stability. Despite some occasional downtime, users have generally found Orca Security to be a reliable tool for their security needs.
Key Platform Features:
Agentless: Complete, centralized coverage of the entire cloud estate, without the need for installing and configuring agents or layering together multiple siloed tools. Full visibility of cloud misconfigurations, vulnerabilities, workload protection, malware scanning, image scanning, file integrity monitoring and more.
Asset Inventory: Get a complete inventory of all your public cloud assets, including detailed information on installed OSes, software, and applications, as well as data and network assets such as storage buckets, Virtual Private Clouds (VPCs), and Security Groups.
Attack Path Analysis: Visualize attack vectors to critical assets or crown jewels. See which assets are susceptible to lateral movement, assume roles, privilege escalation, and more.
Risk Prioritization: Prioritize the 1% of risks that matter the most, based on impact scores. Secure the vulnerabilities and misconfigured targets (critical assets) and eliminate the potential risks residing on the attack paths to those targets.
Cloud Threat Detection: Monitor for malicious activity within your entire cloud estate. Be aware of detected threats, user behavior anomalies and more.
Breach Forensics: Log every change and all activity into a central repository for investigation procedures to confirm or deny entry and compromises within the cloud estate.
Cloud To Dev (Shift Left): Orca’s built-in shift left capabilities enables DevOps to focus more security attention earlier in the CI/CD pipelines. Security teams are able to trace a production risk (misconfiguration or vulnerability) directly to the original source code repository from which it came, even down to the exact line of code that is at the root of the identified risk.
Compliance: Choose from over 60 preconfigured compliance frameworks, cloud security best practices, CIS Benchmarks, or design and build your own compliance framework for fast and continuous reporting.
Security Score: The Orca Security Score is found on Orca’s Risk Dashboard and is updated daily. The overall score is calculated based on performance in the following five categories - Suspicious Activity, IAM, Data at Risk, Vulnerable Assets, and Responsiveness. Since the scores are percentage based and not raw numbers, you can objectively make comparisons to other organizations within your industry or business units of different sizes. In addition to reporting to senior management, the Orca Security Score can help with internal self-monitoring, as a way of measuring risk mitigation efforts, to know where to focus efforts, and track progress.
Orca Security Benefits
Consolidate technologies to reduce costs and complexity:
“The more I can get out of this one solution, the better. I see Orca as the tool where we get all cloud-related security data.” - Joshua Scott, Head of Security and IT | Postman
Avoid costly breaches:
"I look at proactive asset discovery, configuration management, and vulnerability management as being able to find a vulnerability before the bad guys do and being able to deal with it before something exploits it. This is what Orca does for us." - Doug Graham, CSO & CPO | Lionbridge
Increase team productivity and efficiency by focusing on high-value activities and solving the 1% of risks that matter most:
"Orca is unique in that it locates vulnerabilities with precision and delivers tangible, actionable results – without having to sift through all the noise." - Aaron Brown, Senior Cloud Security Engineer | Sisense
Quick Time-to-Value with Immediate ROI:
"Orca told us we could have some visibility within 5 or 10 minutes, and I thought, ‘There’s no way.’ Well, I was wrong. They really did it." - Thomas Hill, CISO | Live Oak Bank
Reduce MTTR and remove operational friction:
“We can’t ask developers things like ‘Did you think about security? When you start a new VM on AWS, can you please let me know so I’m able to scan it? Can you please deploy an agent on that machine for me?’ We need a better way to work. Orca provides that better way by eliminating organizational friction.” - Erwin Geirnaert, Cloud Security Architect | NG Data
BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino