Aqua Security followed Twistlock into the CWPP market, Palo Alto in combining a CSPM with a CWPP, and Orca Security in delivering a CNAPP platform. Orca is the innovation leader, providing a cloud security platform that starts with patented SideScanning technology and continues to be the most comprehensive security solution for your cloud.
With Orca Security, a simple, 3-step configuration enables you to get up & running quickly. Our agentless approach ensures that all the workloads in the cloud account are discovered and assessed without having to deploy additional agents or configure additional scanners. Within hours, you have visibility that goes broad & deep while providing context that shows how an attacker might connect the disparate pieces from an exposed endpoint to critical data.
Orca’s patent-pending SideScanning technology quickly and easily scans all of your Linux and Windows workloads, including cloud VMs, containers and Kubernetes applications, and serverless functions, without the need to deploy and update agents like Aqua’s Enforcer and without the risk of injecting agents into critical workloads. This provides you with instant-on security and complete coverage for all your workloads and applications that Aqua can’t match. Within the Orca UI, you can view detailed risk prioritization information about all of your assets with context to understand your greatest risks and the impact to your business.
The Orca Platform brings all of your data into a unified, easily-queryable location. With Orca’s Unified Data Model, you can view assets, compliance status, risks, and security incidents from one dashboard, giving you deep visibility and context.
Orca combines data in the Unified Data Model to deliver Attack Path Analysis, showing you where a combination of risks may lead to access to crown jewels like PII. This allows you to focus on the threats & alerts that matter most instead of trying to solve everything all the time.
Simple 3-step activation model scans your cloud accounts, assets, workloads, data, and identities across multiple clouds without having to deploy agents
Requires configuration of multiple piece, including deploying different agents for different workloads and configuring scanners to ensure visibility
Continuously monitor public cloud services and configurations, entitlements and identities, workloads and applications, all from a single dashboard
Separate views for critical parts of the product due to separation between CSPM, CWPP, and shift-left functionality
65+ compliance frameworks with all data and policies shown in a single dashboard for seamless reporting
No common data plane between cloud & workload assessment. Far fewer frameworks means more work for compliance teams
Interactive dashboard, with automated impact score, surfaces toxic combinations of risks so teams can prioritize and fix the top 1% of issues. All risks mapped to the MITRE ATT&CK framework
No visibility into the complete attack path from exposed endpoint to sensitive data
Automatic detection of PII across all cloud resources
No classification of data, making it far more difficult to find critical risks
Signature and heuristic-based detection
Built-in malware scanning is by hash only. In order to apply heuristic-based detections, images must be uploaded to an external service (Dynamic Threat Analysis)
Automated inventory of all interconnected APIs and web domains. Capabilities integrated with agentless SideScanning technology, nothing new to activate. Prioritize risks, including external exposure, mapped to OWASP API Security Top 10 and contextualized with all other risks
No assessment of deployed API endpoints leaves you guessing about the potential risk
One CLI and dedicated Shift Left Dashboard for viewing all of your container image and IaC scans. Unified policy management of all your CI/CD policies
Full capabilities require top-tier SKU