Orca Security Logo

Orca Security

0
Commercial
Visit Website

Orca Security is a cloud-native application protection platform (CNAPP) that provides comprehensive security coverage for multi-cloud environments. The platform utilizes SideScanning technology for agentless cloud security monitoring across various cloud service providers including AWS, Azure, and Google Cloud. Core functionalities include: - Cloud Security Posture Management (CSPM) for misconfiguration detection - Cloud Workload Protection Platform (CWPP) for VM, container, and serverless security - Cloud Infrastructure Entitlement Management (CIEM) for identity risk management - Data Security Posture Management (DSPM) for sensitive data protection - API security monitoring and drift detection - Vulnerability management across cloud workloads - Compliance monitoring for regulatory standards The platform integrates security capabilities including: - Runtime visibility through eBPF-based sensors - Container and Kubernetes security monitoring - Application security testing across the development lifecycle - AI model risk assessment and compliance verification - Multi-cloud compliance framework checking - Cloud detection and response (CDR) capabilities Technical features: - Agentless scanning architecture - Integration with major cloud providers - Unified data model for risk correlation - Automated remediation capabilities - IaC security scanning - API-based integration options

FEATURES

ALTERNATIVES

Centrally Manage Cloud Firewall Rules with AWS Firewall Manager

Comprehensive suite of tools and resources by Microsoft Azure for ensuring security and protection of data and applications in the cloud.

A free training course and lab environment for learning to test and attack cloud infrastructure, including AWS and Azure.

Cloud runtime security platform that uses eBPF technology to monitor cloud infrastructure, detect anomalies, and identify potential security threats in real-time.

Commercial

Azure Guardrails enables rapid enforcement of cloud security guardrails by generating Terraform files for Azure Policy Initiatives.

Automated script for creating a vulnerable Azure cloud lab to train offensive security skills.

A tool that determines what AWS API calls are logged by CloudTrail and what they are logged as, and can also be used as an attack simulation framework.

A tool to fetch all public IP addresses associated with an AWS account