Cloud Workload Protection Platform (CWPP)

Security for VMs, containers, and Kubernetes without the high operational costs of agents

An illustration of a cloud workload protection platform like Orca Security

The Challenge

Agents Don’t Scale: Security Starts with 100% Coverage

Agent-based CWPPs require tedious deployments and management for each workload, leading to high TCO. Vendors offering a choice between agents and agentless approaches only add to the complexity and often have hidden limits on their ‘agentless’ capabilities. In addition, CWPPs only cover cloud workloads and miss risks in the cloud control plane, such as misconfigurations and overly permissive identities.

Partial deployment of agents causes serious blind spots.

IT teams need to spend countless hours installing, configuring, and maintaining agents.

Agents and network scanners have a significant performance impact and can be a security risk.

Security teams often need to burden development and DevOps teams to install agents, creating organizational friction.

CWPPs don’t have insight into cloud configurations and identities, leaving important security gaps.

Our Approach

Unlike other CWPPs, Orca is completely agentless to fully deploy in minutes with 100% coverage, and includes wide and deep visibility into risks across every layer of your cloud estate, including cloud configurations as well as workloads. Orca combines all this information in a Unified Data Model to effectively prioritize risks and recognize when seemingly unrelated issues can be combined to create dangerous attack paths.

Orca collects data directly from your cloud configuration and the workload’s runtime block storage out-of-band.

Within minutes, Orca finds and prioritizes your most critical cloud risks, including vulnerabilities, malware, misconfigurations, lateral movement risks, IAM risks, and sensitive data at risk.

Unlike other solutions, Orca combines workload-deep intelligence with cloud configuration metadata all in one platform.

Sidescanning technology by Orca Security

SideScanning™ is revolutionizing cloud security

Cloud native vulnerability management

Orca creates a full inventory of your cloud environment and leverages 20+ vulnerability data sources to discover and prioritize vulnerabilities across your entire cloud estate.

  • Orca’s workload inventory includes information on OS packages, applications, libraries, as well as versions and other identifying characteristics.
  • Unlike other solutions that simply report on the CVSS score, Orca considers the context of cloud assets, their connections and risks, to understand which vulnerabilities need to be addressed first.
  • In rapid response situations such as Log4Shell, Orca allows you to quickly identify vulnerable cloud assets and prioritize patching the ones that pose the greatest risk to the business.
A sample image of a remote code execution vulnerability warning
Orca Security's dashboard Discovery feature

Protect your sensitive data with CWPP coverage

Orca scans the hidden corners of your cloud estate, searching for at-risk sensitive data, from personally identifiable information (PII) to protected healthcare information, and more.

  • Detect at-risk sensitive data on every workload across your cloud estate regardless of whether the assets are running, idle, paused, or stopped.
  • Sensitive data detection includes PII, including physical addresses, email addresses, credit card numbers, and Social Security identifiers.
  • Understand which risk combinations are a straight attack path to your crown jewels.

Detect known and unknown malware

Orca uses extensive malware detection techniques to locate known and potentially malicious code in your cloud workloads and resources.

  • Signature-based scanning checks for file hashes of known malware.
  • Heuristic file analysis closely inspects files to determine their purpose, destination, and intent.
  • Dynamic scanning executes a file in a controlled virtual environment to observe its actions.
  • Genetic signature detection uses previous malware definitions to discover malware within the same family.
Orca Security's Show Score Breakdown

Full-Stack Cloud Visibility in Minutes

location

Global

industry

Financial Services

cloud environment

AWS, Azure

“We went from years’ worth of pain to full visibility in a single afternoon. Take it from a guy who is in the trenches—that is profound.”

Peter Robinson Director of Cybersecurity and Business IT

Read the Case Study
location

Global

industry

Financial Services

cloud environment

AWS, GCP, Azure

“We have 12 AWS accounts. We didn’t know what was in all of them, so we plugged them into Orca. Within 30 minutes we had a good idea of what was running in all accounts. We couldn’t have done that so quickly any other way.”

Jeremy Turner Senior Cloud Security Engineer

Read the Case Study

Frequently Asked Questions

A Cloud Workload Protection Platform (CWPP) is a cloud security solution dedicated to securing server workloads in the public cloud. CWPP solutions discover and detect risks in cloud workloads, including vulnerabilities, malware, and sensitive data at risk. CWPP capabilities are offered through standalone solutions or as part of cloud-native application protection platforms (CNAPP).

Public cloud services operate according to what’s called the shared responsibility model, an agreement between cloud service providers and their customers. The model makes each party responsible for certain aspects of cloud security: 

  • Cloud service providers are responsible for the physical access and infrastructure of their services. 
  • Organizations are responsible for securing the applications, services, and data they run and store on their cloud instances. 

CWPP tools (either as standalone solutions or as part of a more comprehensive CNAPP) are necessary to provide visibility into and security for workloads, which are essential to meet the obligations of the shared responsibility model.

CWPPs are vital to securing cloud-native workloads. Traditional CWPPs require an agent to be installed on every asset to be monitored, which leads to incomplete coverage, high TCO, and performance degradation. However, modern CWPP solutions such as the Orca Platform provide 100% coverage of workloads without requiring a single agent.

Despite being a crucial cloud security solution, CWPP tools present important limitations, including:

  • No visibility into the control plane: CWPPs only provide visibility into and security for workloads, not the cloud control plane, including misconfigurations such as publicly exposed storage buckets. 
  • Inability to contextualize risks: Because CWPP solutions can’t see into the cloud control plane, they also can’t account for contextual factors that may make a risk more or less severe. As a result, they can’t effectively alert teams and prioritize their efforts to focus on the most critical risks.
  • Limited coverage: Traditional CWPPs are agent-based and therefore require individual agents to be installed and maintained for every cloud asset. This creates blind spots in cloud security. However modern CWPPs, such as the Orca Platform, provide instant 100% workload coverage and combine CWPP with other cloud security capabilities such as CSPM, CIEM, DSPM, and more. 
  • No detection for lateral movement: Without an additional solution, CWPP tools can’t identify keys that hackers could exploit to move laterally and access other assets.

Agent-based CWPPs require tedious deployments and management for each workload, leading to high TCO. Vendors offering a choice between agents and agentless approaches only add to the complexity and often have hidden limits on their ‘agentless’ capabilities. In addition, CWPPs only cover cloud workloads and miss risks in the cloud control plane, such as misconfigurations and overly permissive identities.

This limited visibility impacts the tool’s ability to provide full security coverage and effective alert prioritization. Any risks due to cloud misconfiguration (such as MFA not being enabled for the ‘root’ user account or KMS encryption keys not being rotated) cannot be detected by a CWPP. This lack of visibility also means CWPPs lack the context necessary to understand the full implications of a security issue and are therefore unable to prioritize alerts based on environmental context. This causes “swivel chair” alert triage, which leads to alert fatigue.

The Orca Platform provides full-stack visibility of your cloud estate, spanning the cloud infrastructure, OS, application, and data layers, without requiring a single agent and providing instant and continuous 100% coverage of your cloud assets.

More Solutions to Explore