+
+

Related Products

  • GlitchSecure
    14 Ratings
    Visit Website
  • Cloudflare
    1,779 Ratings
    Visit Website
  • Safetica
    338 Ratings
    Visit Website
  • Heimdal Endpoint Detection and Response (EDR)
    54 Ratings
    Visit Website
  • Satori
    86 Ratings
    Visit Website
  • Astra Pentest
    143 Ratings
    Visit Website
  • Cisco Umbrella
    1,104 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    116 Ratings
    Visit Website
  • Guardz
    49 Ratings
    Visit Website
  • SpamTitan
    779 Ratings
    Visit Website

Platforms Supported

Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprise organizations and cloud companies

Audience

Enterprises seeking a solution to detect and identify third-party apps consuming their data in real-time

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Orca Security
Founded: 2019
United States
orca.security/

Company Information

Vorlon
United States
vorlonsecurity.com

Alternatives

Alternatives

UltraAPI

UltraAPI

Vercara
Sonrai Security

Sonrai Security

Sonraí Security
Resurface

Resurface

Resurface Labs

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Jira
Okta
ServiceNow
Slack
GitHub
GitLab
HubSpot CRM
Indent
Jira Work Management
Mailchimp
Microsoft Azure
Revelstoke
Silk Security
Sumo
Sumo Logic
Tamnoon
Torq
Trello

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Jira
Okta
ServiceNow
Slack
GitHub
GitLab
HubSpot CRM
Indent
Jira Work Management
Mailchimp
Microsoft Azure
Revelstoke
Silk Security
Sumo
Sumo Logic
Tamnoon
Torq
Trello
Claim Orca Security and update features and information
Claim Orca Security and update features and information
Claim Vorlon and update features and information
Claim Vorlon and update features and information