We performed a comparison between Cisco Secure Workload and Orca Security based on real PeerSpot user reviews.
Find out in this report how the two Cloud Workload Protection Platforms (CWPP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The multi-cloud support is valuable. They are expanding to different clouds. It is not restricted to only AWS. It allows us to have different clouds on one platform."
"The UI is very good."
"It is fairly simple. Anybody can use it."
"The ease of use of the platform is very nice."
"All the features we use are equal and get the job done."
"We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment."
"The most valuable feature of PingSafe is its integration with most of our technology stack, specifically all of our cloud platforms and ticketing software."
"We use the infrastructure as code scanning, which is good."
"It's stable."
"A complete and powerful micro-segmentation solution."
"Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time."
"Secure Workload's best feature is that it's an end-to-end offering from Cisco."
"Generally speaking, Cisco support is considered one of the best in the networking products and stack."
"The product offers great visibility into the network so we can enforce security measures."
"The most valuable feature of this solution is security."
"The product provides multiple-device integration."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments."
"Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool."
"Orca's SideScanning is the biggest feature. It's the 'wow' factor... With Orca's SideScanning, they just need permissions for your account and that makes it so simple."
"Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks... You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca."
"The reporting and automated remediation capabilities are valuable to me. They're real game-changers."
"Orca Security has patented technologies. It's an agentless solution, so you don't need to install an agent. Instead, it contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure."
"There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report."
"It took us a while to configure the software to work well in this type of environment, as the support documents were not always clear."
"I would like PingSafe to add real-time detection of vulnerabilities and cloud misconfigurations."
"PingSafe can be improved by developing a comprehensive set of features that allow for automated workflows."
"When we request any changes, they must be reflected in the next update."
"A beneficial improvement for PingSafe would be integration with Jira, allowing for a more streamlined ticketing system."
"There is no break-glass account feature. They should implement this as soon as possible because we can't implement SSO without a break-glass feature."
"We are experiencing problems with Cloud Native Security reporting."
"Maybe container runtime security could be improved."
"I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications."
"It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge."
"Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it."
"The product must be integrated with the cloud."
"It has an uninviting interface."
"The interface is really helpful for technical people, but it is not user-friendly."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes."
"The emailed notifications are either hard to find or they are not available. Search capabilities can be improved."
"I would be happy if they offered more automatic remediation options. They're working on that, but the more the better. For example, if they want you to harden a server, they would offer a hardening script that would be more aware of what's going on."
"Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance."
"The presentation of the data in the dashboard is a little bit chaotic."
"I would like to see better customization options for security frameworks and better integration with reporting tools like Power BI or Grafana dashboards."
"The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see."
"We are PCI DSS compliant, so we need to scan our environment externally with tools vetted by the PCI DSS organization. Orca doesn't scan the environment externally. It only scans what's currently in the cloud."
"They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it."
"The interface can be a bit cranky and sometimes takes a lot of time to load."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
Cisco Secure Workload is ranked 19th in Cloud Workload Protection Platforms (CWPP) with 13 reviews while Orca Security is ranked 12th in Cloud Workload Protection Platforms (CWPP) with 15 reviews. Cisco Secure Workload is rated 8.4, while Orca Security is rated 9.4. The top reviewer of Cisco Secure Workload writes "A solution that provides good technical support but its high cost makes it challenging for users to adopt it". On the other hand, the top reviewer of Orca Security writes "Allows agentless data collection directly from the cloud". Cisco Secure Workload is most compared with Akamai Guardicore Segmentation, Illumio, VMware NSX, Prisma Cloud by Palo Alto Networks and Cisco ACI, whereas Orca Security is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud, CrowdStrike Falcon Cloud Security and XM Cyber. See our Cisco Secure Workload vs. Orca Security report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.