• Search
  • Contact
  • Login
    • USA
    • Europe
    • Australia
    • US-Gov
  • The Orca Platform

    Secure cloud infrastructure, workloads, data, APIs, and identities with our industry-leading agentless cloud-native application protection platform (CNAPP).

    • Platform Overview
    • Cloud Security Posture Management
      Identify and remediate misconfigurations across clouds
    • Cloud Workload Protection
      Protect VMs, containers, and serverless functions
    • Container and Kubernetes Security
      Scalable security for containers and Kubernetes for every cloud layer
    • Cloud Detection & Response
      24x7 monitoring and response across the entire cloud attack surface
    • Vulnerability Management
      Agentless vulnerability management that prioritizes your most critical risks
    • Cloud Infrastructure Entitlement Management
      Secure cloud identities and entitlements
    • Multi-Cloud Compliance
      Achieve regulatory compliance with frameworks, benchmarks, and custom checks
    • Shift Left Security
      Secure cloud-native apps across the SDLC
    • SideScanning™ Technology
      Our innovative approach provides complete cloud coverage
    • API Security
      Complete API discovery, security posture management, and drift detection
    • Data Security and Posture Management
      Reduce the risk of data breaches and protect sensitive PII
  • Case Studies

    Our customers worldwide trust Orca to secure their Cloud.

    • View Case Studies

    Why Orca

    • Why Orca
      Learn all about our purpose-built cloud security platform
    • Our Company
      Learn about our company, culture and team
    • Ratings & Reviews
      See what our users say about us
    • Security Research
      The latest discoveries from the Research Pod

    Compare Orca

    • Prisma Cloud
      Many acquisitions and little integration
    • Qualys TotalCloud
      Not nearly as total as you want
    • Lacework
      More complexity, less visibility
    • Aqua
      End up underwater with alert fatigue
    • Rapid7
      Work a lot harder for less
    • Tenable
      Fragmented coverage makes this untenable
    • CloudGuard
      Doesn’t check all the boxes

    Industries

    • Financial Services
    • Technology
    • Government
    • Retail
    • Healthcare
    • Media & Entertainment
  • Our Partners

    Our team is extended and strengthened by our strong partnerships across the Cloud Security ecosystem.

    • Partner Overview
    • Amazon Web Services
    • Microsoft Azure
    • Google Cloud
    • Alibaba Cloud
    • Oracle Cloud
  • Orca Research Pod

    Our expert security research team discovers and analyzes cloud risks and vulnerabilities to strengthen the Orca platform.

    • See Our Latest Discoveries

    Orca Research

    Bad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build

    Two XSS Vulnerabilities in Azure with Embedded postMessage IFrames

    The Top 5 Cloud Security Risks of 2023 (so far)

  • Resource Library

    Download and view eBooks, whitepapers, videos and more in our packed Resource Library.

    • Browse Resources

    Blog

    Read Cloud Security thought leadership, how-to's, and insightful posts from Orca Security experts.

    • Browse Blogs

    Featured Resources

    Orca Events & Webinars – Register for Upcoming Webinars and Events

    2023 Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPP)

    TAG Cyber Report Shows 207% ROI on the Orca Cloud Security Platform

  • Careers

    Join the Orca team, and help secure the cloud for the world's most innovative companies.

    • See Open Roles
    • Why Orca
    • Newsroom
    • Media & Press
    • About Us
    • Ratings & Reviews
    • Contact Us
  • Search
  • Contact
  • Login
    • USA
    • Europe
    • Australia
    • US-Gov
  • Get Demo
View more results
Orca Security Secures $550M to Mature the Security Industry Beyond the Age of Cyber Gimmicks
Orca Platform

Orca Security Secures $550M to Mature the Security Industry Beyond the Age of Cyber Gimmicks

After raising $550M this year from top investors such as Temasek, CapitalG (Alphabet’s VC arm), RedPoint,  GGV, Iconiq Capital, Lone...

Avi Shua Avi Shua
Oct 04, 2021

Apache Spark configuration without authentication

We have detected an Apache Spark configuration file on the system which doesn't support authentication. This could allow unwanted users...

Jun 06, 2023

Apache Spark configuration without encryption

We have detected an Apache Spark configuration file on the system which doesn't support encryption. Allowing connections without encryption can...

Jun 06, 2023

FTP configuration with anonymous login enabled

We have detected a FTP configuration file on the system which enables anonymous login. This could allow unwanted users to...

Jun 06, 2023

VMware Virtual Machine with Unity Active feature enabled

A VMware virtual machine is a software-based emulation of a physical computer. VMware Unity Active feature should be disabled if...

Jun 06, 2023

VMware Virtual Machine with Guest Host Interaction Tray Icon feature enabled

A VMware virtual machine is a software-based emulation of a physical computer. VMware Guest Host Interaction Tray Icon feature should...

Jun 06, 2023

VMware Virtual Machine with Drag and Drop Version Get feature enabled

A VMware virtual machine is a software-based emulation of a physical computer. VMware Drag and Drop Version Get feature should...

Jun 06, 2023

VMware Virtual Machine with Unity Push Update feature enabled

A VMware virtual machine is a software-based emulation of a physical computer. VMware Unity Push Update feature should be disabled...

Jun 06, 2023

VMware Virtual Machine with Unity Window Contents feature enabled

A VMware virtual machine is a software-based emulation of a physical computer. VMware Unity Window Contents feature should be disabled...

Jun 06, 2023

VMware Virtual Machine with Request Disk Topology feature enabled

A VMware virtual machine is a software-based emulation of a physical computer. VMware Request Disk Topology feature should be disabled...

Jun 06, 2023
Load More
See Orca in action See Orca in action-> View a 10 minute recorded demo or sign up for a personalized one-on-one walk-through.
  • Platform

    • CLOUD SECURITY PLATFORM

      • Platform
      • SideScanning™ Technology
      • Context-Aware Security
      • Built-in Compliance
      • Automation & Customization
    • TECHNOLOGY ECOSYSTEM

      • Amazon Web Services
      • Microsoft Azure
      • Google Cloud Platform
  • Solutions

    • By Solution

      • Malware Detection
      • Vulnerability Management
      • Sensitive Data Detection
      • Container and Kubernetes Security
      • Multi-Cloud Compliance and Security
      • Cloud Security Posture Management (CSPM)
      • CIEM
      • Cloud Workload Protection Platform (CWPP)
      • Cloud Detection and Response (CDR)
      • Shift Left Security
      • API Security
      • Data Security and Posture Management (DSPM)
    • By Industry

      • Financial Services
      • Technology Services
      • Media & Entertainment
      • Healthcare
      • Retail
  • Resources

      • Library
      • Product Info
      • Podcast
      • Case Studies
      • Cloud Risk Encyclopedia
      • Blog
      • Events
    • COMPARISONS

      • Prisma Cloud Security 2022
      • Qualys Cloud Agent
      • Twistlock Container Security
      • Redlock Palo Alto
      • Rapid7 InsightVM
      • Check Point CloudGuard Dome9
  • Company

      • About
      • Partners
      • Reviews
      • Orca Research Pod
      • Careers
      • Newsroom
      • Media Kit
    • Contact
      • Support
      • Security Portal
      • Login
  • Stay in touch

    Get cloud security insights
    and the latest Orca news


Orca Security

©2023 Orca Security. All rights reserved.

  • Privacy Policy
  • Terms of Use
  • Cookie Settings
  • Virtual Patent Marking