Try our new research platform with insights from 80,000+ expert users

AccuKnox Platform vs Orca Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Ranking in Cloud Security Posture Management (CSPM)
4th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
3rd
Average Rating
8.6
Reviews Sentiment
8.0
Number of Reviews
99
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Compliance Management (3rd)
AccuKnox Platform
Ranking in Container Security
31st
Ranking in Cloud Workload Protection Platforms (CWPP)
26th
Ranking in Cloud Security Posture Management (CSPM)
33rd
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
24th
Average Rating
6.0
Number of Reviews
1
Ranking in other categories
Cloud Infrastructure Entitlement Management (CIEM) (8th)
Orca Security
Ranking in Container Security
10th
Ranking in Cloud Workload Protection Platforms (CWPP)
9th
Ranking in Cloud Security Posture Management (CSPM)
7th
Ranking in Cloud-Native Application Protection Platforms (CNAPP)
6th
Average Rating
9.0
Reviews Sentiment
7.9
Number of Reviews
19
Ranking in other categories
Vulnerability Management (9th), Data Security Posture Management (DSPM) (5th), Cloud Detection and Response (CDR) (1st)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
RaviUpadhyay - PeerSpot reviewer
Uses unique technologies for container security, flexible integration but lacks good user experience
There should always be some customized reports included. The dashboard is one thing, and the second is a report. Based on that, users can assist their environment. For example, for some Terraform code, customers want end-to-end things with their tool. They don’t want multiple tools. For a specific purpose, we need to look at different tools. They will look for a solution in one platform only so that the cost can be saved. If we use multiple tools, it means we need to give access to different ports in their environment. It is basically a kind of security compromise happening. Users have a lot of ports being used. So, basically, users don’t want to use multiple tools. They want a single tool that includes multiple features. The report part was missing. Also, some kind of clarity [flow clarity] is not in the tool as of now, but they are working on it. For example, if somebody manages the tool in their environment, the tool should be user-friendly. But this tool is not user-friendly as of now. This tool needs some kind of improvement so that new users or new security engineers can understand all the things in a short period of time. They can understand what is happening and how we can provide. They are catching the customer needs and working along with their development team. For example, some of the policies customers wanted to be placed at the organization level were missing. But AccuKnox have projections as well. Some of the good things they have used are flexible to integrate with other tools. For example, not from the security point of view, but maybe CI/CD, some third-party tools helping out to optimize the container image in terms of being lightweight or having a very low surface level. Basically, it protects against surface attacks. If a heavier image is used, it takes time to upload and impacts overall application performance. So, some tools are good for optimization.
Cédric Thian-Meng - PeerSpot reviewer
It contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure
Orca Security has patented technologies. It's an agentless solution, so you don't need to install an agent. Instead, it contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure. The multi-cloud capability displays essential information and potential vulnerabilities with granular detail. For instance, it identifies paths that attackers might exploit to gain root or admin access to machines. It is comprehensive, covering a wide range of software needs. They also integrate with CI/CD pipelines, enabling developers to ensure security from the early stages of code deployment. This integration provides a 100% guarantee on security, safeguarding images, configurations, and other crucial information throughout the development process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."
"PingSafe's most valuable feature is its unified console."
"The most valuable aspect of Singularity Cloud Security is its unified dashboard."
"It's helped free up staff time so that they can work on other projects."
"Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks."
"The UI is responsive and user-friendly."
"The ease of use of the platform is very nice."
"I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"The platform is strong in container and kernel-level security."
"The best features of Orca Security include its ability to perform a lot of security controls without requiring any installation of agents, making it very easy to set up."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"Orca's SideScanning is the biggest feature. It's the 'wow' factor... With Orca's SideScanning, they just need permissions for your account and that makes it so simple."
"The initial setup is very easy."
"I find Orca Security's CIEM feature invaluable, as it focuses on entitlement and posture management, identifying assets with older OS versions, and asset misconfiguration."
"One of the valuable features of Orca Security is its design and options that allow flexible filtering and user-friendly visualization."
"Orca Security has updated its interface, making it more user-friendly. I find it particularly useful as it allows me to easily navigate the dashboard and prioritize actions based on severity and criticality."
"The best features of Orca Security include its ability to perform a lot of security controls without requiring any installation of agents, making it very easy to set up."
 

Cons

"For vulnerabilities, they are showing CVE ID. The naming convention should be better so that it indicates the container where a vulnerability is present. Currently, they are only showing CVE ID, but the same CVE ID might be present in multiple containers. We would like to have the container name so that we can easily fix the issue."
"Cloud Native Security's reporting could be better. We are unable to see which images are impacted. Several thousand images have been deployed, so if we can see some application-specific information in the dashboard, we can directly send that report to the team that owns the application. We'd also like the option to download the report from the portal instead of waiting for the report to be sent to our email."
"Scanning capabilities should be added for the dark web."
"The cost has the potential for improvement."
"The Kubernetes scanning on the Oracle Cloud needs to be improved. It's on the roadmap. AWS has this capability, but it's unavailable for Oracle Cloud."
"I would like to see the map feature improve. It's good, but it isn't fully developed. It lets us use custom resources and policies but does not allow us to perform some actions. I would also like more custom integration and runtime security for Kubernetes."
"When we request any changes, they must be reflected in the next update."
"Singularity Cloud Security currently lacks a break-glass account function, which is a critical component for implementing Single Sign-On as it allows for regaining access in emergencies."
"AccuKnox platform have AI-based features, but those aren’t fully developed yet."
"In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties."
"Orca Security could improve its ticket creation process."
"A notable limitation with Orca Security is its scanning feature. The automatic scan only runs every 24 hours, and if an alert is remediated within an hour, it still remains until the next scheduled scan."
"The documentation for Orca Security could be improved."
"I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click."
"The automatic scan only runs every 24 hours, and if an alert is remediated within an hour, it still remains until the next scheduled scan."
"Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance."
"Orca needs improvement in snoozing or dismissing specific alarms. Currently, snoozing dismisses all future vulnerabilities related to a CVE."
 

Pricing and Cost Advice

"Its pricing is okay. It is in line with what other providers were providing. It is not cheap. It is not expensive."
"The tool is cost-effective."
"The licensing is easy to understand and implement, with some flexibility to accommodate dynamic environments."
"I am not involved in the pricing, but it is cost-effective."
"Pricing is based on modules, which was ideal for us."
"Its pricing was a little less than other providers."
"As a partner, we receive a discount on the licenses."
"I am personally not taking care of the pricing part, but when we moved from CrowdStrike to PingSafe, there were some savings. The price of CrowdStrike was quite high. Compared to that, the price of PingSafe was low. PingSafe is charging based on the subscription model. If I want to add an AWS subscription, I need to pay more. It should not be based on subscription. It should be based on the number of servers that I am scanning."
Information not available
"Overall, the pricing is reasonable and the discounts have been acceptable."
"Orca Security charges are based on cloud workloads. So, it's based on workloads. If we look at one feature, it might be expensive."
"It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost."
"The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
"The price is a bit expensive for smaller organizations."
"I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
"Orca is very competitive when compared to the alternatives and is not the most expensive in the market, that's for sure."
"We have a total of 25 licenses for this solution. The solution is on a pay-and-you-use model."
report
Use our free recommendation engine to learn which Cloud Security Posture Management (CSPM) solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Manufacturing Company
17%
Computer Software Company
13%
Comms Service Provider
12%
University
8%
Computer Software Company
17%
Financial Services Firm
13%
Manufacturing Company
9%
University
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
The pricing is somewhat high compared to other market tools. This cost can be particularly prohibitive for small busi...
What needs improvement with PingSafe?
To enhance the notification system's efficiency, resolved issues should be promptly removed from the portal. Currentl...
What is your experience regarding pricing and costs for AccuKnox Platform?
AccuKnox has fixed charges on that. Also, AccuKnox has cluster-based pricing, depending on how many cloud providers y...
What needs improvement with AccuKnox Platform?
There should always be some customized reports included. The dashboard is one thing, and the second is a report. Base...
What is your primary use case for AccuKnox Platform?
This product is for container-based security. It is a new tool; recently, they have been working independently with s...
What do you like most about Orca Security?
It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just ...
What needs improvement with Orca Security?
The documentation for Orca Security could be improved. The compliance framework also needs enhancements, especially c...
What is your primary use case for Orca Security?
We used Orca Security for Cloud Security Posture Management (CSPM), vulnerability assessment, and several other secur...
 

Also Known As

PingSafe
No data available
No data available
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino
Find out what your peers are saying about Palo Alto Networks, Wiz, Microsoft and others in Cloud Security Posture Management (CSPM). Updated: November 2024.
824,053 professionals have used our research since 2012.