Try our new research platform with insights from 80,000+ expert users

Azure Kubernetes Service (AKS) vs Orca Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 16, 2024
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Container Security
3rd
Average Rating
8.6
Reviews Sentiment
8.0
Number of Reviews
102
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (4th), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (3rd)
Azure Kubernetes Service (AKS)
Ranking in Container Security
14th
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
37
Ranking in other categories
No ranking in other categories
Orca Security
Ranking in Container Security
10th
Average Rating
9.0
Reviews Sentiment
7.9
Number of Reviews
19
Ranking in other categories
Vulnerability Management (9th), Cloud Workload Protection Platforms (CWPP) (9th), Cloud Security Posture Management (CSPM) (7th), Cloud-Native Application Protection Platforms (CNAPP) (6th), Data Security Posture Management (DSPM) (5th), Cloud Detection and Response (CDR) (1st)
 

Mindshare comparison

As of December 2024, in the Container Security category, the mindshare of SentinelOne Singularity Cloud Security is 2.1%, up from 0.8% compared to the previous year. The mindshare of Azure Kubernetes Service (AKS) is 0.6%, down from 0.8% compared to the previous year. The mindshare of Orca Security is 6.1%, down from 7.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Container Security
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Luis_Navarrete - PeerSpot reviewer
Decreases administrative burdens and costs, has good diagnostic tools, and is easy to deploy
The solution's logs have room for improvement. I believe that consolidating the logs would help to improve the recall of information from them. With so many logs and such a large amount of data, it would be much easier to obtain relevant information if the logs were merged into a single log. I would like to have an easier migration from on-prem to the cloud Azure Kubernetes Service. I can complete the task quickly, but I'm not sure many others can accomplish it at the same time or with the same amount of effort, since it may be a bit challenging, to begin with, if we don't have a full understanding of the concepts. Therefore, it would be beneficial if the service provides a resource to make the integration process simpler. I believe Azure provides a great service, and I'm working with the solution on a daily basis. However, Azure Kubernetes Service can be improved to make it easier to manage. The user interface can be a bit overwhelming, especially for those who are unfamiliar with the concepts. I suggest having a wizard that simplifies integration and creation of a new Kubernetes in the cloud.
Cédric Thian-Meng - PeerSpot reviewer
It contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure
Orca Security has patented technologies. It's an agentless solution, so you don't need to install an agent. Instead, it contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure. The multi-cloud capability displays essential information and potential vulnerabilities with granular detail. For instance, it identifies paths that attackers might exploit to gain root or admin access to machines. It is comprehensive, covering a wide range of software needs. They also integrate with CI/CD pipelines, enabling developers to ensure security from the early stages of code deployment. This integration provides a 100% guarantee on security, safeguarding images, configurations, and other crucial information throughout the development process.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has a user-friendly dashboard that I can access without any difficulty."
"The user-friendly dashboard offers both convenience and security by providing quick access to solutions and keeping us informed of potential threats."
"The solution helped free other staff to work on other projects or other tasks. We basically just had to do a bunch of upfront configuring. With it, we do not have to spend as much time in the console."
"The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"It's positively affected the communication between cloud security, application developers, and AppSec teams."
"The multi-cloud support is valuable. They are expanding to different clouds. It is not restricted to only AWS. It allows us to have different clouds on one platform."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"It is scalable, stable, and can detect any threat on a machine. It uses artificial intelligence and can lock down any virus."
"The most valuable feature is the autoscaling and self-healing."
"We like how easy it is to create the resources in this solution, thanks to how easy the UI is to use."
"I found the Helm deployment feature of the solution valuable."
"AKS is easy to use. We can scale up and down as needed with AKS, which saves us money on our cloud costs."
"The Front Door and Service Bus are the most vital features"
"The setup was straightforward and it took one hour to deploy."
"The integration with Azure's security capabilities is very good. The Azure-managed identity and integration with the Azure application gateway for App Ingress are valuable features. Additionally, it is a very stable tool."
"The most valuable features of AKS are scalability, deployability, and automation."
"Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool."
"Orca Security has updated its interface, making it more user-friendly. I find it particularly useful as it allows me to easily navigate the dashboard and prioritize actions based on severity and criticality."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments."
"It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just scan the entire assets in the cloud."
"The most valuable feature of Orca Security is the automated scanning tool, user-friendliness, and ease of use."
"Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks... You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca."
"Orca's platform provides an agentless data collection facility that collects information directly from the cloud using APIs, with zero impact on performance."
 

Cons

"The categorization of the results from the vulnerability assessment could be improved."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"While it is good, I think the solution's console could be improved."
"Bugs need to be disclosed quickly."
"In some cases, the rules are strictly enforced but do not align with real-world use cases."
"The documentation that I use for the initial setup can be more detailed or written in a more user-friendly language to avoid troubles."
"To enhance the notification system's efficiency, resolved issues should be promptly removed from the portal."
"PingSafe can be improved by developing a comprehensive set of features that allow for automated workflows."
"There is room for improvement in automation processes, as well."
"The initial setup of AKS is complicated. The setup depends on the cluster, nodes, and lots of other things. There are also lots of extremely critical small devices. Moreover, you will have to pay them even while setting up the solution. It is not like you setup first and then pay for it."
"I would like to see the stability get more synchronized."
"We would like to see the addition of a service report from the server for this solution, so that we can monitor the health of server operations."
"The solution's logs have room for improvement."
"The solution should improve its UI and cost."
"Unfortunately, when a microservice fails, Azure can take up to 60 seconds to broadcast an alert to the monitoring agents."
"Azure Kubernetes Service (AKS) is not up to optimal standards when it comes to capturing logs and visualization."
"Orca Security could improve its ticket creation process."
"I would like to see better customization options for security frameworks and better integration with reporting tools like Power BI or Grafana dashboards."
"I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click."
"Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance."
"The presentation of the data in the dashboard is a little bit chaotic."
"We are PCI DSS compliant, so we need to scan our environment externally with tools vetted by the PCI DSS organization. Orca doesn't scan the environment externally. It only scans what's currently in the cloud."
"In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties."
"I would like to see an option to do security checks on a code level. This is possible because they have access to all of the code running in the cloud provider, and combining their site-scanning solution with that would be a nice add-on."
 

Pricing and Cost Advice

"Its pricing is okay. It is in line with what other providers were providing. It is not cheap. It is not expensive."
"PingSafe's pricing is good because it provides us with a solution."
"I am not involved in the pricing, but it is cost-effective."
"It is a little expensive. I would rate it a four out of ten for pricing."
"It is not that expensive. There are some tools that are double the cost of PingSafe. It is good on the pricing side."
"I would rate the cost a seven out of ten with ten being the most costly."
"PingSafe is priced reasonably for our workload."
"Pricing is based on modules, which was ideal for us."
"We are facing a significant challenge regarding OEM licensing. The issue arises from the fact that certain licenses required for our own purposes are not provided by Microsoft's licensing. Consequently, we are unsure about the most suitable mobile license provisioning model offered by third-party providers."
"It is expensive compared to other vendors."
"I like the pricing and find it to be in the mid-range, and I would rate it as five out of ten."
"As you scale your operations, AKS becomes more cost-effective."
"The product follows a pay-as-you-go pricing model which is good for small enterprises. You need to pay only for the services that you use."
"The solution does not cost much."
"The product is expensive."
"The price of AKS is expensive. We pay approximately $10,000 monthly."
"Orca is very competitive when compared to the alternatives and is not the most expensive in the market, that's for sure."
"I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
"The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
"We have a total of 25 licenses for this solution. The solution is on a pay-and-you-use model."
"The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
"It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost."
"Orca Security charges are based on cloud workloads. So, it's based on workloads. If we look at one feature, it might be expensive."
"Overall, the pricing is reasonable and the discounts have been acceptable."
report
Use our free recommendation engine to learn which Container Security solutions are best for your needs.
824,095 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Financial Services Firm
25%
Computer Software Company
14%
Manufacturing Company
8%
Government
6%
Computer Software Company
17%
Financial Services Firm
13%
Manufacturing Company
8%
University
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
The pricing is somewhat high compared to other market tools. This cost can be particularly prohibitive for small busi...
What needs improvement with PingSafe?
To enhance the notification system's efficiency, resolved issues should be promptly removed from the portal. Currentl...
What do you like most about Azure Kubernetes Service (AKS)?
The platform's high scalability is one of its biggest advantages.
What needs improvement with Azure Kubernetes Service (AKS)?
No improvements needed as Azure Kubernetes Service follows the Kubernetes standards very well and meets the required ...
What is your primary use case for Azure Kubernetes Service (AKS)?
I am using Azure Kubernetes Service (AKS) for enterprise applications. These applications are divided into microservi...
What do you like most about Orca Security?
It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just ...
What needs improvement with Orca Security?
The documentation for Orca Security could be improved. The compliance framework also needs enhancements, especially c...
What is your primary use case for Orca Security?
We used Orca Security for Cloud Security Posture Management (CSPM), vulnerability assessment, and several other secur...
 

Also Known As

PingSafe
No data available
No data available
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino
Find out what your peers are saying about Azure Kubernetes Service (AKS) vs. Orca Security and other solutions. Updated: December 2024.
824,095 professionals have used our research since 2012.