or
Continue with LinkedIn
Recover my Password
Submit your Tekpon Account E-mail address and you will receive an email with instructions to reset your password.

Orca Security

Tekpon Score
8.7

Orca Security Reviews

& Product Details

What is Orca Security?

Orca Security is a prominent Cloud Security Platform that transforms cloud security by offering comprehensive risk identification, prioritization, and remediation across various cloud environments such as AWS, Azure, Alibaba Cloud, Google Cloud, and Kubernetes.

With features like attack path analysis, vulnerability management, cloud workload protection, container security, and more, it delivers a unified solution for cloud security needs. It empowers users to efficiently address cloud vulnerabilities, misconfigurations, identity risks, data security, API exposure, and advanced threats.

Its agentless approach ensures seamless integration and actionable insights to streamline security processes. Its pioneering SideScanning™ technology captures data directly from cloud configurations and runtime storage, enabling instant risk identification and strategic remediation.

By connecting cloud security across the entire application lifecycle, Orca helps organizations operate confidently in the cloud while maximizing security outcomes.

Best For

Cloud security platform for AWS, Azure, and GCP environments
  • StartUps
  • Freelancers
  • Small Business
  • Medium Business
  • Large Enterprise
  • Non-profit Organization
  • Personal
  • Cloud, SaaS, Web-Based
  • Mobile - Android
  • Mobile - iPhone
  • Mobile - iPad
  • Desktop - Mac
  • Desktop - Windows
  • Desktop - Linux
  • Desktop - Chromebook
  • On-Premise - Windows
  • On-Premise - Linux
  • Company Name

    Orca Security

  • Located In

    United States

  • Website

    orca.security

Starting from:

Custom

Pricing Model: Subscription

  • Free Trial
  • Free Version

Pricing Details:

Orca Security offers a 30-day Cloud Security Risk Assessment with a free trial. Users deploy the platform, receive key risk findings, and access actionable insights for addressing critical security risks. Demos available.

  • API
  • Access Controls/Permissions
  • Anomaly/Malware Detection
  • Antivirus
  • Application Security
  • Cloud Application Security
  • Encryption
  • Endpoint Management
  • Incident Management
  • Intrusion Detection System
  • Password Management
  • Patch Management
  • Risk Management
  • Threat Intelligence
  • Vulnerability Protection
  • Whitelisting/Blacklisting

Additional Features

  • Activity Dashboard
  • Activity Monitoring
  • Alerts/Notifications
  • Assessment Management
  • Asset Discovery
  • Behavioral Analytics
  • Asset Tagging
  • Container Scanning
  • Continuous Integration
  • DDoS Protection
  • Endpoint Protection
  • IOC Verification
  • Log Management
  • Monitoring
  • Network Scanning
  • Password Protection
  • Policy Management
  • Risk Alerts
  • Prioritization
  • Risk Analysis
  • Risk Assessment
  • Runtime Container Security
  • Security Auditing
  • Third Party Integrations
  • Threat Response
  • Vulnerability Assessment
  • Vulnerability Scanning
  • Web Scanning
  • Vulnerability/Threat Prioritization
  • Web-Application Security
  • Website Crawling
  • Slack

    Team Collaboration Software

  • Jira

    Project Management Software

Sprinto

Tekpon Score
COMPARE

Tell us your opinion about Orca Security and help others.

Spin.Ai

Tekpon Score

Anchor

Tekpon Score

Cloudflare

Tekpon Score

Virtru

Tekpon Score

GoodAccess

Tekpon Score

Duo Security

Tekpon Score

Coro

Tekpon Score

Zscaler

Tekpon Score

Nightfall

Tekpon Score

Ermetic

Tekpon Score

Blink Ops

Tekpon Score

Safetica

Tekpon Score

SentinelOne

Tekpon Score

LogicMonitor

Tekpon Score

Defendify

Tekpon Score

HackerOne

Tekpon Score

This website uses cookies

Cookies are small text files that can be used by websites to make a user’s experience more efficient.

The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This means that cookies which are categorized as necessary, are processed based on GDPR Art. 6 (1) (f). All other cookies, meaning those from the categories preferences and marketing, are processed based on GDPR Art. 6 (1) (a) GDPR.

You can at any time change or withdraw your consent from the Cookie Declaration on our website.

You can read more about all this at the following links.

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

These trackers help us to measure traffic and analyze your behavior to improve our service.

These trackers help us to deliver personalized ads or marketing content to you, and to measure their performance.