orca.security Open in urlscan Pro
192.0.66.46  Public Scan

Submitted URL: https://pod.orca.security/Nzk2LVBCVy01NTkAAAGPwJowNkhuLQplZ9UqByf6OeXUgE8lW_Iq1IhbRVh7NliMkzoUW5nBuYjMnKMdx-QaMLvHS08=
Effective URL: https://orca.security/?mkt_tok=Nzk2LVBCVy01NTkAAAGPwJowNmmIKhyrHfhP1B9x1A4KGb9oaHhir7ifs4gM7xD7YhLyU0kRHVJIwaoFshLTPtT...
Submission: On December 01 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="ais-SearchBox-form" novalidate="">
  <input class="ais-SearchBox-input ais-SearchBox-input-v2" autofocus="true" autocomplete="off" autocorrect="off" autocapitalize="off" placeholder="What are you looking for?" spellcheck="false" maxlength="512" type="search" value="">
  <button class="ais-SearchBox-submit" type="submit" title="Submit the search query."></button>
  <div class="ais-SearchBox-close">
    <span class="push-enter-text">Press enter to search</span>
    <button class="ais-SearchBox-reset-inner" aria-label="Close Search">
      <svg focusable="false" aria-hidden="true" width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M2.28818 1.11612C1.80002 0.627961 1.00857 0.627961 0.520413 1.11612C0.032258 1.60427 0.032258 2.39573 0.520413 2.88388L5.13653 7.5L0.520413 12.1161C0.032258 12.6043 0.032258 13.3957 0.520413 13.8839C1.00857 14.372 1.80002 14.372 2.28818 13.8839L6.9043 9.26777L11.5204 13.8839C12.0086 14.372 12.8 14.372 13.2882 13.8839C13.7763 13.3957 13.7763 12.6043 13.2882 12.1161L8.67206 7.5L13.2882 2.88388C13.7763 2.39573 13.7763 1.60427 13.2882 1.11612C12.8 0.627962 12.0086 0.627962 11.5204 1.11612L6.9043 5.73223L2.28818 1.11612Z"
          fill="white"></path>
      </svg>
    </button>
  </div>
</form>

Text Content

___

 * Search
 * Contact
 * Login
   * Login
   * USA
   * Europe
   * Australia
   * US-Gov

 * Platform
   Platform
   
   The Orca Platform
   
   Secure cloud infrastructure, workloads, data, APIs, and identities with our
   industry-leading agentless cloud-native application protection platform
   (CNAPP).
   
    * Platform Overview
   
    * Cloud Security Posture Management
      Identify and remediate misconfigurations across clouds
    * Cloud Workload Protection
      Protect VMs, containers, and serverless functions
    * Container and Kubernetes Security
      Scalable security for containers and Kubernetes for every cloud layer
    * Cloud Detection & Response
      24x7 monitoring and response across the entire cloud attack surface
   
    * Vulnerability Management
      Agentless vulnerability management that prioritizes your most critical
      risks
    * Cloud Infrastructure Entitlement Management
      Secure cloud identities and entitlements
    * Multi-Cloud Compliance
      Achieve regulatory compliance with frameworks, benchmarks, and custom
      checks
    * Shift Left Security
      Secure cloud-native apps across the SDLC
   
    * SideScanning™ Technology
      Our innovative approach provides complete cloud coverage
    * API Security
      Complete API discovery, security posture management, and drift detection
    * Data Security and Posture Management
      Reduce the risk of data breaches and protect sensitive PII

 * Why Orca
   Why Orca
   
   Case Studies
   
   Our customers worldwide trust Orca to secure their Cloud.
   
    * View Case Studies
   
   Why Orca
   
    * Why Orca
      Learn all about our purpose-built cloud security platform
    * Our Company
      Learn about our company, culture and team
    * Ratings & Reviews
      See what our users say about us
    * Security Research
      The latest discoveries from the Research Pod
   
   Compare Orca
   
    * Prisma Cloud
      Many acquisitions and little integration
    * Qualys TotalCloud
      Not nearly as total as you want
    * Lacework
      More complexity, less visibility
    * Aqua
      End up underwater with alert fatigue
   
    * Rapid7
      Work a lot harder for less
    * Tenable
      Fragmented coverage makes this untenable
    * CloudGuard
      Doesn’t check all the boxes
   
   Industries
   
    * Financial Services
    * Technology
    * Government
    * Retail
    * Healthcare
    * Media & Entertainment

 * Partners
   Partners
   
   Our Partners
   
   Our team is extended and strengthened by our strong partnerships across the
   Cloud Security ecosystem.
   
    * Partner Overview
   
    * Amazon Web Services
    * Microsoft Azure
    * Google Cloud
    * Alibaba Cloud
    * Oracle Cloud

 * Research
   Research
   
   Orca Research Pod
   
   Our expert security research team discovers and analyzes cloud risks and
   vulnerabilities to strengthen the Orca platform.
   
    * See Our Latest Discoveries
   
   Orca Research
   
   Bad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build
   
   Two XSS Vulnerabilities in Azure with Embedded postMessage IFrames
   
   The Top 5 Cloud Security Risks of 2023 (so far)

 * Resources
   Resources
   
   Resource Library
   
   Download and view eBooks, whitepapers, videos and more in our packed Resource
   Library.
   
    * Browse Resources
   
   Blog
   
   Read Cloud Security thought leadership, how-to's, and insightful posts from
   Orca Security experts.
   
    * Browse Blogs
   
   Featured Resources
   
   Orca Events & Webinars
   
   2023 Gartner® Market Guide for Cloud-Native Application Protection Platforms
   (CNAPP)
   
   TAG Cyber Report Shows 207% ROI on the Orca Cloud Security Platform

 * About
   About
   
   Careers
   
   Join the Orca team, and help secure the cloud for the world's most innovative
   companies.
   
    * See Open Roles
   
    * Why Orca
    * Newsroom
    * Media & Press
    * About Us
    * Ratings & Reviews
    * Contact Us

 * Search
 * Contact
 * Login
   * Login
   * USA
   * Europe
   * Australia
   * US-Gov

 * Get Demo



Press enter to search
 * Blog
   4 Cloud Security Considerations for Financial Services Companies
 * Cloud Risk
   Superglue: A remediated zero-day vulnerability in AWS Glue
 * Cloud Risk
   BreakingFormation: Vulnerability in AWS CloudFormation
 * Blog
   Q2 Update: How the Cloud Risk Encyclopedia Enhances DevOps Production
   Checklists
 * Event
   Virtual Cloud Security Camp

 * Blog
   4 Cloud Security Considerations for Financial Services Companies

View more results


THE AI-DRIVEN CLOUD SECURITY PLATFORM

More cloud security data than anyone else-now easier than ever to understand

Read more
Get a demo



TRUSTED BY THE WORLD’S MOST INNOVATIVE COMPANIES

 * Vercel
   
   <15 mins
   
   to onboard and view security results
   
   "I needed cloud security tooling that could get me visibility fast. Orca
   answers all my visibility needs within minutes - across multiple clouds."
   
   Case Study
 * FourKites
   
   100 %
   
   visibility into multi-cloud environments
   
   “We now get 100% complete visibility across our entire cloud infrastructure,
   even on systems where agents can’t be installed…Orca figured out the gaps in
   the industry and tied it all together into one product.”
   
   Case Study
 * Paidy
   
   500K
   
   per year in cost savings
   
   “When I talk to colleagues about Orca, I tell them it gives us insight across
   all our cloud environments—not only AWS, but also Azure and GCP. The more
   accounts we have, the more value we get because now we know what our people
   are running.”
   
   Case Study

 * Unity
   
   
 * Digital Turbine
   
   
 * BeyondTrust
   
   
 * Hunters
   
   
 * Lemonade
   
   
 * Autodesk
   
 * SAP
   
 * Wiley
   
 * Gannett
   
 * Wix
   


WE'RE REVOLUTIONIZING CLOUD SECURITY

Orca Security is the industry-leading Cloud Security Platform that identifies,
prioritizes, and remediates security risks and compliance issues across your
cloud estate spanning AWS, Azure, Alibaba Cloud, Google Cloud and Kubernetes.


UNDERSTAND AND PRIORITIZE YOUR GREATEST CLOUD RISKS

The Orca Cloud Security Platform connects to your cloud environment in minutes
to deliver complete coverage across all cloud risks – spanning
misconfigurations, vulnerabilities, identity risks, data security, API exposure,
and advanced threats:

 * Stop sifting through long lists of alerts and prioritize the top combination
   of risks that matter with attack path analysis
 * Automatically identify PII and crown jewel assets to prevent critical risks
   to your business




UNIFY CLOUD SECURITY IN A SINGLE PLATFORM

Orca brings together core cloud security capabilities, including vulnerability
management, multi-cloud compliance and posture management, cloud workload
protection, container security, and more in a single, purpose-built solution.

 * Enable faster, more effective security outcomes without the need to
   continually onboard and implement multiple, siloed security tools
 * Easily activate advanced capabilities, such as API Security, Cloud Detection
   and Response, and Shift Left Security, to address more cloud security
   challenges and increase visibility
 * Gain unmatched context into your cloud environments to prioritize risks
   across the entire tech stack




CLOSE THE LOOP ON ALERTS – FASTER THAN EVER BEFORE

Remediating cloud risks is a huge challenge for security teams, especially in a
world where DevOps is the norm. Security teams can use Orca to resolve an alert
and attribute risks immediately to the line of code that led to the risk
reaching production.

 * Orca’s automation ensures risks are identified quickly with the ability to
   trace them back to the line of code that caused the issue
 * Security teams save time tracking down development and DevOps teams to ensure
   remediation happens efficiently
 * Companies improve their overall cloud security posture and mean time to
   resolution for security risks while reducing friction




EXPLORE THE ORCA CLOUD SECURITY PLATFORM


 1.  CSPM
     
     Continuously monitor, Identify and remediate misconfigurations across
     clouds, including cloud infrastructure posture management, automated
     remediation, pre-deployment IaC scanning, and reporting.
     
     Explore


 2.  CWPP
     
     Protect cloud VMs, containers and Kubernetes applications, and serverless
     functions across clouds. Prioritize risks and compliance issues, manage
     workload and application vulnerabilities, identify malware, and integrate
     security across the full application lifecycle from a single, agentless
     platform.
     
     Explore


 3.  CIEM
     
     Detect identity misconfigurations, ensure least-privilege compliance and
     access, and monitor identity hygiene metrics.
     
     Explore


 4.  CONTAINER AND KUBERNETES SECURITY
     
     Secure cloud native applications across Build, Deploy and Run–scan
     container images and IaC templates pre-deployment, continuously scan
     container registries, and monitor vulnerabilities, compliance issues, and
     advanced threats at runtime.
     
     Explore


 5.  MULTI-CLOUD COMPLIANCE
     
     Achieve regulatory compliance with over 100 out-of-the-box frameworks, CIS
     Benchmarks, and custom checks across multiple cloud platforms–instantly
     covering 100% of your cloud estate, surfacing and prioritizing your most
     critical risks to address compliance gaps strategically.
     
     Explore


 6.  CLOUD DETECTION AND RESPONSE
     
     Continuously analyze, alert on, and remediate anomalous behavior and
     advanced threats, including suspicious activity, threats from external
     exposure, and malware detection.
     
     Explore


 7.  SHIFT LEFT SECURITY
     
     Scan Infrastructure as Code (IaC) templates and container images from a
     single platform, ensuring that any vulnerabilities, secrets,
     misconfigurations, and malware are detected early in the development
     process.
     
     Explore


 8.  API SECURITY
     
     Identify, prioritize, and address API misconfigurations and security risks
     across multi-cloud environments–view a complete and continuously updated
     inventory of managed and unmanaged APIs, actionable data on API
     misconfigurations and vulnerabilities, and alerts on potentially risky API
     drift and changes.
     
     Explore


 9.  VULNERABILITY AND PATCH MANAGEMENT
     
     Manage vulnerabilities and prioritize risks. Understand operating system,
     package, and other vulnerability issues across Linux and Windows VMs,
     container images, and serverless functions.
     
     Explore


 10. DSPM
     
     Identify, prioritize, and address security and compliance risks in managed,
     unmanaged, and shadow data stores. Gain full visibility into what
     cloud-stored sensitive data you have, where it resides, and how direct and
     indirect risks can lead to exposure.
     
     Explore

location

Toronto, Ontario, Canada

industry

Education

cloud environment

AWS



“Orca gives us the ability to collaborate with other teams within Docebo using
just one tool. It ensures we speak the same language to achieve our security
goals.”

Davide RivaManager, Security Operations
Docebo

location

North America

industry

Insurance

cloud environment

AWS, GCP, Azure



“Anything that impacts development is going to be met with resistance. But with
Orca SideScanning there is zero impact on systems. It’s also easy to use.”

Jonathan JaffeCISO
Lemonade

Read the case study
location

Austin, Texas

industry

Mobile Advertising

cloud environment

AWS



“Orca adds value practically from the first day of use. With other tools, we
wait months to see value coming from them.”

Vivek MenonVice President and Chief Information Security Officer
Digital Turbine

location

San Francisco, California, USA

industry

Platform-as-a-Service

cloud environment

AWS



“Orca gives us a complete cloud inventory to know about all our assets and
workloads for vulnerability management.”

Aaron BrownHead of Cloud Security
Vercel

location

Toronto, Ontario, Canada

industry

Education

cloud environment

AWS



“Orca gives us the ability to collaborate with other teams within Docebo using
just one tool. It ensures we speak the same language to achieve our security
goals.”

Davide RivaManager, Security Operations
Docebo

location

North America

industry

Insurance

cloud environment

AWS, GCP, Azure



“Anything that impacts development is going to be met with resistance. But with
Orca SideScanning there is zero impact on systems. It’s also easy to use.”

Jonathan JaffeCISO
Lemonade

Read the case study
location

Austin, Texas

industry

Mobile Advertising

cloud environment

AWS



“Orca adds value practically from the first day of use. With other tools, we
wait months to see value coming from them.”

Vivek MenonVice President and Chief Information Security Officer
Digital Turbine

location

San Francisco, California, USA

industry

Platform-as-a-Service

cloud environment

AWS



“Orca gives us a complete cloud inventory to know about all our assets and
workloads for vulnerability management.”

Aaron BrownHead of Cloud Security
Vercel

location

Toronto, Ontario, Canada

industry

Education

cloud environment

AWS



“Orca gives us the ability to collaborate with other teams within Docebo using
just one tool. It ensures we speak the same language to achieve our security
goals.”

Davide RivaManager, Security Operations
Docebo




 * PLATFORM
   
   
   * CLOUD SECURITY PLATFORM
     
     * Platform
     * SideScanning™ Technology
     * Context-Aware Security
     * Built-in Compliance
     * Automation & Customization
   
   
   * TECHNOLOGY ECOSYSTEM
     
     * Amazon Web Services
     * Microsoft Azure
     * Google Cloud Platform


 * SOLUTIONS
   
   
   * BY SOLUTION
     
     * Malware Detection
     * Vulnerability Management
     * Sensitive Data Detection
     * Container and Kubernetes Security
     * Multi-Cloud Compliance and Security
     * Cloud Security Posture Management (CSPM)
     * CIEM
     * Cloud Workload Protection Platform (CWPP)
     * Cloud Detection and Response (CDR)
     * Shift Left Security
     * API Security
     * Data Security and Posture Management (DSPM)
   
   
   * BY INDUSTRY
     
     * Financial Services
     * Technology Services
     * Media & Entertainment
     * Healthcare
     * Retail


 * RESOURCES
   
   * * Library
     * Product Info
     * Podcast
     * Case Studies
     * Cloud Risk Encyclopedia
     * Blog
     * Events
   
   
   * COMPARISONS
     
     * Prisma Cloud Security 2022
     * Qualys Cloud Agent
     * Twistlock Container Security
     * Redlock Palo Alto
     * Rapid7 InsightVM
     * Check Point CloudGuard Dome9


 * COMPANY
   
   * * About
     * Partners
     * Reviews
     * Orca Research Pod
     * Careers
     * Newsroom
     * Media Kit
   * Contact
     * Support
     * Security Portal
     * Login
 * * 
   * 
   * 
   * 
   * 
   * 
   * 
   * 

--------------------------------------------------------------------------------

©2023 Orca Security. All rights reserved.

 * Privacy Policy
 * Terms of Use
 * Cookies Settings
 * Virtual Patent Marking

 * 
 * 
 * 
 * 

Click for sound



2:14









Click for sound



2:14










By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Cookie Policy
Accept All Cookies Reject All
Cookies Settings



PRIVACY PREFERENCE CENTER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES


 * FUNCTIONAL COOKIES


 * TARGETING COOKIES


 * SOCIAL MEDIA COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

SOCIAL MEDIA COOKIES

Social Media Cookies


These cookies are set by a range of social media services that we have added to
the site to enable you to share our content with your friends and networks. They
are capable of tracking your browser across other sites and building up a
profile of your interests. This may impact the content and messages you see on
other websites you visit. If you do not allow these cookies you may not be able
to use or see these sharing tools.

Back Button


COOKIE LIST

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Confirm My Choices
Reject All Allow All