Cloud Security Punch-Outs!
A hands-on review of cloud security solutions
About the lab environment
Our series lab is representative of a real-world cloud computing environment but smaller. It’s a single AWS deployment with EC2 instances, containers, load balancers, and S3 buckets.
- The single VPC has both public and private subnets and an internet gateway provisioned to permit inbound traffic.
- Due to their functionality, some cloud security solutions required significant changes to our lab environment just to get them deployed and operational.
- We then planted common risks and misconfigurations.
Objectivity and transparency
Transparency is essential; we aimed to be as objective as possible. It’s why we were meticulous about documenting versions and dates of comparison. Our goal was to be clear, direct, and not to obfuscate any of the findings. In fact, in some cases, we found that competitors had features that are better than ours.
Did we miss something significant in terms of capability? Do you have ideas for comparisons, feature deep(er) dives, or anything else related to the series? We’d love to get your perspective! Email us at [email protected].
Personalized Demo
See Orca Security in Action
Gain visibility, achieve compliance, and prioritize risks with the Orca Cloud Security Platform.