Aqua Security followed Twistlock into the CWPP market, Palo Alto in combining a CSPM with a CWPP, and Orca Security in delivering a CNAPP platform. Orca is the innovation leader, providing a cloud security platform that starts with patented SideScanning technology and continues to be the most comprehensive security solution for your cloud.
Simple deployment, comprehensive visibility
With Orca Security, a simple, 3-step configuration enables you to get up & running quickly. Our agentless approach ensures that all the workloads in the cloud account are discovered and assessed without having to deploy additional agents or configure additional scanners. Within hours, you have visibility that goes broad & deep while providing context that shows how an attacker might connect the disparate pieces from an exposed endpoint to critical data.
The agentless security pioneer
Orca’s patent-pending SideScanning technology quickly and easily scans all of your Linux and Windows workloads, including cloud VMs, containers and Kubernetes applications, and serverless functions, without the need to deploy and update agents like Aqua’s Enforcer and without the risk of injecting agents into critical workloads. This provides you with instant-on security and complete coverage for all your workloads and applications that Aqua can’t match. Within the Orca UI, you can view detailed risk prioritization information about all of your assets with context to understand your greatest risks and the impact to your business.
A unified data model
The Orca Platform brings all of your data into a unified, easily-queryable location. With Orca’s Unified Data Model, you can view assets, compliance status, risks, and security incidents from one dashboard, giving you deep visibility and context.
Focus on critical threats
Orca combines data in the Unified Data Model to deliver Attack Path Analysis, showing you where a combination of risks may lead to access to crown jewels like PII. This allows you to focus on the threats & alerts that matter most instead of trying to solve everything all the time.
Simple 3-step activation model scans your cloud accounts, assets, workloads, data, and identities across multiple clouds without having to deploy agents
A Patchwork of Options
Requires configuration of multiple piece, including deploying different agents for different workloads and configuring scanners to ensure visibility
Continuously monitor public cloud services and configurations, entitlements and identities, workloads and applications, all from a single dashboard
Separate views for critical parts of the product due to separation between CSPM, CWPP, and shift-left functionality
100+ compliance frameworks with all data and policies shown in a single dashboard for seamless reporting
No classification of data, making it far more difficult to find critical risks
Signature and heuristic-based detection
Requires External Service & Subscription
Built-in malware scanning is by hash only. In order to apply heuristic-based detections, images must be uploaded to an external service (Dynamic Threat Analysis)
Shift Left Security
Unified with Context
One CLI and dedicated Shift Left Dashboard for viewing all of your container image and IaC scans. Unified policy management of all your CI/CD policies
Disintegrated capabilities from FlawCheck and Accurics. Lack of unified policy engine spanning code to runtime
Simple and Comprehensive
Automated inventory of all interconnected APIs and web domains. Capabilities integrated with agentless SideScanning technology, nothing new to activate. Prioritize risks, including external exposure, mapped to OWASP API Security Top 10 and contextualized with all other risks