Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

14 AWS reviews

External reviews

4 reviews
from

External reviews are not included in the AWS star rating for the product.


    Fabricio Galdino

Unified cloud insights have improved asset visibility and streamlined risk prioritization

  • February 08, 2026
  • Review from a verified AWS customer

What is our primary use case?

I normally use Orca Security for AppSec, and one of the features that I use commonly is the application security. I love it because it's already covered in the same license, and I can get a good overview of all of my assets. I have a lot of accounts in cloud, and so it's sometimes hard to identify all activities or assets that have been used or not. Normally, some developers create some virtual machines and leave the VM on or don't remove it. Orca Security usually helps me to see these kinds of problems because I can see every asset in one platform.

I don't use the Cloud to Dev feature they mentioned, since I'm working with Orca Security directly.

I believe the feature referred to as Orca Sensor is cloud security detection. I use it frequently because it's very important. I really enjoy it because it's agentless. I don't need to install or build an agent in my assets in the cloud. Orca Security accomplished this safely and fast. It's pretty easy to identify security risks or security issues using Orca Security because it's totally agentless and I just need to connect my cloud environment. It's really good and pretty easy. They have one feature that I really like in this same vein; it's the news about security. For example, if a new vulnerability is found and it's not already published in a CVSS bug, Orca Security has new papers that already inform me, stating that I have this new issue and this asset has been affected by this new vulnerability, and it provides guidance on how I can fix it. I love it.

What is most valuable?

What I love most about Orca Security is the easy integration with other tools. I really like it because it's very easy to integrate with other tools that are important for the company. It's already set up in the platform easily. I don't need to do unusual modifications or create a script. It's pretty easy to integrate these tools.

It is easy to prioritize risks using Orca Security because they have already been categorized. The severity of some risks is delivered from Orca Security, and I can set some kind of high-value asset designation. I can define what is a high-value asset or not. The attack paths also help me to understand the prioritization of the risks of these assets.

Orca Security has helped my company reduce the time it needs to address cloud security alerts and make it faster. When one critical risk or high risk is identified in my environment, I already receive notifications, even in email or in Teams, Slack, or any channel that is integrable to Orca Security. I receive a very fast notification to address the vulnerability and security issues to the teams.

What needs improvement?

I think the downside of Orca Security is the reports. I don't have any good reports ready to deliver to an executive. If I need to deliver some reports to my account manager or an executive, I don't have anything ready. I need to extract information and put it in another tool to construct some reports or dashboards or to report to my manager.

For how long have I used the solution?

I've been using Orca Security for exactly one year and one month.

What do I think about the stability of the solution?

Normally, I don't have any problem with maintenance in Orca Security platform. I don't have any downtime using it for this one year. When I need any support, it's very fast to get an answer from the support team.

I don't have any lagging using Orca Security. As I said, using it for one year, I don't have any downtimes.

What do I think about the scalability of the solution?

From what I’ve seen, I think it’s really easy to scale your usage. I did a POC (Proof of Concept) where I extended some workloads and it was very easy, but I don't use it frequently in production, just in that Proof of Concept.

How are customer service and support?

Not so many people are required for the deployment of Orca Security; just one person can do it.

I have been in contact with technical support regarding Orca Security twice to solve some issues, but it wasn't an issue, just a wrong configuration that I made. I contacted them and they shared some documentation. After that, I could resolve it pretty well.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I tried similar solutions from Trend Micro. From Trend Micro, I also tried a new one that is called Wiz. Orca Security is the best one for me because it delivers all the things that I need and more.

How was the initial setup?

The initial deployment of Orca Security was pretty easy from my point of view.

What about the implementation team?

It took just one hour to create the roles and the credentials for Orca Security. Then I just need to wait for the time for Orca Security to enrich data and index data in the platform. On the first day, I can already use Orca Security fully and identify every resource.

What other advice do I have?

For my company, I don't use a huge workload. It's a small workload, around 90 workloads, but we have more. For this amount of workload, the price is high. When you have more workloads, the price is much better. I think it's not so expensive when you have the right amount of workloads. It's more directed toward big companies.

I have tried to use Cloud Cost Optimization with Orca Security. We used it to reduce some costs by removing some unused assets. It really helped us, but I don't think that is the main focus of Orca Security. I use other tools to do FinOps in a better way.

I use a reseller that is a partner that helps me with Orca Security. I am just a client, but we have a company that sold Orca Security to us, and they are the bridge between my company and Orca Security company.

I would rate this product a 10 out of 10.


    Kaue Ribeiro

Cloud security posture has improved as I manage risks and vulnerabilities more effectively

  • February 04, 2026
  • Review from a verified AWS customer

What is our primary use case?

I implement Orca Security on B3 to improve my security maturity in cloud environments, mitigate risks, and correct vulnerabilities and resolve some issues.

What is most valuable?

I appreciate Orca Security because I can see CSPM, KSPM, and DSPM. Orca Security works with major frameworks on security, such as NIST and CIS, allowing me to see comprehensive insights on my cloud environment. I appreciate the Orca Security CI/CD integration, the shift-left configuration, which helps me improve cloud maturity and DevSecOps maturity. From my perspective, Orca Security is a complete CNAPP platform with the most capabilities to work with cloud security.

What needs improvement?

I have concerns about OCI support. When I work with Orca Security, the support for OCI is limited, so I cannot effectively work with the OCI environment.

For how long have I used the solution?

I have used Orca Security for one year.

What do I think about the stability of the solution?

I do not see any lagging, crashing, or downtime in Orca Security. In my time working with Orca Security, I have not experienced downtime on the platform.

What do I think about the scalability of the solution?

I think the scalability of Orca Security is good. I did not have a problem with scalability, as it works effectively for my scenario and environment.

How are customer service and support?

In my case, I had technical support, and it is easy to contact the technical support. The quality of the support is good. If I were to rate the support on a scale from one to ten, I would give it an eight.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I worked with Prisma Cloud, an alternative platform for cloud security from Palo Alto, and I worked with the Rapid7 platform as well as Tenable, so there are other vendors with the same concept platform as Orca Security.

How was the initial setup?

The initial deployment of Orca Security is easy; it is just plug-and-play on the cloud environment. When I deployed Orca Security for the first time, it took me around two days for cloud environments, no more.

What about the implementation team?

A team is needed for deployment; one person cannot deploy it.

What was our ROI?

I see the benefits of Orca Security immediately because you can see the issues right after deployment, and you can correct the critical issues, so the proof of value is immediate.

What's my experience with pricing, setup cost, and licensing?

Compared with other vendors, the Orca Security pricing is very competitive, and I think it is a good price compared with the other vendors.

What other advice do I have?

I do not use Orca Security agentless exclusively for vulnerabilities. I appreciate Orca Security because it is a complete platform and its cost is very small compared with other vendors. I think the user interface of Orca Security is very intuitive, friendly, and easy to use. It takes me very little time to learn how to use Orca Security; I find it very easy to learn, and the documentation is online and intuitive. Overall, I would rate Orca Security at a nine out of ten.


    RicardoEscriba Robles

Cloud visibility has improved and risk prioritization provides faster, more focused security work

  • February 01, 2026
  • Review from a verified AWS customer

What is our primary use case?

Orca Security provides three main strategic advantages. First, there is 100% visibility because it does not require agents. It can see everything, even shadowing or abandoned servers that the security team did not know existed. The main responsibility is side scanning, which is the first technology by Orca Security. Second, there is context-aware risk prioritization. Instead of drowning security teams in a sea of maybe 10,000 alerts, Orca Security uses a graph-based engine. It understands that a vulnerability on a web-facing server with access to a database is much more dangerous than the same vulnerability on a test server with no internet access. Third, there is operational efficiency. It saves hundreds of hours for DevOps teams who no longer have to install, update, or troubleshoot security.

What is most valuable?

I find Orca’s secret scanning and 'Shift Left' capabilities to be most valuable. The platform integrates directly into our GitHub and Azure DevOps pipelines, which allows us to automatically analyze pull requests for hardcoded passwords, API keys, and other sensitive credentials.

What needs improvement?

I see vulnerabilities as an area for improvement. In my opinion, the other platforms, such as Qualys and Prisma Cloud, have more efficiency in vulnerability detection, but Orca Security is not as strong in this area.

It is necessary to have a team because there is more responsibility, more activities, and it is necessary to have different opinions.

For example, when I have subscriptions by Azure or accounts by AWS, it is necessary to perform maintenance because you have to add a new subscription or new accounts in Orca Security. This configuration is not automatic; it is manual.

For how long have I used the solution?

I have been working with Orca Security for one year.

What do I think about the scalability of the solution?

It is necessary to have a team because there is more responsibility, more activities, and it is necessary to have different opinions.

How are customer service and support?

Technical support is very good, but customer support is very poor, in my opinion, because when I have a few problems, the customer support says your solution is bad or it is easier. However, the technical support is very good.

For example, the technical support has more experience in the solution, but customer support does not have more experience in the solution. Customer support does not know Orca Security in general. I think they have different skill sets.

How would you rate customer service and support?

Negative

Which solution did I use previously and why did I switch?

Orca Security is easier to use than other alternatives. You need a little skill to dominate Orca Security compared to other options. For example, when I use Prisma Cloud or Qualys solution, you need more experience. Orca Security is more user-friendly and in this case is more enjoyable.

How was the initial setup?

The deployment of Orca Security depends on the context because, for example, when I deploy in virtual machines, Kubernetes, or any resource, it is very easy. However, when I use other solutions by Orca Security, such as AppSec, it is more difficult.

What's my experience with pricing, setup cost, and licensing?

Currently the pricing for Orca Security is good, but it is probable that in the future the price will increase and I will analyze another alternative. For now, it is acceptable.

Which other solutions did I evaluate?

Similar solutions to Orca Security are Prisma Cloud, Microsoft Defender for Cloud, Wiz, and Qualys. However, I think Prisma Cloud is the same as Orca Security, but Prisma Cloud is more expensive than Orca Security.

What other advice do I have?

Cloud security analyzes vulnerabilities or alerts by IaaS or PaaS because Orca Security analyzes these items very well. Side scanning is, in my opinion, the best tool by Orca Security. However, it is necessary to deploy the sensor agent in new tools, such as Kubernetes, Lambda functions, and other services.

The sensor feature is good, but I prefer to use another alternative. For example, CSA by Cloud Security Alliance or by PCI or by CIS control is not optimized in Orca Security. I prefer to use another platform because these frameworks are more structured than Orca Security.

AppSec by Orca Security is the most interesting feature because it analyzes keys, passwords, and any methods for pull requests because it has integration with GitHub, Azure DevOps, and other platforms.

Orca Security continues to remodel the look and feel of the solution. In my opinion, it is very good. I would rate this review an eight out of ten.


    reviewer2800203

Cloud posture management has improved remediation and optimizes costs with contextual risk insights

  • January 30, 2026
  • Review from a verified AWS customer

What is our primary use case?

In my previous company, I used Orca Security as a CSPM tool, which stands for Cloud Security Posture Management. The tool is very nice, and with it, we achieved a lot of our remediation activities. Orca Security looks good in terms of Kubernetes and in terms of telling us about cloud misconfigurations and many other things.

I used Orca Security for approximately one and a half years, or roughly 11 to 12 months. Orca Security proved to be a good tool in my previous company.

I did not use the Cloud to Dev feature because it was recently rolled out at that time. At that point, we were moving to secure code and code review processes.

We did not use Orca Security sensor because we installed Orca Security API integration with our Azure Entra ID, in which all devices on our cloud infrastructure were scanned every 24 hours. However, after I left, the team considered using sensors because they have some limitations, particularly on legacy devices.

What is most valuable?

The standout part of Orca Security is the package approach. When they provide remediation or alerts, they also provide the exact path for a particular vulnerability or alert. They show us the specific path that needs to be fixed in order to remove the vulnerability or alert. They provide path information directly from the systems, so sometimes we don't need to log in directly and investigate ourselves. This feature is valuable, though there are occasional false positives, which is a normal part of security.

Regarding prioritization and assigning risk, Orca Security was good at analyzing risks contextually and holistically. As the tool and product mature, they will definitely announce new features. On a scale of ten, I would rate this around seven or eight. I have not given a ten because there are a few false positives and some areas where the product needs improvement on a regular basis. Sometimes they release the product, but modifications could still be required on their side.

It is good to prioritize risks with Orca Security because they are not only targeting the CVSS score but also the EPSS, which is the Exploit Prediction Scoring System. They monitor particular assets based on both approaches. On the CVSS side, they reference the National Vulnerability Database, and on the EPSS side, they target the Exploit Prediction Scoring System. So they are targeting both risk-based approaches as well as the CVSS approach.

What needs improvement?

Since I have not used Orca Security for 10 months, I am uncertain what areas still need improvement, as they may have rolled out features that addressed issues I faced in the past. However, I can say the tool is good. A few things could potentially be improved, particularly regarding false positives and the UI. What I observed is that they release updates to the platform without notifying the customer. Every time the UI is upgraded, they release something without notification. This could be a slight improvement. If they released some kind of notification to just inform the customer about UI changes, the customer would be aware of the changes that Orca Security is making in the backend.

What do I think about the stability of the solution?

Regarding stability, I would rate Orca Security an eight.

What do I think about the scalability of the solution?

In terms of scalability, I would rate it an eight because it performed well with what I worked with at that point in time.

How are customer service and support?

I would rate the technical support of Orca Security as eight. The customer success manager was also very helpful in terms of resolving issues.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I am currently using Wiz as well, and Wiz is also good. I think both Orca Security and Wiz are comparable and can work hand-in-hand. I would not say one is better than the other. I have started using Wiz and I like it because they also do similar things. I am yet to explore more on the Wiz side of things, but both are comparable and good.

How was the initial setup?

Orca Security is deployed in the cloud.

What was our ROI?

I can say Orca Security roughly reduced the operating expenses by around 20-50%.

What's my experience with pricing, setup cost, and licensing?

Orca Security was cheap.

Which other solutions did I evaluate?

Regarding the extent to which Orca Security helps in preventing risks and attacks across application lifecycles, I think it is the same scenario because there are many CSPM tools available. We have Wiz, Orca Security, and Lacework. All CSPM tools do the same work by scanning the infrastructure and providing reports either through API or through sensors. Definitely, the risk is more important on the cloud misconfiguration side because they tell us about the misconfigurations. CSPM is not a vulnerability management tool. It is more on the cloud side where they provide misconfigurations related to that. After you have deployed something on your infrastructure or cloud infrastructure, once you put a CSPM in your infrastructure, it will tell you how effectively you can remove those misconfigurations. That is the edge that CSPM is giving.

What other advice do I have?

I would recommend Orca Security to other users because it was good at the point in time I used the product.

Regarding how Orca Security has helped reduce the time it takes to address cloud security alerts, this is a complex scenario because it is totally dependent on the situation of the alert. I cannot say it takes one or two minutes because it depends on how critical the alert is and how critical it is in our environment. Some of the time, based on our infrastructure, we have to keep things as exceptions. We cannot fix all things. But many times we got the right alert and fixed it by checking and updating the risk provided by Orca Security in my previous organization.

We used the cloud cost optimization feature and it was very effective. We used it alongside Microsoft Azure where we had a specific subscription for cloud cost optimization. They provided better features showing us which features we were not utilizing much and could turn off, or which features we were utilizing more so we could adjust the bandwidth level. For every feature there is a cost associated with it. In that way, we used it effectively.

Orca Security saves resources because it provides the actual output on the screen with the package path. The resources aspect is definitely valuable because of how it uses Linux and goes deep down into the assets. It provides that particular information directly on the portal itself.

Orca Security was used by approximately 50 to 100 users. I believe Orca Security was purchased through the AWS Marketplace.

I rate Orca Security an overall eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    DARSHAN-R

Agentless cloud security has provided deep visibility and now simplifies risk prioritization

  • January 26, 2026
  • Review from a verified AWS customer

What is our primary use case?

In my previous organization, where I worked with Orca Security, it was a product-based company, and only a select few, such as our CISO and cybersecurity architect, had admin access. The rest of us had read-only access as analysts, and the tool was deployed across all our EC2 instances.

I did not have any exposure in deploying or developing with Orca Security, as I was just analyzing the alerts, which included Sophos and Orca Security alerts. We had access to the Orca Security dashboard where we received alerts, and my company was a product-based company securing our infrastructure using Orca Security. I did not have any experience or exposure in deploying Orca Security, but I had experience in deploying Wazuh in many AWS accounts, adding agents to those accounts.

I monitor cloud assets for misconfigurations or vulnerabilities, and Orca Security connects to AWS via API permissions instead of deploying agents or running servers as CrowdStrike does. We use side-scanning to analyze snapshots and metadata, build attack paths, and prioritize risk based on exploitability.

What is most valuable?

My experience with Orca Security is recent, as I used it about two months back while still in the previous organization, and I have recently switched jobs.

In my opinion, the best features of Orca Security are that it is very easy to deploy, primarily because it does not have agents, which are used in many other SIEM solutions or security solutions such as SentinelOne, Sentinel, Wazuh, or AlienVault. Those benefits include faster onboarding and reduced alert noise via intelligent prioritization. It also has better DevSecOps integrations with code scanning and SDLC visibility. The main advantages are that it is easy to set up with user-friendly dashboards, and the agentless design reduces operational friction. It also offers excellent visibility and exhaustive scanning of the cloud accounts, and Orca Security can be used on any cloud platform, whether it is AWS, Azure, GCP, or Oracle.

Using Orca Sensors has been beneficial since by default, Orca Security's cloud platform employs a side-scanning technology that connects cloud accounts via APIs. It offers workload block storage without needing to deploy a traditional agent on each workload. Orca Sensor is a lightweight sensor designed to supplement the agentless platform with runtime visibility. It uses EBPF for deep system-level observability, making it easy to deploy. The reason we use Orca Sensor is that it provides broad cloud-wide visibility and prioritized risk. Orca Sensor adds real-time monitoring and detects malicious behavior similar to other SIEM products. By using Orca Sensor, we can confirm if potential vulnerable code is executed in runtime. There are many features for Orca Sensors, as it fits into an agentless model, is easy to deploy via cloud APIs, and offers deep, real-time processing and network visibility.

Providing runtime visibility with Orca Sensor has been effective, as it complements Orca Security's core platform, which uses agentless side-scanning. This allows us to see what processes are running and detect real-time threats such as malware execution or privilege escalation. The hybrid approach lets organizations maintain agentless coverage for the entire cloud estate while applying deep runtime protection to critical workloads.

Prioritizing risks using Orca Security is generally easy and effective, especially compared to other tools I have used such as SentinelOne and Sentinel. Orca Security provides a risk score for everything, including attack path visualization and business impact context. This helps us propose risks while correlating multiple signals such as common CVEs and cloud misconfigurations. For example, a public EC2 instance with an admin IAM role running malicious scripts could be a critical risk. Compared to other cybersecurity tools, Orca Security's agentless architecture enhances its risk prioritization capabilities.

I have not seen many alerts in Orca Security during my tenure since the architecture was well-structured by our cybersecurity architect, leading to very few alerts. Some alerts were related to possibly malicious activity installed by our team or older versions of Java. However, I believe that Orca Security reduces alert volume because it combines vulnerability data into a unified view, speeding up cloud security workflow. It significantly reduces alert noise and accelerates alert handling by correlating risks with workloads, showing prioritized issues so the team can focus on remediation.

What needs improvement?

In my opinion, after using Orca Security for seven to eight months, areas for improvement could include automating processes as other solutions do. I have a background in automation and think that if Orca Security had its own automation capabilities for repetitive tasks, it could enhance the user experience. The dashboards and reports focus on security and are strong, but automation remains my suggestion for improvement.

The workflow and automation aspect would be beneficial, similar to having playbooks indicating steps for alerts, such as creating tickets or providing remediation steps that could be automated.

The only limitation I see is in auto-remediation capabilities, but Orca Security excels in risk prioritization and has a balance of visibility and operational efficiency.

For how long have I used the solution?

I have been working with Orca Security for around seven to eight months in my previous organization.

What do I think about the stability of the solution?

For stability, I would rate Orca Security an eight or nine, as I have not experienced any downtime, bugs, or glitches.

What do I think about the scalability of the solution?

I find Orca Security to be scalable, as it takes very little time to deploy, and I would give it a ten for scalability.

What about the implementation team?

I was not a part of the deployment team; I was just an analyst trying to explore the tool. When Orca Security came online, it was seamless, as we had been informed beforehand.

Which other solutions did I evaluate?

When comparing Orca Security with other solutions, the main advantage is its agentless architecture, which I find to be a significant unique selling point. Deploying other tools such as Wazuh involves manual commands and server creation, whereas Orca Security is easier to manage. While there are other agentless architectures, such as Wiz, they lack some of the features such as side-scanning that Orca Security offers.

What other advice do I have?

Regarding the cloud cost optimization feature in Orca Security, I have not explored it yet, and I would not be the right person to answer questions about it, as I am not aware of it.

I am not aware of any maintenance requirements for Orca Security, as I have not received any communication regarding maintenance from the team.

I would recommend Orca Security to other users, especially for cloud users, as it is easy to deploy. For small organizations, I would give it a ten, highlighting its agentless architecture that simplifies maintenance.

Overall, comparing to other tools, I would rate Orca Security around an eight or nine, primarily due to its agentless architecture, so I would say nine. My overall review rating for Orca Security is nine.

In my assessment, the risk detection and identification capabilities of Orca Security are very good, accurately reflecting vulnerabilities and processes running in the backend. The risk score provided is also very impressive.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    Evgeny Shulga

Cloud security has improved visibility and automated deep risk investigations across clients

  • January 22, 2026
  • Review from a verified AWS customer

What is our primary use case?

My use case involves being in charge of the integration of this technology for over 100 clients in different environments.

What is most valuable?

The best features of Orca Security include automation and compatibility, which I really appreciate, and many of my clients value them as well. We have access to many features that differentiate this solution from other systems offering the same capabilities. For me, the most important aspect is how deeply you can investigate situations with this technology, including checking for leaks or similar issues.

In our opinion, Orca Sensor is the best solution available at the moment, and it significantly affects the visibility and protection of environments.

What needs improvement?

Identifying areas in Orca Security that have room for improvement is challenging, as there are multiple considerations including price, customization, AI, UI, and factors that could make it better or easier to use. I must consult with someone in the field because I cannot provide this information at this time since I am not operating the solution directly.

What would make it a ten for me as an integrator is difficult to determine. I believe they need more time developing this solution, which means they need to be more comprehensive and extended in their approach. I think this represents the opinion of the majority.

For how long have I used the solution?

I have been using Orca Security for more than one year, approximately eighteen months.

What do I think about the stability of the solution?

I would rate stability as an eight or nine because, as an integrator, I do not experience downtime, bugs, or glitches.

What do I think about the scalability of the solution?

I believe Orca Security is scalable and can handle small and medium-enterprise businesses effectively. I would rate it an eight for scalability.

How are customer service and support?

It is difficult to rate the technical support provided by Orca Security because I do not use it and therefore cannot speak to its quality.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

We use Orca Security and have used different solutions in the past, and this is one of the most useful for us.

How was the initial setup?

The overall deployment is medium difficulty; it is not easy, but it is not complex either.

How long deployment takes on average depends entirely on the amount of data and the questions we receive from the client's side. There are many factors to keep in mind, and the deployment timeline is influenced by various considerations.

What about the implementation team?

I cannot tell you how it affects the process in addressing cloud risks early in development because I do not have this information. You must understand that I am in charge of the integration group. I am not integrating this myself, and while I have some knowledge, I am not in the field doing this job.

We have approximately 300 people working with Orca Security in our organization.

What's my experience with pricing, setup cost, and licensing?

My thoughts on the pricing of Orca Security are that it is neither cheap nor expensive; it is somewhere in the middle.

Which other solutions did I evaluate?

In my opinion, Orca Security compares to other products and vendors on the market as something disruptive. I believe it can be very interesting at this moment.

What other advice do I have?

We and our clients do use the Cloud to Dev feature. I believe we have some clients using it.

We do not use the sensor for cloud detection and response as much, as we have another technology we are using for this purpose.

I find it quite easy to prioritize risks using Orca Security; it is not difficult at all.

I would recommend Orca Security to other users. It is a face-to-face approach that we normally recommend for establishing a more efficient ecosystem for them. It is a prime solution for us and one of the most important.

My impressions of the risk detection and identification capabilities are very good. I would rate them eight, nine, or even closer to nine than eight.

Orca Security requires maintenance, and all solutions need updates, patching, and renewals. I find it more easy to maintain Orca Security.

I would rate this solution an eight overall.


    Rafael Bueno

Identifies cloud vulnerabilities quickly and helps enforce security rules through test simulations

  • November 24, 2025
  • Review provided by PeerSpot

What is our primary use case?

We wanted to understand our cloud environment better, so we had a demo of Orca Security and then signed a deal to access the full platform and identify our most vulnerable areas. I started to schedule scans and monitor the machines in our cloud environment to help fix vulnerabilities. I set rules for certain situations and performed tests using those rules, which worked very well. Since I have familiarity with red teaming, I could perform malicious activities to trigger those rules and observed the rule blocking my actions effectively.

How has it helped my organization?

Orca Security has helped us significantly by giving clear visibility into our weakest points and allowing us to prioritize what truly matters. Its unified dashboard and contextual risk insights made it easier to quickly identify, fix, and protect the most critical vulnerabilities. As a result, we’ve been able to strengthen our environment faster and with much more focus.

What is most valuable?

Orca Security is a very user-friendly platform. We were migrating from another technology to Orca Security, and my first contact with Orca was excellent for seeing and understanding our cloud environment. It was very intuitive for me to use the platform.

I really appreciated how Orca Security uses AI. It was easier for me to explain to developers what they should fix. Sometimes it also has an auto-fix feature where AI provides the steps to fix that vulnerability. From an AppSec point of view, this is something that has been a game changer for me.

What needs improvement?

I experienced some problems with custom tags in Orca Security where I tried to separate the environment for business units so I could ask the tech lead responsible for that vulnerability to fix them. I had some problems trying to add custom tags because they create one custom tag for all assets in our environment, and they don't have that feature well prepared for this kind of situation.

The scans you try to perform on the platform can take a very long time to complete. I didn't face any delay or lagging issues otherwise, but the scans take considerable time.

For how long have I used the solution?

I used Orca Security for the last ten months while working for a startup here in Brazil.

What do I think about the stability of the solution?

I installed Orca Sensor in some machines in our environment and it worked well at first, but it disconnected sometimes. Our support team helped us get it online as soon as possible.

What do I think about the scalability of the solution?

I believe Orca Security can fit for both smaller and larger companies. In our case for a smaller company, it works very well, but it is really scalable for bigger companies.

How are customer service and support?

I needed to contact support mainly for the custom tags issue I mentioned earlier. They are very clear and very fast with solutions. I could talk with engineers from Israel and India, and I also had a contact point in Brazil that helped me get responses as quickly as possible. I had a very positive experience with Orca Security support.

I would rate their support an eight out of ten. I had one or another problem that is on their roadmap to fix, but their answer was very fast. They communicated that certain features are planned but not currently available, or they might be ready for the next quarter. However, what they could help me with, they helped with as quickly as they could.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously we were using Palo Alto Prisma Cloud before Orca Security. Orca Security was much better for me in visual aspects to see the environment, see the vulnerabilities, see all the assets, and then split everything into our business units.

How was the initial setup?

It was easy to install and set up everything. Setting up all the components, for example the sensors and the connection with our GCP, was straightforward and was assisted by someone on Orca Security's side.

What about the implementation team?

In our case, it was me, someone on Orca Security's side helping us, and another person on my side who is a tech lead.

What was our ROI?

The return on investment occurred within one or two weeks, I believe.

What's my experience with pricing, setup cost, and licensing?

I'm not sure about the details because my coordinator and manager signed that deal. However, I remember it was cheaper than Palo Alto Prisma Cloud. I'm not certain what the exact dollar amount per month was.

Which other solutions did I evaluate?

I'm not sure if we bought it from a reseller. I'm not certain right now whether it was from a reseller or directly from Orca Security.

What other advice do I have?

We are not a reseller or partner of Orca Security. My overall rating for this solution is eight out of ten.


    Danny Mishkit

Security boosts and seamless server access enhance workplace flexibility

  • June 22, 2025
  • Review from a verified AWS customer

What is our primary use case?

We used Orca Security for about two to three months until I left the company. The product itself is really good. It helped us streamline the way we access our servers. It increased the amount of security for our product and allowed us to work from different various places without having to always use a VPN that we had used before.

A lot of the comfort of just being able to access our servers and upload to local servers without having any security risks and having to take extra precautions was the main benefit because we had the safety of actually being able to use Orca Security.

What is most valuable?

Orca Security's multi-tenant architecture helped the organization ensure consistent security coverage across different servers. Since we use different servers for our company, it helped balance out everything and work in a single environment. It helped localize everything in a comfortable way, which I really appreciated, because whenever we used different levels of our product, it helped us maintain things in a more comfortable way.

I assessed the effectiveness of Orca Security's content, malware prioritization system, and evaluated alerts based on severity and business impact, but I don't remember getting any alerts, which is presumably a good thing. The whole process of logging on, which is extensive in a good way, helped us maintain a high level of security with features such as two-step authentication. This created a sense of security when working from home or abroad.

What needs improvement?

I really love the way Orca Security worked. A potential improvement could be additional security features for the two-step authentication, such as fingerprint recognition similar to what Checkpoint does. That could be something to consider, though it's more about convenience than security as we didn't have any security issues.

The timeout settings could be made more customizable, as sometimes if I leave the office early, it's still running unless manually turned off. The process of turning it off isn't very straightforward, so making it easier to turn off manually would be beneficial. It would be good for any business to implement so they don't have to use a VPN. Security in today's age is important, and if a company can afford it, they should get it as it's the most valuable protection against threats.

For how long have I used the solution?

We used Orca Security for about two to three months until I left the company.

What about the implementation team?

The integration with existing workflows was handled by different engineers.

What other advice do I have?

The main challenge or key issue we faced was security.

I did not integrate Orca Security with any other product features as I didn't get a chance to use it often since I was just logging on. However, the company is really happy using it, and they're still using it today according to friends who still work there.

Regarding metrics to validate performance, while logging on and maintaining the system takes time due to auto log off after a few hours, the time spent logging back on is minimal compared to the security benefits provided by the product. We found an increase in security, and being able to work without VPNs improved load times and efficiency.

I would recommend Orca Security to managers. We were a very small company, so it wasn't widely publicized.

I rate Orca Security a 9 out of 10.


    Krishnakumar M

Good threat intelligence and straightforward deployment

  • April 09, 2025
  • Review from a verified AWS customer

What is our primary use case?

Our clients use Orca Security for various reasons. We implement it for the clients.

How has it helped my organization?

Orca Security has helped reduce the time it takes to address cloud security alerts. It has reduced alerts by almost 30% to 40%. It was initially 300 alerts, and recently with one customer, it reduced to 30% to 40%, which is a good value add for this.

It takes approximately three to six months to see time to value.

What is most valuable?

The GUI features are very good. Threat intelligence is also very good.

What needs improvement?

Orca Security can be improved as there should be some kind of central pane of glass. Similar to how cloud management works, Orca Security should have something comparable. They have something right now, but it is not fully developed. For example, if they have something similar to Palo Alto Panorama, it would be a great tool for their existing customers.

For how long have I used the solution?

I have approximately two years of experience working with this tool.

What do I think about the stability of the solution?

Orca Security is a very good solution. I consider it stable.

What do I think about the scalability of the solution?

Scalability doesn't really apply here because this is a posture management tool. At the end of the day, whether we have 10 servers, 50 servers, or even 500 servers in the form, we provide just one entry for Orca Security.

How are customer service and support?

I would rate technical support from Orca Security as very good. Orca Security is very good in this regard.

How would you rate customer service and support?

Positive

How was the initial setup?

Deployment is pretty easy. If you take professional services from them, you have to pay the money. If you do not need any professional services, or if there is any vendor for your organization, you can give it to that vendor. The vendor will deploy the tools for you. It is an easy tool.

Our clients are using a hybrid deployment model for Orca Security. Many customers are predominantly using the cloud. If the cloud is not there, a hybrid deployment is used.

What about the implementation team?

The customer asks us to implement Orca Security, and we deploy it based on their best practices.

What's my experience with pricing, setup cost, and licensing?

Its license is a bit expensive.

Which other solutions did I evaluate?

The decision is taken by the customer. Some customers go for it because it is in Gartner's Top 5 and has good reviews. They request us to deploy it.

What other advice do I have?

We do not use Orca Security for cost optimization. We have different tools for that.

I tried integrating it with ServiceNow, but I have not integrated it with any other solutions such as Cisco or Palo Alto. We are using it as a standalone service for every customer.

I would rate Orca Security a nine out of ten.


    Srinath Swarna

Maximize cloud security management with effective CIEM and CDR features

  • December 17, 2024
  • Review from a verified AWS customer

What is our primary use case?

I use Orca Security as a CSPM tool primarily for cloud security and posture management. I utilize its CIEM and CDR features extensively. CIEM focuses on cloud infrastructure and entitlement management, and CDR deals with cloud detection and response.

What is most valuable?

I find Orca Security's CIEM feature invaluable, as it focuses on entitlement and posture management, identifying assets with older OS versions, and asset misconfiguration.

The CDR feature is also critical, focusing on detection and response, triggering alerts like brute force attacks and malware. It provides alert and asset details, which include multiple remediation actions. It combines functionalities of multiple security tools and collects alerts and logs from them.

What needs improvement?

A notable limitation with Orca Security is its scanning feature. The automatic scan only runs every 24 hours, and if an alert is remediated within an hour, it still remains until the next scheduled scan. A more frequent or on-demand scanning option might mitigate this issue.

For how long have I used the solution?

I've been using Orca Security for one and a half years.

What do I think about the stability of the solution?

The stability of Orca Security is satisfactory, and I would rate it nine out of ten. I have experienced very little downtime.

What do I think about the scalability of the solution?

Orca Security is highly scalable, and I would rate its scalability as eight to nine. I have observed minimal downtime.

How are customer service and support?

I have had experiences where I needed to contact Orca support to address issues with alerts that remained active even after remediation. Based on my interactions, I would rate the support team a six out of ten.

How would you rate customer service and support?

Neutral

What's my experience with pricing, setup cost, and licensing?

Orca Security's pricing is known to be a bit high, however, I'm not directly involved in that aspect.

Which other solutions did I evaluate?

I have not used any alternatives to Orca Security.

What other advice do I have?

I would rate Orca Security overall as eight out of ten.