Try our new research platform with insights from 80,000+ expert users

Orca Security vs Zscaler Zero Trust Exchange Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 2, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Average Rating
8.6
Reviews Sentiment
7.7
Number of Reviews
115
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Workload Protection Platforms (CWPP) (4th), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (2nd), AI Software Development (1st), AI Observability (2nd)
Orca Security
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
22
Ranking in other categories
Vulnerability Management (17th), Container Security (18th), Cloud Workload Protection Platforms (CWPP) (10th), API Security (8th), Cloud Security Posture Management (CSPM) (11th), Cloud-Native Application Protection Platforms (CNAPP) (8th), Data Security Posture Management (DSPM) (9th), Cloud Detection and Response (CDR) (3rd), AI Security (7th)
Zscaler Zero Trust Exchange...
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
65
Ranking in other categories
Data Loss Prevention (DLP) (6th), Cloud Access Security Brokers (CASB) (9th), Application Control (6th), ZTNA as a Service (2nd), Secure Access Service Edge (SASE) (3rd), Remote Browser Isolation (RBI) (1st)
 

Mindshare comparison

Cloud-Native Application Protection Platforms (CNAPP) Market Share Distribution
ProductMarket Share (%)
Orca Security7.0%
Wiz20.2%
Prisma Cloud by Palo Alto Networks12.8%
Other60.0%
Cloud-Native Application Protection Platforms (CNAPP)
ZTNA as a Service Market Share Distribution
ProductMarket Share (%)
Zscaler Zero Trust Exchange Platform15.7%
Prisma Access by Palo Alto Networks11.7%
Cato SASE Cloud Platform11.5%
Other61.1%
ZTNA as a Service
 

Featured Reviews

SC
Information Security Engineer at DataVigilant Infotech
Enables us to prioritize and effectively address critical security issues
Evidence-based reporting helps us to prioritize and solve critical security issues. The new visualization feature demonstrates how an attacker can enter the system, highlighting the potential path that can be exploited and outlining all the steps the attacker could take. With that visibility, we can ensure the perimeter is strong and attackers cannot enter, thus reducing the risk. It has helped us prioritize issues. The visibility into how an attack could happen is valuable. For example, it highlights the system vulnerability and outlines where an attack could propagate. The visualization helps me to prioritize remediation, and if I don't know where to start, I can check to see the score that enables me to prioritize issues. I am using infrastructure-as-code scanning, and it's one of the useful features. In pre-production, it identifies embedded secrets and misconfigurations, including issues with Kubernetes or some privileged containers. This feature allows us to pass the audit and secure IaC code so that it isn't easily exploitable by attackers. We can more proactively work to identify and resolve vulnerabilities by using the dashboard and the alerting system that SentinelOne provides. It helps us with audits and compliance. We can show the compliance in percentage. We can confidently say that our company or infrastructure is very secure. It has improved our security posture by 30% to 35%. It has reduced our false positives by 30%. It has helped teams collaborate better. The security team manages SentinelOne Singularity Cloud Security, and when it flags vulnerabilities, they are forwarded to DevOps for remediation. Previously, we needed to identify and report the issues, but there would be lapses in communication. Now, there is a centralized dashboard that anyone can look at and see the open issues and work on them.
DM
Software Developer at a tech vendor with 1,001-5,000 employees
Security boosts and seamless server access enhance workplace flexibility
I really love the way Orca Security worked. A potential improvement could be additional security features for the two-step authentication, such as fingerprint recognition similar to what Checkpoint does. That could be something to consider, though it's more about convenience than security as we didn't have any security issues.The timeout settings could be made more customizable, as sometimes if I leave the office early, it's still running unless manually turned off. The process of turning it off isn't very straightforward, so making it easier to turn off manually would be beneficial. It would be good for any business to implement so they don't have to use a VPN. Security in today's age is important, and if a company can afford it, they should get it as it's the most valuable protection against threats.
Sumit Bhanwala - PeerSpot reviewer
architect at Tata Consultancy
Cloud-based platform simplifies device and data center management
I find it to be good. The solution is cloud-based with the latest inspection engines, which I find to be amazing. We are less dependent on data centers and device management, which reduces our efforts significantly. It improves our device management, data center management, and updating devices. We need fewer engineers for this management, and it reduces time and efforts for data center management, device upgrades, and IT support.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"SentinelOne Singularity Cloud Security's graph explorer is a valuable tool that lets us visualize all connected services."
"Singularity Cloud Workload Security provides us with better security detection and more visibility. It is another resource that we can use to detect vulnerabilities in our company's systems. For example, it can help us detect new file processes that we are not familiar with, which could be used by attackers to exploit our systems. Singularity Cloud Workload Security can also help us diagnose and analyze data to determine whether it is malicious or not. Singularity Cloud Workload Security is like another pair of eyes that can help us protect our systems from cyberattacks."
"Singularity Cloud Security's most valuable features are its ease of scalability and comprehensive security measures."
"The UI is responsive and user-friendly."
"When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
"SentinelOne Singularity Cloud Security is excellent, and I highly recommend it."
"The best features of Orca Security include its ability to perform a lot of security controls without requiring any installation of agents, making it very easy to set up."
"With its Cloud Security Posture Management capability, we have the ability to read across all of our cloud-based environments, which includes AWS and Azure. We have visibility into those environments. Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries."
"It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just scan the entire assets in the cloud."
"Orca's SideScanning is the biggest feature. It's the 'wow' factor... With Orca's SideScanning, they just need permissions for your account and that makes it so simple."
"Orca Security has updated its interface, making it more user-friendly. I find it particularly useful as it allows me to easily navigate the dashboard and prioritize actions based on severity and criticality."
"Orca Security has patented technologies. It's an agentless solution, so you don't need to install an agent. Instead, it contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure."
"There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report."
"The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments."
"As a cloud-based service, it is very easily implemented."
"The solution offers a simplified network infrastructure and security functions and it enables secure remote access for the users"
"The most valuable features of Zscaler CASB are API integration and DLP."
"The product's most valuable features are cloud-based services and secure internet access. We don't have to set up any physical appliances."
"You can close your data protection gaps with Zscaler. You can quickly find all the classified, sensitive data across the cloud."
"On DLP terms, Zscaler Cloud DLP ensures that data doesn't go outside of the organization. So on the network level, Zscaler does a pretty good job."
"What I find most valuable in Zscaler Private Access is that it's a VPN. Its connectivity as a VPN is its most valuable feature."
"I like its ease of use. It has a single pane of glass for the ZIA and ZPA pieces. It is very manageable. It is also very easy to deploy for secure access, and it gives half-decent coverage for visibility in terms of what the users use and what data is being proxied through the access gateway."
 

Cons

"SentinelOne Singularity Cloud Security is on the costlier side."
"Maybe container runtime security could be improved."
"I would like SentinelOne Singularity Cloud Security's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"One of our use cases was setting up a firewall for our endpoints, specifically for our remote users... We were hoping to utilize SentinelOne's firewall capabilities, but there were limitations on how many URLs we could implement. Because of those limitations on the number of URLs, we weren't able to utilize that feature in the way we had hoped to."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"Scanning capabilities should be added for the dark web."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"A beneficial improvement for SentinelOne Singularity Cloud Security would be integration with Jira, allowing for a more streamlined ticketing system."
"In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties."
"The presentation of the data in the dashboard is a little bit chaotic."
"The documentation for Orca Security could be improved."
"We are PCI DSS compliant, so we need to scan our environment externally with tools vetted by the PCI DSS organization. Orca doesn't scan the environment externally. It only scans what's currently in the cloud."
"Orca needs improvement in snoozing or dismissing specific alarms. Currently, snoozing dismisses all future vulnerabilities related to a CVE."
"As with all software, the user interface can always be made simpler to use. It would be helpful for people with very little knowledge, like somebody sitting behind the SOC, to allow them to be able to drill down into things a little bit easier than it is currently."
"The documentation for Orca Security could be improved."
"I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click."
"You won't find anything that can help you with the configuration part and other areas related to the product if you search for proper or exact details of Zscaler Cloud DLP online in very easy language."
"More on-prem infrastructure is required when Zscaler Private Access is to be implemented as a single point of entry."
"The solution's granularity should be improved because it has limited granular options to control, visible, allow, block, delay, and receive."
"I rate it a seven because I am still working through some kinks from a performance and a support perspective."
"It needs to offer SSO, single sign-on, and items of that nature."
"To enhance their offering, it is advisable for them to focus on strengthening the foundation of their architecture. Additionally, they should consider integrating a broader range of services that go beyond what managed service providers typically offer independently."
"We have issues with the tool's maintenance and networking. It should be able to work in offline mode as well."
"There are some performance issues with the solution once the module addition begins"
 

Pricing and Cost Advice

"It's a fair price for what you get. We are happy with the price as it stands."
"The price depends on the extension of the solution that you want to buy. If you want to buy just EDR, the price is less. XDR is a little bit more expensive. There are going to be different add-ons for Singularity."
"The features included in PingSafe justify its price point."
"SentinelOne Singularity Cloud Security is on the costlier side."
"The tool is cost-effective."
"The pricing tends to be high."
"The pricing is fair. It is not inexpensive, and it is also not expensive. When managing a large organization, it is going to be costly, but it meets the business needs. In terms of what is out there on the market, it is fair and comparable to what I have seen, so I do not have any complaints about the cost"
"SentinelOne offers excellent pricing and licensing options."
"The price is a bit expensive for smaller organizations."
"Overall, the pricing is reasonable and the discounts have been acceptable."
"The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
"We have a total of 25 licenses for this solution. The solution is on a pay-and-you-use model."
"While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
"I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
"Orca Security is cheaper compared to other solutions in the same space."
"Orca Security charges are based on cloud workloads. So, it's based on workloads. If we look at one feature, it might be expensive."
"The product has reasonable pricing."
"There is definitely an ROI."
"My company is a Zscaler Private Access partner, so the customers pay for the license fees."
"The product is a little more expensive than other tools."
"The solution is expensive."
"It's expensive currently. But when purchasing for a large number of users, there's room to negotiate. It's really up to the procurement team."
"Zscaler Private Access can be an expensive solution, depending on the license type you will purchase."
"It is an auto-renewal subscription service."
report
Use our free recommendation engine to learn which Cloud-Native Application Protection Platforms (CNAPP) solutions are best for your needs.
880,255 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
14%
Manufacturing Company
9%
Government
5%
Computer Software Company
14%
Financial Services Firm
13%
Manufacturing Company
10%
University
5%
Financial Services Firm
13%
Computer Software Company
12%
Manufacturing Company
9%
Insurance Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business48
Midsize Enterprise20
Large Enterprise54
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise7
Large Enterprise6
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise12
Large Enterprise41
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I think the pricing of SentinelOne Singularity Cloud Security is a bit high.
What needs improvement with PingSafe?
We did not try to use the threat investigations feature from SentinelOne Singularity Cloud Security.Drift detection w...
What do you like most about Orca Security?
It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just ...
What needs improvement with Orca Security?
I experienced some problems with custom tags in Orca Security where I tried to separate the environment for business ...
What is your primary use case for Orca Security?
We wanted to understand our cloud environment better, so we had a demo of Orca Security and then signed a deal to acc...
What is the better solution - Prisma Access or Zscaler Private Access?
We looked into Prisma Access before choosing Zscaler Private Access (ZPA). Palo Alto’s Prisma Access is a secure ac...
What do you like most about Zscaler SASE?
The most valuable features of Zscaler Private Access are reliability, scalability, and availability.
What needs improvement with Zscaler SASE?
The solution needs to improve a lot of aspects.
 

Also Known As

PingSafe
No data available
Zscaler SASE, Zscaler DLP, Zscaler CASB, Zscaler CSPM, Zscaler Browser Isolation, Zscaler Posture Control
 

Overview

 

Sample Customers

Information Not Available
BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino
Siemens, AutoNation, GE, NOV
Find out what your peers are saying about Orca Security vs. Zscaler Zero Trust Exchange Platform and other solutions. Updated: July 2025.
880,255 professionals have used our research since 2012.