We performed a comparison between Check Point CloudGuard Posture Management and Orca Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Orca Security is strong in container security and has an easy-to-use compliance dashboard. Check Point CloudGuard Posture Management provides comprehensive 360 security and detailed reports and recommendations for errors. Orca Security could increase its coverage and provide code-level security checks, while also improving its collaboration with third-party vendors. Meanwhile, Check Point CloudGuard Posture Management should enhance its reporting options, lower its price, and enhance its ability to investigate security events.
Service and Support: Orca Security's customer service receives positive feedback for their efficient and knowledgeable technical support staff, fast response times, and openness to receive feedback. In comparison, Check Point CloudGuard Posture Management has a mixed reputation, with some satisfied customers and others expressing dissatisfaction with technical support.
Ease of Deployment: Orca Security's initial setup is user-friendly, agentless, efficient, and requires minimal maintenance compared to Check Point CloudGuard Posture Management. While Check Point's setup is generally simple, it may require professional deployment and team collaboration.
Pricing: Orca Security has a straightforward and reasonable pricing system for setup costs, which includes all standard licensing fees and does not require any additional expenses for networking or computing. In comparison, Check Point CloudGuard Posture Management has a variable pricing and licensing system that is viewed differently by different users. While some consider the setup cost to be manageable and simple, others find it costly. CloudGuard's licensing model is based on the cloud infrastructure's size, which is seen by some as rigid and expensive.
ROI: Orca Security saves users money by replacing multiple solutions and offering a deep view into the environment with minimal IT knowledge required. On the other hand, Check Point CloudGuard Posture Management is priced higher but offers security and compliance solutions that can result in a 35% ROI growth rate.
Comparison Results: Orca Security is a preferred option over Check Point CloudGuard Posture Management due to its agentless approach, user-friendly interface, and competitive pricing. Its SideScanning feature is particularly impressive, providing excellent visibility into cloud environments. On the other hand, Check Point CloudGuard Posture Management has received mixed reviews regarding its customer service and support, and its pricing is considered expensive by some users.
"I did a lot of research before signing up and doing the demo. They have a good reputation as far as catching threats early on."
"The visibility is the best part of the solution."
"Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful."
"Cloud Native Security is user-friendly. Everything in the Cloud Native Security tool is straightforward, including detections, integration, reporting, etc. They are constantly improving their UI by adding plugins and other features."
"Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"The UI is responsive and user-friendly."
"The user interface is well-designed and easy to navigate."
"It provides critical insights that enable the IT team to plan and launch smart investigations when there are security breaches."
"It is easy to administer and easy to deploy. It has automated or pre-configured templates, security features, and proactive threat detection."
"We have more visibility than ever before, appreciating the valuable and proactive insight that we receive from the platform."
"The most valuable feature is the separate environment."
"We really liked its ease of implementation against our Microsoft Azure environment."
"Dome9 continues to be a major piece of our cloud security architecture and has given our senior leadership team a high degree of confidence in our ability to protect our cloud environment."
"On Dome9, you can have reports on compliance, users created, and EAM access to the cloud infrastructure. For example, if some machine is exposed to the Internet, importing and exporting to the Internet when it shouldn't, we get immediate alerts if someone does this type of configuration by mistake. Dome9 is very important because AWS doesn't protect us for this. It is the client's responsibility to make sure that we don't export things to the Internet. This solution helps us ensure that we comply with our security measures."
"The solution has intelligence that integrates with a range of threat intelligence feeds, including Check Point's ThreatCloud, to provide real-time intelligence on emerging threats."
"Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool."
"Orca provides X-ray vision into everything within the cloud properties, whereas normally, this would require multiple tools."
"Orca's dashboard is excellent. My team needs to be able to focus on specific areas for improvement in our cloud environment. And most recently, we've started to get good use out of sonar, the search capabilities, and the alert creation."
"The reporting and automated remediation capabilities are valuable to me. They're real game-changers."
"The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments."
"Orca Security has patented technologies. It's an agentless solution, so you don't need to install an agent. Instead, it contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure."
"It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just scan the entire assets in the cloud."
"Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks... You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca."
"One of the issues with the product stems from the fact that it clubs different resources under one ticket."
"They can work on policies based on different compliance standards."
"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"PingSafe is an excellent CSPM tool, but the CWPP features need to improve, and there is a scope for more application security posture management features. There aren't many ASPM solutions on the market, and existing ones are costly. I would like to see PingSafe develop into a single pane of glass for ASPM, CSPM, and CWPP. Another feature I'd like to see is runtime protection."
"They need more experienced support personnel."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"If I had to pick a complaint, it would be the way the hosts are listed in the tool. You have different columns separated by endpoint name, Cloud Account, and Cloud Instances ID. I wish there was something where we could change the endpoint name and not use just the IP address. We would like to have custom names or our own names for the instances. If I had a complaint, that would be it, but so far, it meets all the needs that we have."
"They could generally give us better comprehensive rules."
"We have concerns regarding the pricing and would appreciate seeing some improvements."
"Especially with cloud security, there's too much clutter on the screen and too many things going on."
"Streamlining the user interface would greatly improve the user experience."
"It should capture more information in metadata including communication detail. Also, Internal IP addresses should not be tracked as this might be having some compliance issues."
"The guidelines to implement or to link with the clouds are not complete."
"The reporting has a lot of opportunities to continuously improve so that we can continue to show value."
"The false positives can be annoying at times."
"The integration process could be enhanced by enabling integration at the organizational level rather than requiring the manual setup of individual accounts."
"It's not all clouds that they are currently onboarded with. For instance, they are not yet with public cloud and many other private clouds."
"The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see."
"The presentation of the data in the dashboard is a little bit chaotic."
"They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it."
"As with all software, the user interface can always be made simpler to use. It would be helpful for people with very little knowledge, like somebody sitting behind the SOC, to allow them to be able to drill down into things a little bit easier than it is currently."
"The solution could improve by making the dashboards more elaborative and more descriptive."
"There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. But relative to my other security tools, Orca is definitely the most stable that I've seen."
"In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
Check Point CloudGuard CNAPP is ranked 4th in Cloud Security Posture Management (CSPM) with 64 reviews while Orca Security is ranked 9th in Cloud Security Posture Management (CSPM) with 15 reviews. Check Point CloudGuard CNAPP is rated 8.6, while Orca Security is rated 9.4. The top reviewer of Check Point CloudGuard CNAPP writes "Threat intel integration provides us visibility in case any workload is communicating with suspicious or blacklisted IPs". On the other hand, the top reviewer of Orca Security writes "Allows agentless data collection directly from the cloud". Check Point CloudGuard CNAPP is most compared with Prisma Cloud by Palo Alto Networks, Wiz, AWS GuardDuty, Microsoft Defender for Cloud and Sysdig Secure, whereas Orca Security is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud, CrowdStrike Falcon Cloud Security and Trend Vision One - Cloud Security. See our Check Point CloudGuard CNAPP vs. Orca Security report.
See our list of best Cloud Security Posture Management (CSPM) vendors, best Vulnerability Management vendors, and best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.