• English
  • Search
  • Contact
  • Login
    • USA
    • Europe
    • Australia
    • US-Gov
  • The Orca Platform

    Secure cloud infrastructure, workloads, data, APIs, and identities with our industry-leading agentless platform.

    • Platform Overview
    • Cloud Security Posture Management
      Identify and remediate misconfigurations across clouds
    • Cloud Workload Protection
      Protect VMs, containers, and serverless functions
    • Container and Kubernetes Security
      Scalable security for containers and Kubernetes for every cloud layer
    • Cloud Detection & Response
      24x7 monitoring and response across the entire cloud attack surface
    • Vulnerability Management
      Agentless vulnerability management that prioritizes your most critical risks
    • Cloud Infrastructure Entitlement Management
      Secure cloud identities and entitlements
    • Multi-Cloud Compliance
      Achieve regulatory compliance with frameworks, benchmarks, and custom checks
    • Shift Left Security
      Secure cloud-native apps across the SDLC
    • SideScanning™ Technology
      Our innovative approach provides complete cloud coverage
    • API Security
      Complete API discovery, security posture management, and drift detection
    • Data Security and Posture Management
      Reduce the risk of data breaches and protect sensitive PII
  • Case Studies

    Orca Security is trusted by the most innovative companies across the globe.

    • Browse Case Studies

    Industries

    • Financial Services
    • Technology
    • Government
    • Retail
    • Healthcare
    • Media & Entertainment

    User Roles

    • CISO
    • Security Architect
    • DevOps

    Orca Powers Cloud Security for Digital Turbine.

    Read Case Study

    Insurance Innovator Lemonade Goes from 0 to 100% Cloud Visibility with Orca Security.

    Read Case Study

  • Our Partners

    Our team is extended and strengthened by our strong partnerships across the Cloud Security ecosystem.

    • Partner Overview
    • Join the Program
    • Amazon Web Services
    • Microsoft Azure
    • Google Cloud
    • Alibaba Cloud
    • Oracle Cloud
  • Orca Research Pod

    Our expert security research team discovers and analyzes cloud risks and vulnerabilities to strengthen the Orca platform.

    • See Our Latest Discoveries

    Orca Research

    How Orca Found SSRF Vulnerabilities in Four Different Azure Services

    CosMiss: Azure Cosmos DB Notebook Remote Code Execution Vulnerability

    Cloud Risk Encyclopedia - Browse Thousands of Cloud Risks

  • Resource Library

    Download and view eBooks, whitepapers, videos and more in our packed Resource Library.

    • Browse Resources

    Blog

    Read Cloud Security thought leadership, how-to's, and insightful posts from Orca Security experts.

    • Browse Blogs
    • Cloud Risk Encyclopedia
    • Product Articles & Videos
    • Comparisons
    • Events & Webinars
    • Podcasts
    • Customer Support
  • Our Customers

    Orca Security is trusted by the most innovative companies across the globe.

    • Browse Case Studies
    • Why Orca
    • About Us
    • Newsroom
    • Ratings & Reviews
    • Media & Press
    • Careers
    • FAQs
    • Contact Us
  • English
  • Search
  • Contact
  • Login
    • USA
    • Europe
    • Australia
    • US-Gov
  • Free Trial
  • Get Demo
View more results

All articles by Faith Kilonzi

Blog

10 Ways to Manage API Security Risks

Faith Kilonzi

Faith Kilonzi Feb 01, 2023

Blog

Why CIEM Plays a Key Role in Your Cloud Security Strategy

Faith Kilonzi

Faith Kilonzi Jan 31, 2023

Blog

Vulnerability Management Strategies for the Cloud

Faith Kilonzi

Faith Kilonzi Dec 13, 2022

Blog

How to Evolve Cloud Security Posture Management for Compliance

Faith Kilonzi

Faith Kilonzi Nov 16, 2022

Blog

What Is Cloud Infrastructure Entitlements Management (CIEM)?

Faith Kilonzi

Faith Kilonzi Oct 11, 2022

Blog

Zero-Day Vulnerability Preparedness

Faith Kilonzi

Faith Kilonzi Sep 07, 2022

See Orca in action See Orca in action-> View a 10 minute recorded demo or sign up for a personalized one-on-one walk-through.
  • Platform

    • CLOUD SECURITY PLATFORM

      • Platform
      • SideScanning™ Technology
      • Context-Aware Security
      • Built-in Compliance
      • Automation & Customization
    • TECHNOLOGY ECOSYSTEM

      • Amazon Web Services
      • Microsoft Azure
      • Google Cloud Platform
  • Solutions

    • By Solution

      • Malware Detection
      • Vulnerability Management
      • Sensitive Data Detection
      • Container and Kubernetes Security
      • Multi-Cloud Compliance and Security
      • Cloud Security Posture Management (CSPM)
      • CIEM
      • Cloud Workload Protection Platform (CWPP)
      • Cloud Detection and Response (CDR)
      • Shift Left Security
      • API Security
      • Data Security and Posture Management (DSPM)
    • By Industry

      • Financial Services
      • Technology Services
      • Media & Entertainment
      • Healthcare
      • Retail
  • Resources

      • Library
      • Product Info
      • Podcast
      • Case Studies
      • Cloud Risk Encyclopedia
      • Blog
      • Events
    • COMPARISONS

      • Prisma Cloud Security 2022
      • Qualys Cloud Agent
      • Twistlock Container Security
      • Redlock Palo Alto
      • Rapid7 InsightVM
      • Check Point CloudGuard Dome9
  • Company

      • About
      • Partners
      • Reviews
      • Orca Research Pod
      • Careers
      • Newsroom
      • Media Kit
      • FAQs
    • Contact
      • Support
      • Login
  • Stay in touch

    Get cloud security insights
    and the latest Orca news


Orca Security

©2023 Orca Security. All rights reserved.

  • Privacy Policy
  • Terms of Use