Try our new research platform with insights from 80,000+ expert users

Azure Kubernetes Service (AKS) vs Orca Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Average Rating
8.6
Reviews Sentiment
8.1
Number of Reviews
92
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (4th), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (3rd)
Azure Kubernetes Service (AKS)
Ranking in Container Security
13th
Average Rating
8.2
Number of Reviews
36
Ranking in other categories
No ranking in other categories
Orca Security
Ranking in Container Security
14th
Average Rating
9.4
Number of Reviews
15
Ranking in other categories
Vulnerability Management (11th), Cloud Workload Protection Platforms (CWPP) (11th), Cloud Security Posture Management (CSPM) (9th), Cloud-Native Application Protection Platforms (CNAPP) (9th), Data Security Posture Management (DSPM) (6th), Cloud Detection and Response (CDR) (2nd)
 

Mindshare comparison

As of November 2024, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 2.0%, up from 0.8% compared to the previous year. The mindshare of Azure Kubernetes Service (AKS) is 0.6%, down from 0.7% compared to the previous year. The mindshare of Orca Security is 6.1%, down from 7.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Aug 29, 2024
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Luis_Navarrete - PeerSpot reviewer
Feb 4, 2023
Decreases administrative burdens and costs, has good diagnostic tools, and is easy to deploy
The solution's logs have room for improvement. I believe that consolidating the logs would help to improve the recall of information from them. With so many logs and such a large amount of data, it would be much easier to obtain relevant information if the logs were merged into a single log. I would like to have an easier migration from on-prem to the cloud Azure Kubernetes Service. I can complete the task quickly, but I'm not sure many others can accomplish it at the same time or with the same amount of effort, since it may be a bit challenging, to begin with, if we don't have a full understanding of the concepts. Therefore, it would be beneficial if the service provides a resource to make the integration process simpler. I believe Azure provides a great service, and I'm working with the solution on a daily basis. However, Azure Kubernetes Service can be improved to make it easier to manage. The user interface can be a bit overwhelming, especially for those who are unfamiliar with the concepts. I suggest having a wizard that simplifies integration and creation of a new Kubernetes in the cloud.
Cédric Thian-Meng - PeerSpot reviewer
Apr 3, 2024
It contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure
Orca Security has patented technologies. It's an agentless solution, so you don't need to install an agent. Instead, it contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure. The multi-cloud capability displays essential information and potential vulnerabilities with granular detail. For instance, it identifies paths that attackers might exploit to gain root or admin access to machines. It is comprehensive, covering a wide range of software needs. They also integrate with CI/CD pipelines, enabling developers to ensure security from the early stages of code deployment. This integration provides a 100% guarantee on security, safeguarding images, configurations, and other crucial information throughout the development process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"Cloud Native Security is a tool that has good monitoring features."
"PingSafe can integrate all your cloud accounts and resources you create in the AWS account, We have set it up to scan the AWS transfer services, EC2, security groups, and GitHub."
"PingSafe offers security solutions for both Kubernetes and CI/CD pipelines."
"Singularity Cloud Workload Security provides us with better security detection and more visibility. It is another resource that we can use to detect vulnerabilities in our company's systems. For example, it can help us detect new file processes that we are not familiar with, which could be used by attackers to exploit our systems. Singularity Cloud Workload Security can also help us diagnose and analyze data to determine whether it is malicious or not. Singularity Cloud Workload Security is like another pair of eyes that can help us protect our systems from cyberattacks."
"The user-friendly dashboard offers both convenience and security by providing quick access to solutions and keeping us informed of potential threats."
"We mostly use alerts. That has been pretty good. If we use the alert system from Amazon, it is much costlier to us, so we use PingSafe."
"The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"AKS is easy to use. We can scale up and down as needed with AKS, which saves us money on our cloud costs."
"The advantage of AKS is somewhat greater than that of Kubernetes, such as those provided by Google Cloud or AWS. However, the unique benefit offered by Microsoft is its robust CI/CD capabilities, along with the Azure feature for building workflows. When you combine the entire ecosystem, AKS becomes an excellent choice, particularly for enterprise applications."
"The most valuable feature of the solution is the diagnostic service."
"The integration with Azure's security capabilities is very good. The Azure managed identity and integration with the Azure application gateway for App Ingress are valuable features. Additionally, it is a very stable tool."
"The integration with Azure's security capabilities is very good. The Azure-managed identity and integration with the Azure application gateway for App Ingress are valuable features. Additionally, it is a very stable tool."
"Its support team resolves technical issues accurately."
"It is a stable solution."
"AKS as a service is very good when you need to leverage applications or functions with much variability in their usage because you're trying to be as efficient as you can with resources."
"Orca's platform provides an agentless data collection facility that collects information directly from the cloud using APIs, with zero impact on performance."
"Orca Security has patented technologies. It's an agentless solution, so you don't need to install an agent. Instead, it contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure."
"Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool."
"Orca Security has updated its interface, making it more user-friendly. I find it particularly useful as it allows me to easily navigate the dashboard and prioritize actions based on severity and criticality."
"There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report."
"The most valuable feature of Orca Security is the automated scanning tool, user-friendliness, and ease of use."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"Orca's SideScanning is the biggest feature. It's the 'wow' factor... With Orca's SideScanning, they just need permissions for your account and that makes it so simple."
 

Cons

"In addition to the console alerts, I would like PingSafe to also send email notifications."
"PingSafe is an excellent CSPM tool, but the CWPP features need to improve, and there is a scope for more application security posture management features. There aren't many ASPM solutions on the market, and existing ones are costly. I would like to see PingSafe develop into a single pane of glass for ASPM, CSPM, and CWPP. Another feature I'd like to see is runtime protection."
"PingSafe can be improved by developing a comprehensive set of features that allow for automated workflows."
"There should be more documentation about the product."
"If I had to pick a complaint, it would be the way the hosts are listed in the tool. You have different columns separated by endpoint name, Cloud Account, and Cloud Instances ID. I wish there was something where we could change the endpoint name and not use just the IP address. We would like to have custom names or our own names for the instances. If I had a complaint, that would be it, but so far, it meets all the needs that we have."
"The reporting works well, but sometimes the severity classifications are inaccurate. Sometimes, it flags an issue as high-impact, but it should be a lower severity."
"We'd like to have better notifications. We'd like them to happen faster."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"It would be nice if they could handle the management of personal information more efficiently."
"If any customer uses a traditional code, the code-level changes take a lot of time."
"Azure Kubernetes Service (AKS) is more flexible but more complex to maintain."
"The cost of Azure Kubernetes Service (AKS) is extremely high"
"The technical support could be faster."
"It just loses out because you have less access to it programmatically, with less technical or customizable access."
"AKS could enhance its functionality by introducing a blueprint feature that streamlines and expedites the process. With a blueprint, users can leverage pre-defined configurations, including some common survey elements, reducing the need for extensive customization and allowing us to focus on our core business activities. Additionally, if the blueprint covers security aspects, it would be greatly beneficial, as it eliminates the need for us to build security expertise from scratch. Currently, we encounter challenges during cloud onboarding, security implementation, and adapting to Kubernetes. Although Microsoft may not consider these as their direct responsibility, providing a blueprint similar to what they offer to developers would be highly advantageous."
"The application firewall is lacking some features and there is room for enhancement."
"The interface can be a bit cranky and sometimes takes a lot of time to load."
"There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. But relative to my other security tools, Orca is definitely the most stable that I've seen."
"I would be happy if they offered more automatic remediation options. They're working on that, but the more the better. For example, if they want you to harden a server, they would offer a hardening script that would be more aware of what's going on."
"The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see."
"I would like to see better customization options for security frameworks and better integration with reporting tools like Power BI or Grafana dashboards."
"It's not all clouds that they are currently onboarded with. For instance, they are not yet with public cloud and many other private clouds."
"They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it."
"The solution could improve by making the dashboards more elaborative and more descriptive."
 

Pricing and Cost Advice

"I am personally not taking care of the pricing part, but when we moved from CrowdStrike to PingSafe, there were some savings. The price of CrowdStrike was quite high. Compared to that, the price of PingSafe was low. PingSafe is charging based on the subscription model. If I want to add an AWS subscription, I need to pay more. It should not be based on subscription. It should be based on the number of servers that I am scanning."
"The pricing is fair. It is not inexpensive, and it is also not expensive. When managing a large organization, it is going to be costly, but it meets the business needs. In terms of what is out there on the market, it is fair and comparable to what I have seen, so I do not have any complaints about the cost"
"I understand that SentinelOne is a market leader, but the bill we received was astronomical."
"Its pricing is constant. It has been constant over the previous year, so I am happy with it. However, price distribution can be better explained. That is the only area I am worried about. Otherwise, the pricing is very reasonable."
"The pricing for PingSafe in India was more reasonable than other competitors."
"PingSafe is cost-effective for the amount of infrastructure we have. It's reasonable for what they offer compared to our previous solution. It's at least 25 percent to 30 percent less."
"Singularity Cloud Workload Security's licensing and price were cheaper than the other solutions we looked at."
"PingSafe is affordable."
"I like the pricing and find it to be in the mid-range, and I would rate it as five out of ten."
"As you scale your operations, AKS becomes more cost-effective."
"It is an expensive solution."
"The product is expensive in terms of scalability."
"The pricing of the solution is same as Azure Stack."
"The price of AKS is expensive. We pay approximately $10,000 monthly."
"Azure Kubernetes Service offers a pay-as-you-go licensing model."
"The product is expensive."
"The price is a bit expensive for smaller organizations."
"It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost."
"While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
"Overall, the pricing is reasonable and the discounts have been acceptable."
"The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
"We have a total of 25 licenses for this solution. The solution is on a pay-and-you-use model."
"I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
"The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
16%
Manufacturing Company
10%
Insurance Company
5%
Financial Services Firm
26%
Computer Software Company
14%
Manufacturing Company
8%
Government
5%
Computer Software Company
17%
Financial Services Firm
13%
Manufacturing Company
9%
University
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I am personally not taking care of the pricing part, but when we moved from CrowdStrike to Singularity Cloud Native S...
What needs improvement with PingSafe?
They can provide some kind of alert when a new type of risk is there. There can be a specific type of alert showing t...
What do you like most about Azure Kubernetes Service (AKS)?
The platform's high scalability is one of its biggest advantages.
What needs improvement with Azure Kubernetes Service (AKS)?
No improvements needed as Azure Kubernetes Service follows the Kubernetes standards very well and meets the required ...
What is your primary use case for Azure Kubernetes Service (AKS)?
I am using Azure Kubernetes Service (AKS) for enterprise applications. These applications are divided into microservi...
What do you like most about Orca Security?
It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just ...
What needs improvement with Orca Security?
The company is managed by industry veterans. It's a cloud-based product. They handle misconfigurations and analyse yo...
What is your primary use case for Orca Security?
We use the solution to show misconfiguration. Often, users lack knowledge about their assets' fingerprints and their ...
 

Also Known As

PingSafe
No data available
No data available
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino
Find out what your peers are saying about Azure Kubernetes Service (AKS) vs. Orca Security and other solutions. Updated: October 2024.
814,649 professionals have used our research since 2012.