+
Visit Website

About

Cloud security best practices as a service. CloudSploit is the leading open source security configuration monitoring tool for cloud infrastructure. Cloud security experts from around the world collaborate to create a repository of tests for cloud infrastructure such as AWS, Azure, GitHub, and Oracle Cloud.

About

Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment. Instead of layering multiple siloed tools together or deploying cumbersome agents, Orca combines two revolutionary approaches - SideScanning, that enables frictionless and complete coverage without the need to maintain agents, and the Unified Data Model, that allows centralized contextual analysis of your entire cloud estate. Together, Orca has created the most comprehensive cloud security platform available on the marketplace.

About

Cloud, container, and Kubernetes security that closes the loop from source to run. Find and prioritize vulnerabilities; detect and respond to threats and anomalies; and manage configurations, permissions, and compliance. See all activity across clouds, containers, and hosts. Use runtime intelligence to prioritize security alerts and remove guesswork. Shorten time to resolution using guided remediation through a simple pull request at the source. See any activity within any app or service by any user across clouds, containers, and hosts. Reduce vulnerability noise by up to 95% using runtime context with Risk Spotlight. Prioritize fixes that remediate the greatest number of security violations using ToDo. Map misconfigurations and excessive permissions in production to infrastructure as code (IaC) manifest. Save time with a guided remediation workflow that opens a pull request directly at the source.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

AWS users or administrators interested in security

Audience

Enterprise organizations and cloud companies

Audience

IT teams and IT security professionals

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Pricing

$7.17/month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 5.0 / 5

Reviews/Ratings

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CloudSploit
Founded: 2015
United States
cloudsploit.com

Company Information

Orca Security
Founded: 2019
United States
orca.security/

Company Information

Sysdig
Founded: 2013
United States
sysdig.com/products/secure/

Alternatives

Alternatives

Alternatives

Lacework

Lacework

Fortinet
EagleEye

EagleEye

Cloudnosys
Aqua

Aqua

Aqua Security
Runecast

Runecast

Runecast Solutions
CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike

Categories

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Management Features

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

Amazon Web Services (AWS)
Azure Marketplace
Chainguard
Chronicle SOAR
D2iQ
Enso
JupiterOne
Kubernetes
Microsoft Azure
Observe
Opsera
Opus Security
Ozone
Seemplicity
ServiceNow
Silk Security
Squadcast
Stream Security
Sumo Logic
Zenduty

Integrations

Amazon Web Services (AWS)
Azure Marketplace
Chainguard
Chronicle SOAR
D2iQ
Enso
JupiterOne
Kubernetes
Microsoft Azure
Observe
Opsera
Opus Security
Ozone
Seemplicity
ServiceNow
Silk Security
Squadcast
Stream Security
Sumo Logic
Zenduty

Integrations

Amazon Web Services (AWS)
Azure Marketplace
Chainguard
Chronicle SOAR
D2iQ
Enso
JupiterOne
Kubernetes
Microsoft Azure
Observe
Opsera
Opus Security
Ozone
Seemplicity
ServiceNow
Silk Security
Squadcast
Stream Security
Sumo Logic
Zenduty
Claim CloudSploit and update features and information
Claim CloudSploit and update features and information
Claim Sysdig Secure and update features and information
Claim Sysdig Secure and update features and information