Try our new research platform with insights from 80,000+ expert users

IBM Guardium Vulnerability Assessment vs Orca Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Valuable Features

No sentiment score available
Sentiment score
8.5
Orca Security's SideScanning offers agentless visibility, risk ranking, and automated security for multi-cloud environments with an intuitive dashboard.
Additionally, it covers a large scope of vulnerabilities, CVEs, malware, and misconfiguration.
 

Room For Improvement

No sentiment score available
Sentiment score
7.5
Orca Security could improve integration, user interface, dashboards, cloud support, and add new security framework integrations.
Another improvement is in handling alerts for multiple files with the same CVE; it should provide an option to manage each file separately without affecting others.
 

Stability Issues

No sentiment score available
Sentiment score
8.5
Orca Security is reliable and efficient with minimal downtime, high stability ratings, and prompt support for rare issues.
 

Scalability Issues

No sentiment score available
Sentiment score
8.0
Orca Security scales efficiently across AWS and Azure, offering flexible, non-agent-based monitoring for diverse cloud environments and workloads.
When you onboard an organization, Orca will find new projects, folders, and resources without any additional effort required.
 

Customer Service

No sentiment score available
Sentiment score
7.5
Orca Security is praised for excellent customer service, quick response times, and a commitment to resolving issues effectively.
I would rate the quality of support as nine stars out of ten due to their quick and helpful responses.
 

Setup Cost

No sentiment score available
No sentiment score available
Orca Security offers competitive, flexible pricing based on cloud assets, with discounts for partners, but may be high for some.
The initial price seemed high, however, after negotiation, the final price was ideal.
 

Categories and Ranking

IBM Guardium Vulnerability ...
Ranking in Vulnerability Management
51st
Average Rating
6.6
Number of Reviews
3
Ranking in other categories
No ranking in other categories
Orca Security
Ranking in Vulnerability Management
11th
Average Rating
9.2
Reviews Sentiment
8.0
Number of Reviews
16
Ranking in other categories
Container Security (14th), Cloud Workload Protection Platforms (CWPP) (11th), Cloud Security Posture Management (CSPM) (9th), Cloud-Native Application Protection Platforms (CNAPP) (9th), Data Security Posture Management (DSPM) (6th), Cloud Detection and Response (CDR) (2nd)
 

Mindshare comparison

As of November 2024, in the Vulnerability Management category, the mindshare of IBM Guardium Vulnerability Assessment is 0.5%, down from 0.7% compared to the previous year. The mindshare of Orca Security is 5.0%, down from 5.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management
 

Featured Reviews

reviewer1714710 - PeerSpot reviewer
Worthwhile from the regulatory requirements and analytics perspective, but is expensive and not easy to use
We are a full security base integration and application business. We help with implementation and deployments. I used Guardium to help with a cloud migration to check and do some validation for a client's data landscape and services so that they made sure that they were all secure in overall…
Cédric Thian-Meng - PeerSpot reviewer
It contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure
Orca Security has patented technologies. It's an agentless solution, so you don't need to install an agent. Instead, it contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure. The multi-cloud capability displays essential information and potential vulnerabilities with granular detail. For instance, it identifies paths that attackers might exploit to gain root or admin access to machines. It is comprehensive, covering a wide range of software needs. They also integrate with CI/CD pipelines, enabling developers to ensure security from the early stages of code deployment. This integration provides a 100% guarantee on security, safeguarding images, configurations, and other crucial information throughout the development process.
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
34%
Computer Software Company
12%
Insurance Company
9%
Manufacturing Company
7%
Computer Software Company
17%
Financial Services Firm
13%
Manufacturing Company
9%
University
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Orca Security?
It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just scan the entire assets in the cloud.
What needs improvement with Orca Security?
The company is managed by industry veterans. It's a cloud-based product. They handle misconfigurations and analyse your runtime to detect malware. They're at the forefront regarding developer secur...
What is your primary use case for Orca Security?
We use the solution to show misconfiguration. Often, users lack knowledge about their assets' fingerprints and their cloud provider's configurations.
 

Learn More

 

Overview

 

Sample Customers

Information Not Available
BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino
Find out what your peers are saying about IBM Guardium Vulnerability Assessment vs. Orca Security and other solutions. Updated: October 2024.
816,406 professionals have used our research since 2012.