50 Orca Security Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "The visibility we gained from Orca into what was going on in our environment was clear, precise, and most importantly, actionable."

  • “Orca Security has raised the standards of how we identify, prioritize, and solve risks within our cloud environment.”

  • “Security posture management is about refining enormous amounts of data into prioritized actionable insights, effectively and accurately. As a security posture management solution company ourselves, we’ve found our IaaS twin in Orca, sharing the same passion for preventing the next attack the smart way.”

  • “For every agent-based security tool we tried, we spent about nine months getting it operational. One product after another failed in our environment.”

  • “What I like most about Orca Security is that you get very deep results with only a small investment in time. You get value on day one.”

  • “The Orca Cloud Security Platform gives us high value with a smaller investment in a short amount of time.”

  • “Anything that impacts development is going to be met with resistance. But with Orca SideScanning there is zero impact on systems. It’s also easy to use.”

  • “We got immediate security insights from the first day we began running Orca.”

  • “We compared about ten of security tools, and Orca Security was a standout. We were completely blown away after a 10-minute demo. Other products were just stuck in the mud.”

  • "I give the Orca Platform a 10 out of 10 on UI/UX."

  • "Orca's agentless architecture and ability to prioritize risks have been instrumental in optimizing our security posture."

  • “Orca told us we could have some visibility within 5 or 10 minutes andI thought, ‘There’s no way.’ Well, I was wrong. They really did it and the SideScanning doesn’t impact anything our developers are doing.”

  • “These days, any cloud security solution that requires agents, libraries or costly and complex integrations should be out of the question. In contrast, Orca Security provides a comprehensive security perspective that doesn’t require material changes to the cloud environment, but still identifies all issues across the entire stack – OS, …

  • “In AWS you can set up your own operating system, such as Ubuntu, for a system to run on, and if the OS is stable, it’ll roll that version within the AMI. An older OS version might have vulnerabilities within that AMI. Orca Security surfaces those OS-related vulnerabilities so our …

  • “Even though DevOps reports directly to me, they still have their own way of working. I’ve been waiting six months for them to write a rule in another security product. But when I gave them Orca, they loved it. I’ve never seen adoption like this.”