orca.security Open in urlscan Pro
192.0.66.46  Public Scan

Submitted URL: https://go.orca.security/webmail/898611/277810719/1580824db0dbd0b5AB12ABCDEFGHIJKLMNOPQ7f010AB12ABCDEFGHIJKLMNOPQ9
Effective URL: https://orca.security/
Submission: On December 12 via api from CH — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="ais-SearchBox-form" novalidate="">
  <input class="ais-SearchBox-input ais-SearchBox-input-v2" autofocus="true" autocomplete="off" autocorrect="off" autocapitalize="off" placeholder="What are you looking for?" spellcheck="false" maxlength="512" type="search" value="">
  <button class="ais-SearchBox-submit" type="submit" title="Submit the search query."></button>
  <div class="ais-SearchBox-close">
    <span class="push-enter-text">Press enter to search</span>
    <button class="ais-SearchBox-reset-inner" aria-label="Close Search">
      <svg focusable="false" aria-hidden="true" width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M2.28818 1.11612C1.80002 0.627961 1.00857 0.627961 0.520413 1.11612C0.032258 1.60427 0.032258 2.39573 0.520413 2.88388L5.13653 7.5L0.520413 12.1161C0.032258 12.6043 0.032258 13.3957 0.520413 13.8839C1.00857 14.372 1.80002 14.372 2.28818 13.8839L6.9043 9.26777L11.5204 13.8839C12.0086 14.372 12.8 14.372 13.2882 13.8839C13.7763 13.3957 13.7763 12.6043 13.2882 12.1161L8.67206 7.5L13.2882 2.88388C13.7763 2.39573 13.7763 1.60427 13.2882 1.11612C12.8 0.627962 12.0086 0.627962 11.5204 1.11612L6.9043 5.73223L2.28818 1.11612Z"
          fill="white"></path>
      </svg>
    </button>
  </div>
</form>

Text Content

ORCA SECURITY NAMED AWS 2022 GLOBAL SECURITY PARTNER OF THE YEAR

Learn More

 * English
 * Search
 * Contact
 * Support
 * Login
   * Login
   * USA
   * Europe
   * Australia
   * US-Gov

 * Platform
   Platform
   
   The Orca Platform
   
   Secure cloud infrastructure, workloads, data and identities with our
   industry-leading agentless platform.
   
    * Platform Overview
   
    * Cloud Security Posture Management
      Identify and remediate misconfigurations across clouds
    * Cloud Workload Protection
      Protect VMs, containers, and serverless functions
    * Container and Kubernetes Security
      Scalable security for containers and Kubernetes for every cloud layer
    * Cloud Detection & Response
      24x7 monitoring and response across the entire cloud attack surface
   
    * Vulnerability Management
      Agentless vulnerability management that prioritizes your most critical
      risks
    * Cloud Infrastructure Entitlement Management
      Secure cloud identities and entitlements
    * Multi-Cloud Compliance
      Achieve regulatory compliance with frameworks, benchmarks, and custom
      checks
    * Shift Left Security
      Secure cloud-native apps across the SDLC
   
    * SideScanning™ Technology
      Our innovative approach provides complete cloud coverage
    * API Security
      Complete API discovery, security posture management, and drift detection

 * Use Cases
   Use Cases
   
   Case Studies
   
   Orca Security is trusted by the most innovative companies across the globe.
   
    * Browse Case Studies
   
   Industries
   
    * Financial Services
    * Technology
    * Government
    * Retail
    * Healthcare
    * Media & Entertainment
   
   User Roles
   
    * CISO
    * Security Architect
    * DevOps
   
   Orca Delivers Near Real-Time Cloud Security Visibility to FourKites.
   
   Read Case Study
   
   Insurance Innovator Lemonade Goes from 0 to 100% Cloud Visibility with Orca
   Security.
   
   Read Case Study

 * Partners
   Partners
   
   Our Partners
   
   Our team is extended and strengthened by our strong partnerships across the
   Cloud Security ecosystem.
   
    * Partner Overview
    * Join the Program
   
    * Amazon Web Services
    * Microsoft Azure
    * Google Cloud
    * Alibaba Cloud

 * Research
   Research
   
   Orca Research Pod
   
   Our expert security research team discovers and analyzes cloud risks and
   vulnerabilities to strengthen the Orca platform.
   
    * See Our Latest Discoveries
   
   Orca Research
   
   CosMiss: Azure Cosmos DB Notebook Remote Code Execution Vulnerability
   
   FabriXss: CVE Discovered in Azure Service Fabric Explorer (SFX)
   
   Cloud Risk Encyclopedia - Browse Thousands of Cloud Risks

 * Resources
   Resources
   
   Resource Library
   
   Download and view eBooks, whitepapers, videos and more in our packed Resource
   Library.
   
    * Browse Resources
   
   Blog
   
   Read Cloud Security thought leadership, how-to's, and insightful posts from
   Orca Security experts.
   
    * Browse Blogs
   
    * Cloud Risk Encyclopedia
    * Product Articles & Videos
    * Comparisons
    * Events
    * Podcasts
    * Customer Support

 * About
   About
   
   Our Customers
   
   Orca Security is trusted by the most innovative companies across the globe.
   
    * Browse Case Studies
   
    * Why Orca
    * About Us
    * Newsroom
    * Ratings & Reviews
    * Media & Press
    * Careers
    * FAQs
    * Contact Us

 * English
 * Search
 * Contact
 * Support
 * Login
   * Login
   * USA
   * Europe
   * Australia
   * US-Gov

 * Free Trial
 * Get Demo



Press enter to search
 * Cloud Risk
   Superglue: A remediated zero-day vulnerability in AWS Glue
 * Cloud Risk
   BreakingFormation: Vulnerability in AWS CloudFormation
 * Blog
   Q2 Update: How the Cloud Risk Encyclopedia Enhances DevOps Production
   Checklists
 * Event
   Virtual Cloud Security Camp
 * Case Studies
   Clearco Enhances Comprehensive Security on Google Cloud Platform with Orca
   Security

 * Cloud Risk
   Superglue: A remediated zero-day vulnerability in AWS Glue

View more results


WE SET THE STANDARD FOR AGENTLESS CLOUD SECURITY.

Quickly discover, identify and remediate cloud risks to keep your business
secure.

Get a Demo



TRUSTED BY THE WORLD’S MOST INNOVATIVE COMPANIES

 * Sisense
   
   <15 mins
   
   to onboard and view security results
   
   “We deployed Orca Security in seconds—literally. It took me less than three
   minutes to get a cloud environment up and running.”
   
   Case Study
 * FourKites
   
   100 %
   
   visibility into multi-cloud environments
   
   “We now get 100% complete visibility across our entire cloud infrastructure,
   even on systems where agents can’t be installed…Orca figured out the gaps in
   the industry and tied it all together into one product.”
   
   Case Study
 * Paidy
   
   500K
   
   per year in cost savings
   
   “When I talk to colleagues about Orca, I tell them it gives us insight across
   all our cloud environments—not only AWS, but also Azure and GCP. The more
   accounts we have, the more value we get because now we know what our people
   are running.”
   
   Case Study

 * Autodesk
   
 * Wiley
   
 * Unity
   
   
 * Gannett
   
 * Nextroll
   
 * Wix
   
 * SAP
   
 * BeyondTrust
   
   
 * RobinHood
   
 * Lemonade
   
   


WE'RE REVOLUTIONIZING CLOUD SECURITY

Orca Security is the industry-leading Cloud Security Platform that identifies,
prioritizes, and remediates security risks and compliance issues across your
cloud estate spanning AWS, Azure, Alibaba Cloud, Google Cloud and Kubernetes.


UNDERSTAND AND PRIORITIZE YOUR GREATEST CLOUD RISKS

The Orca Platform connects to your cloud environment in minutes to deliver
complete coverage across all cloud risks – spanning misconfigurations,
vulnerabilities, identity risks, data security, API exposure, and advanced
threats:

 * Stop sifting through long lists of alerts and prioritize the top combination
   of risks that matter with attack path analysis
 * Automatically identify PII and crown jewel assets to prevent critical risks
   to your business




UNIFY CLOUD SECURITY IN A SINGLE PLATFORM

Orca brings together core cloud security capabilities, including vulnerability
management, multi-cloud compliance and posture management, cloud workload
protection, container security, and more in a single, purpose-built solution.

 * Enable faster, more effective security outcomes without the need to
   continually onboard and implement multiple, siloed security tools
 * Easily activate advanced capabilities, such as API Security, Cloud Detection
   and Response, and Shift Left Security, to address more cloud security
   challenges and increase visibility
 * Gain unmatched context into your cloud environments to prioritize risks
   across the entire tech stack




EXPLORE THE ORCA CLOUD SECURITY PLATFORM


 1. CSPM
    
    Continuously monitor, Identify and remediate misconfigurations across
    clouds, including cloud infrastructure posture management, automated
    remediation, pre-deployment IaC scanning, and reporting.
    
    Explore


 2. CWPP
    
    Protect cloud VMs, containers and Kubernetes applications, and serverless
    functions across clouds. Prioritize risks and compliance issues, manage
    workload and application vulnerabilities, identify malware, and integrate
    security across the full application lifecycle from a single, agentless
    platform.
    
    Explore


 3. CIEM
    
    Detect identity misconfigurations, ensure least-privilege compliance and
    access, and monitor identity hygiene metrics.
    
    Explore


 4. CONTAINER AND KUBERNETES SECURITY
    
    Secure cloud native applications across Build, Deploy and Run–scan container
    images and IaC templates pre-deployment, continuously scan container
    registries, and monitor vulnerabilities, compliance issues, and advanced
    threats at runtime.
    
    Explore


 5. MULTI-CLOUD COMPLIANCE
    
    Achieve regulatory compliance with over 65 out-of-the-box frameworks, CIS
    Benchmarks, and custom checks across multiple cloud platforms–instantly
    covering 100% of your cloud estate, surfacing and prioritizing your most
    critical risks to address compliance gaps strategically.
    
    Explore


 6. CLOUD DETECTION AND RESPONSE
    
    Continuously analyze, alert on, and remediate anomalous behavior and
    advanced threats, including suspicious activity, threats from external
    exposure, and malware detection.
    
    Explore


 7. SHIFT LEFT SECURITY
    
    Scan Infrastructure as Code (IaC) templates and container images from a
    single platform, ensuring that any vulnerabilities, secrets,
    misconfigurations, and malware are detected early in the development
    process.
    
    Explore


 8. API SECURITY
    
    Identify, prioritize, and address API misconfigurations and security risks
    across multi-cloud environments–view a complete and continuously updated
    inventory of managed and unmanaged APIs, actionable data on API
    misconfigurations and vulnerabilities, and alerts on potentially risky API
    drift and changes.
    
    Explore


 9. VULNERABILITY AND PATCH MANAGEMENT
    
    Manage vulnerabilities and prioritize risks. Understand operating system,
    package, and other vulnerability issues across Linux and Windows VMs,
    container images, and serverless functions.
    
    Explore

location

North America

industry

Insurance

cloud environment

AWS, GCP, Azure



“Anything that impacts development is going to be met with resistance. But with
Orca SideScanning there is zero impact on systems. It’s also easy to use.”

Jonathan JaffeCISO
Lemonade

Read the case study
location

Global

industry

Financial Services

cloud environment

AWS



“Orca is huge for helping us work with DevOps. My sys admin can now show and
explain to DevOps what we’ve found. We’re now more collaborative and helpful to
them. It’s a big step toward DevSecOps—the organizational friction between
DevOps and my security team is gone.”

Nir RothenbergChief Information Security Officer
Rapyd

Read the case study
location

North America

industry

Insurance

cloud environment

AWS, GCP, Azure



“Anything that impacts development is going to be met with resistance. But with
Orca SideScanning there is zero impact on systems. It’s also easy to use.”

Jonathan JaffeCISO
Lemonade

Read the case study
location

Global

industry

Financial Services

cloud environment

AWS



“Orca is huge for helping us work with DevOps. My sys admin can now show and
explain to DevOps what we’ve found. We’re now more collaborative and helpful to
them. It’s a big step toward DevSecOps—the organizational friction between
DevOps and my security team is gone.”

Nir RothenbergChief Information Security Officer
Rapyd

Read the case study
location

North America

industry

Insurance

cloud environment

AWS, GCP, Azure



“Anything that impacts development is going to be met with resistance. But with
Orca SideScanning there is zero impact on systems. It’s also easy to use.”

Jonathan JaffeCISO
Lemonade

Read the case study



 * PLATFORM
   
   
   * CLOUD SECURITY PLATFORM
     
     * Platform
     * SideScanning™ Technology
     * Context-Aware Security
     * Built-in Compliance
     * Automation & Customization
   
   
   * TECHNOLOGY ECOSYSTEM
     
     * Amazon Web Services
     * Microsoft Azure
     * Google Cloud Platform


 * SOLUTIONS
   
   
   * BY SOLUTION
     
     * Malware Detection
     * Vulnerability Management
     * Sensitive Data Detection
     * Container and Kubernetes Security
     * Multi-Cloud Compliance and Security
     * Cloud Security Posture Management (CSPM)
     * CIEM
     * Cloud Workload Protection Platform (CWPP)
     * Cloud Detection and Response (CDR)
     * Shift Left Security
     * API Security
   
   
   * BY INDUSTRY
     
     * Financial Services
     * Technology Services
     * Media & Entertainment
     * Healthcare
     * Retail


 * RESOURCES
   
   * * Library
     * Product Info
     * Podcast
     * Case Studies
     * Cloud Risk Encyclopedia
     * Blog
     * Events
   
   
   * COMPARISONS
     
     * Cloud Security Posture Managers (CSPM)
     * Prisma Cloud Security 2021
     * Prisma Cloud Security 2022
     * Qualys Cloud Agent
     * Twistlock Container Security
     * Redlock Palo Alto
     * Rapid7 InsightVM
     * Check Point CloudGuard Dome9


 * COMPANY
   
   * * About
     * Partners
     * Reviews
     * Orca Research Pod
     * Careers
     * Newsroom
     * Media Kit
     * FAQs
   * Contact
     * Support
     * Login


 * STAY IN TOUCH
   
   Get cloud security insights
   and the latest Orca news
   
   
   * 
   * 
   * 

--------------------------------------------------------------------------------

©2022 Orca Security. All rights reserved.

 * Privacy Policy
 * Terms of Use

 * 
 * 
 * 
 * 


word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1

COOKIES & PRIVACY

We use cookies to personalize your experience. More information

SELECT COOKIES TO ACCEPT

 * Necessary
 * Site Preferences
 * Analytics
 * Marketing

Accept CookiesCustomise Cookies