We performed a comparison between Aqua Security Platform and Orca Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Aqua Security Platform users said they liked its vulnerability checks, malware detection, and on-demand patching. Orca Security is a cloud-based solution that stands out for its deep visibility, SideScanning feature, and vulnerability ranking. Aqua Security Platform could improve log forwarding and reporting. Users also complained about its high resource consumption. Orca Security could be better at intrusion detection and real-time risk assessment. Other pain points include compatibility with data centers and integration with non-standard ticketing systems.
Service and Support: Users have reported that Aqua Security Platform's customer service is generally responsive and helpful, although there were instances where users had to resolve issues independently. Orca Security's customer service has received positive feedback for being competent and attentive to customer needs. One user noted that the CEO personally helped them resolve a problem.
Ease of Deployment: The setup for Aqua Security Platform can be complex and time-consuming, and customers may need specialized personnel for maintenance. By contrast, Orca Security offers a quick and straightforward setup that only takes a few minutes.
Pricing: Users considered Aqua Security Platform to be moderately priced compared to other options, while opinions on Orca Security's pricing are mixed. Users say it is expensive, but many point out that it's a great value in terms of visibility and security.
ROI: Our users have left no feedback on Aqua Security Platform's ROI. Orca Security users report cost and time savings with this comprehensive solution.
Comparison Results: Our users prefer Orca Security over Aqua Security Platform. Users appreciate the deep visibility provides and its holistic approach to security. Orca stands out for its comprehensive container security and highly responsive customer service. Reviewers also like the effortless setup and user-friendly interface. Although some users find the price tag steep, they can't deny that Orca provides a significant ROI by saving users money and time.
"The UI is very good."
"The cloud misconfiguration is the most valuable feature."
"It is very straightforward. It is not complicated. For the information that it provides, it does a pretty good job."
"The real-time detection and response capabilities overall are great."
"PingSafe offers three key features: vulnerability management notifications, cloud configuration assistance, and security scanning."
"Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment."
"The DTA, which stands for Dynamic Threat Analysis, allows me to analyze Docker images in a sandbox environment before deployment, helping me anticipate risks."
"We use Aqua Security for the container security features."
"Aqua Security allowed us to gain visibility into the vulnerabilities that were present in the container images, that were being rolled out, the amount of risk that we were introducing to the platform, and provided us a look into the container environment by introducing access control mechanisms. In addition, when it came to runtime-level policies, we could restrict container access to resources in our environment, such as network-level or other application-level access."
"The most valuable feature of Aqua Security is the scanner."
"Their sandboxing service is also really good."
"The most valuable feature is the security."
"Aqua Security helps us to check the vulnerability of image assurance and check for malware."
"From what I understand, the initial setup is simple."
"Orca's dashboard is excellent. My team needs to be able to focus on specific areas for improvement in our cloud environment. And most recently, we've started to get good use out of sonar, the search capabilities, and the alert creation."
"The most valuable feature of Orca Security is the automated scanning tool, user-friendliness, and ease of use."
"Orca's SideScanning is the biggest feature. It's the 'wow' factor... With Orca's SideScanning, they just need permissions for your account and that makes it so simple."
"Orca provides X-ray vision into everything within the cloud properties, whereas normally, this would require multiple tools."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report."
"Orca Security has patented technologies. It's an agentless solution, so you don't need to install an agent. Instead, it contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure."
"The initial setup is very easy."
"While it is good, I think the solution's console could be improved."
"We can customize security policies but lack auditing capabilities."
"We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization."
"If I had to pick a complaint, it would be the way the hosts are listed in the tool. You have different columns separated by endpoint name, Cloud Account, and Cloud Instances ID. I wish there was something where we could change the endpoint name and not use just the IP address. We would like to have custom names or our own names for the instances. If I had a complaint, that would be it, but so far, it meets all the needs that we have."
"The could improve their mean time to detect."
"There's room for improvement in the graphic explorer."
"It does not bring much threat intel from the outside world. All it does is scan. If it can also correlate things, it will be better."
"Scanning capabilities should be added for the dark web."
"Sometimes I got stressed with the UI."
"There's room for improvement, particularly in management capabilities as it may not be comprehensive enough for all customers, and it has been lacking in the realm of cloud security posture management."
"They want to release improvements to their product to work with other servers because now there are more focused on the Kubernetes environment. They need to improve the normal servers. I would like to have more options."
"Aqua Security could improve the forwarding of logging into Splunk and into other tools, it should be easier."
"It's a bit hard to use the user roles. That was a bit confusing."
"I would like Aqua Security to look into is the development of a web security portal."
"Aqua Security lacks a lot in reporting."
"In the next release, Aqua Security should add the ability to automatically send reports to customers."
"The solution could improve by making the dashboards more elaborative and more descriptive."
"Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance."
"I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click."
"There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. But relative to my other security tools, Orca is definitely the most stable that I've seen."
"We are PCI DSS compliant, so we need to scan our environment externally with tools vetted by the PCI DSS organization. Orca doesn't scan the environment externally. It only scans what's currently in the cloud."
"As with all software, the user interface can always be made simpler to use. It would be helpful for people with very little knowledge, like somebody sitting behind the SOC, to allow them to be able to drill down into things a little bit easier than it is currently."
"I would like to see better customization options for security frameworks and better integration with reporting tools like Power BI or Grafana dashboards."
"The interface can be a bit cranky and sometimes takes a lot of time to load."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
Aqua Cloud Security Platform is ranked 7th in Container Security with 16 reviews while Orca Security is ranked 12th in Container Security with 15 reviews. Aqua Cloud Security Platform is rated 8.0, while Orca Security is rated 9.4. The top reviewer of Aqua Cloud Security Platform writes "Reliable with good container scanning and a straightforward setup". On the other hand, the top reviewer of Orca Security writes "Allows agentless data collection directly from the cloud". Aqua Cloud Security Platform is most compared with Prisma Cloud by Palo Alto Networks, Wiz, Snyk, Red Hat Advanced Cluster Security for Kubernetes and Qualys VMDR, whereas Orca Security is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud, CrowdStrike Falcon Cloud Security and XM Cyber. See our Aqua Cloud Security Platform vs. Orca Security report.
See our list of best Container Security vendors, best Cloud Workload Protection Platforms (CWPP) vendors, and best Cloud-Native Application Protection Platforms (CNAPP) vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.