Audience

Enterprise organizations and cloud companies

About Orca Security

Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment.

Instead of layering multiple siloed tools together or deploying cumbersome agents, Orca combines two revolutionary approaches - SideScanning, that enables frictionless and complete coverage without the need to maintain agents, and the Unified Data Model, that allows centralized contextual analysis of your entire cloud estate. Together, Orca has created the most comprehensive cloud security platform available on the marketplace.

Pricing

Pricing Details:
Orca is priced annually based on an average of the number of workloads scanned.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Orca Security
Founded: 2019
United States

Videos and Screen Captures

Product Details

Platforms Supported
Cloud
On-Premises
Training
Documentation
Live Online
Webinars
In Person
Support
Phone Support
24/7 Live Support
Online

Orca Security Frequently Asked Questions

Q: What kinds of users and organization types does Orca Security work with?
Q: What languages does Orca Security support in their product?
Q: What kind of support options does Orca Security offer?
Q: What other applications or services does Orca Security integrate with?
Q: What type of training does Orca Security provide?

Orca Security Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Vulnerability Management
Two-Factor Authentication

Cloud Workload Protection

Cloud Gap Analysis
Cloud Registry
Asset Discovery
Governance
Logging & Reporting
Data Security
Data Loss Prevention (DLP)
Security Audit
Anomaly Detection
Workload Diversity
Machine Learning

Cybersecurity

Endpoint Management
IOC Verification
Incident Management
Vulnerability Scanning
AI / Machine Learning
Behavioral Analytics
Tokenization
Whitelisting / Blacklisting

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners

Network Mapping
Web Inspection
Defect Tracking
Interactive Scanning
Perimeter Scanning
Black Box Scanning
Continuous Monitoring
Compliance Monitoring
Asset Discovery
Logging and Reporting
Threat Intelligence
Risk Analysis

Orca Security Additional Categories