Orca Security Logo Orca Security Logo
    Platform Overview
    CNAPP
    Secure cloud native applications with a purpose-built platform
    CSPM
    Identify and remediate misconfigurations across clouds
    CWPP
    Protect VMs, containers, and serverless functions
    CIEM
    Secure cloud identities, users, and entitlements
    DSPM
    Reduce the risk of data breaches and protect sensitive PII
    Container & Kubernetes Security
    Scalable containers, images, and Kubernetes applications
    Multi-Cloud Compliance
    Achieve regulatory compliance for industry standards and custom checks
    Vulnerability Management
    Agentless vulnerability management that prioritizes your most critical risks
    API Security
    Complete API discovery, security posture management, and drift detection
    CDR
    24x7 monitoring and response across the entire cloud attack surface
    Application Security
    Secure cloud-native applications across the SDLC and trace dev risks to production.
    AI-SPM
    Inventory cloud AI models, identify AI risks, and ensure compliance
    Orca AI
    Accelerate cloud security with a GenAI-powered assistant
    SideScanning™ Technology
    Our innovative approach provides complete cloud coverage
    Orca Sensor
    Fully integrated runtime visibility and security for advanced CDR

    Industries

    Financial Services
    Government
    Healthcare
    Media & Entertainment
    Retail
    Technology

    Roles

    CISO
    DevOps
    Security Practitioner

    Learn

    Resource Library
    Blog
    Glossary New
    Comparisons
    Cloud Security 101

    Connect

    Events & Webinars

    Support

    Documentation
    User Center
    A photo of the Las Vegas sign

    Upcoming Event

    Black Hat USA

    August 2-7 Las Vegas, NV
    Research Pod
    Meet our team that discovers and analyzes cloud risks.
    Discovered Vulnerabilities
    Critical cloud vulnerabilities discovered by the Orca Research Pod.
    Open Source Projects New
    Cloud security tools for developers and security teams.
    “Orca Watch” Series
    Blog series that highlights new trends and risks seen by the Orca Platform.
    Technical Deep Dives
    In-depth, technical articles on cloud security and recommended best practices.
    A stylized graphic of Orca Security's 2025 State of Cloud Security report cover

    Report

    2025 State of Cloud Security

  • Case Studies
    Lemonade
    Watch Andrew Shimmel, Head of Cybersecurity at Vivino, discuss how he uses Orca Security for his company’s cloud security needs.
    Carlsberg Group
    How Sisense Ensures Trust with Cloud Security Using Orca
    Sisense
    Vercel
    RSA Case Study by Orca Security
    RSA Security
    Digital Turbine
    View all Case Studies

    Dive Deeper

    Ratings & Reviews
    See what our users say about us
    Why Orca
    Learn all about our purpose-built cloud security platform
    Partner Overview
    Amazon Web Services
    Microsoft Azure
    Google Cloud
    Alibaba Cloud
    Oracle Cloud
    Become a Partner
    Integrations Overview
    Aqua
    Jira
    PagerDuty
    Snowflake
    Splunk
    View All Integrations

    Integrate with us

    Learn how We're Building an Open Ecosystem

  • About Us
    Contact Us
    Careers
    Newsroom
    Media Kit

    Why Orca

    Learn how Orca is Leading the Market

  • USA
  • Europe
  • Australia
  • US-Gov
Get Demo
View more results
Orca Security Secures $550M to Mature the Security Industry Beyond the Age of Cyber Gimmicks
Orca Platform

Orca Security Secures $550M to Mature the Security Industry Beyond the Age of Cyber Gimmicks

After raising $550M this year from top investors such as Temasek, CapitalG (Alphabet’s VC arm), RedPoint,  GGV, Iconiq Capital, Lone...

Avi Shua Avi Shua
Oct 04, 2021
Controller of pods with administrator-like permissions in cluster scope

Controller of pods with administrator-like permissions in cluster scope

Controllers are responsible for pods state using a declaration of pod definition. Pods utilize a service account associated with them...

Orca Security Orca Security
Aug 25, 2022
Database with Potentially Personal Identifying Information found – Personal Information

Database with Potentially Personal Identifying Information found – Personal Information

Database {Name} with Unencrypted personal information was found on a cloud asset.

Orca Security Orca Security
Aug 25, 2022
Database with Potentially Personal Identifying Information found – Credit Card Numbers

Database with Potentially Personal Identifying Information found – Credit Card Numbers

Database {Name} with Unencrypted credit card numbers were found on a cloud asset.

Orca Security Orca Security
Aug 25, 2022
Database with Potentially Personal Identifying Information found – Social Security Numbers

Database with Potentially Personal Identifying Information found – Social Security Numbers

Database {Name} with Unencrypted social security numbers were found on a cloud asset.

Orca Security Orca Security
Aug 25, 2022
Host OS reaching End of Support

Host OS reaching End of Support

The installed operating system {Compute.DistributionName} {Compute.DistributionVersion} is about to reach end of support in less than 90 days, starting {Compute.OsEndOfSupport}....

Orca Security Orca Security
Jun 07, 2022
Azure storage container is publicly accessible

Azure storage container is publicly accessible

Anonymous, public read access to a container and its blobs can be enabled in Azure Blob storage. It grants read-only...

Orca Security Orca Security
Jun 07, 2022
Potentially Personal Identifying Information found – Email Addresses

Potentially Personal Identifying Information found – Email Addresses

Unencrypted email addresses were found on a cloud asset. Exposure to malicious actors can cause harm to not only the...

Orca Security Orca Security
Jun 07, 2022
SSH Authentication with Username and Password

SSH Authentication with Username and Password

The SSH configuration on the operation system is set to allow username and password authentication. SSH authentication based on username...

Orca Security Orca Security
Jun 07, 2022
Users with Console Access do not have MFA Enabled

Users with Console Access do not have MFA Enabled

Multi-Factor Authentication (MFA) adds an extra layer of authentication assurance beyond traditional credentials. With MFA enabled, when a user signs...

Orca Security Orca Security
Jun 07, 2022
Go to the previous page 1 2 3 4 Go to the next page
A screenshot of the Orca platform dashboard summarizing all of your cloud security risks

Personalized Demo

See Orca Security in Action

Gain visibility, achieve compliance, and prioritize risks with the Orca Cloud Security Platform.

Get a Demo
  • Platform

    • Cloud Security Platform

      • Cloud Native Application Protection
      • Vulnerability Management
      • SideScanning™ Technology
      • Container and Kubernetes Security
      • Cloud Security Posture Management (CSPM)
      • Cloud Infrastructure Entitlement Management (CIEM)
      • Cloud Workload Protection Platform (CWPP)
      • Orca AI
      • AI Security Posture Management (AI-SPM)
      • Multi-Cloud Compliance and Security
      • Cloud Detection and Response (CDR)
      • Application Security
      • API Security
      • Data Security Posture Management (DSPM)
      • Orca Sensor
    • Technology Ecosystem

      • Integrations
      • Amazon Web Services
      • Microsoft Azure
      • Google Cloud Platform
      • Oracle Cloud
      • Alibaba Cloud
  • Solutions

    • By Solution

      • Malware Detection
      • Sensitive Data Detection
      • IAM Risk
      • Lateral Movement Risk
    • By Industry

      • Financial Services
      • Technology
      • Government
      • Media & Entertainment
      • Healthcare
      • Retail
  • Resources

      • Library
      • Glossary
      • Product Info
      • Case Studies
      • Blog
      • Events
    • Comparisons

      • CrowdStrike
      • Wiz
      • Check Point CloudGuard
      • Lacework FortiCNAPP
      • Rapid7
      • Tenable
      • Qualys TotalCloud
      • Prisma Cloud
  • Company

      • About
      • Partners
      • Reviews
      • Orca Research Pod
      • Careers
      • Newsroom
      • Media Kit
    • Contact
      • Security Portal
      • User Center
      • Login
      • Partner Portal
  • Stay in touch

    Get cloud security insights
    and the latest Orca news

    Awards & Certifications

    • AWS Advanced Technology Partner Security Competency

    • FedRAMP Moderate Authorized

    • ISO/EC 27001 Information

    • ISO/EC 27017 Information

    • ISO/EC 27018 Information

    • ISO/EC 27701 Privacy

    • PCI SAQ-D

    • SOC 2 TYPE II Certified

    • 2022 AWS Global Security
Partner of the Year

    • Star Level One: Self-Assessment Cloud Security Alliance

    • CSA Trusted Cloud Provider
Cloud Security Alliance


Orca Security

©2025 Orca Security. All rights reserved.

  • Privacy Policy
  • Terms of Use
  • Cookie Settings
  • Virtual Patent Marking