We performed a comparison between Illumio Zero Trust Segmentation and Orca Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Illumio Zero Trust Segmentation provides advanced monitoring capabilities, automated policy writing, and visibility into application communication. Orca Security is a cloud-based solution that excels at risk prioritization container security. Illumio Zero Trust Segmentation could improve by supporting a wider range of operating systems. There is a need for better data security and improved effectiveness in on-premise environments. Orca Security can offer better intrusion detection, data center compatibility, and integration with non-standard ticketing systems.
Service and Support: Some users were happy with the Illumio team's quick responses and round-the-clock help. However, some said answers were unhelpful and reported slow responses. Orca Security support earned high marks for their promptness, expertise, and attentiveness to customer needs. They also valued the team's commitment to enhancing their product and the convenience of a shared Slack channel for speedy issue resolution.
Ease of Deployment: Deploying Illumio Zero Trust Segmentation requires a significant amount of time, possibly up to six months, due to the complexity of applications and tasks involved. On the other hand, Orca Security offers a fast and effortless setup process that can be completed within a few minutes, eliminating the need for ongoing maintenance or agent installation.
Pricing: Illumio Zero Trust Segmentation offers one or three-year licenses, and some users say it is expensive. Orca Security's license includes all the necessary components out of the box without additional fees.
ROI: Our reviewers haven't given any feedback on Illumio Zero Trust Segmentation's ROI. Users say Orca Security has demonstrated a substantial ROI by improving security coverage and saving costs.
Comparison Results: Orca Security is favored over Illumio Zero Trust Segmentation. Users appreciate Orca's straightforward setup process, extensive visibility, and cost-effectiveness. Our users also like Orca's all-inclusive pricing model.
"The management console is the most valuable feature."
"It's helped free up staff time so that they can work on other projects."
"PingSafe has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"The cloud misconfiguration is the most valuable feature."
"Cloud Native Security offers a valuable tool called an offensive search engine."
"Cloud Native Security has helped us with our risk posture and securing our agenda. It has been tremendous in terms of supporting growth."
"The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"The product provides visibility into how the applications communicate and how the network protocols are being used."
"It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation."
"The most valuable feature of Illumio Adaptive Security Platform is monitoring. When I have no requirement from the other application, I can use the web block traffic to build."
"The flexibility of the solution is its most valuable feature."
"The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies."
"The solution is easy to use."
"The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files."
"The Explorer allows you to know the traffic between source and destination."
"Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool."
"Orca's dashboard is excellent. My team needs to be able to focus on specific areas for improvement in our cloud environment. And most recently, we've started to get good use out of sonar, the search capabilities, and the alert creation."
"The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments."
"Orca Security has updated its interface, making it more user-friendly. I find it particularly useful as it allows me to easily navigate the dashboard and prioritize actions based on severity and criticality."
"The most valuable feature of Orca Security is the automated scanning tool, user-friendliness, and ease of use."
"There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report."
"Orca's SideScanning is the biggest feature. It's the 'wow' factor... With Orca's SideScanning, they just need permissions for your account and that makes it so simple."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"The Kubernetes scanning on the Oracle Cloud needs to be improved. It's on the roadmap. AWS has this capability, but it's unavailable for Oracle Cloud."
"They can work on policies based on different compliance standards."
"There is a bit of a learning curve for new users."
"It would be really helpful if the solution improves its agent deployment process."
"There's room for improvement in the graphic explorer."
"I would like PingSafe to add real-time detection of vulnerabilities and cloud misconfigurations."
"While it is good, I think the solution's console could be improved."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial."
"The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules."
"The product’s agents don't work very well in OT environments."
"It requires a low-level re-architecting of the product."
"The interaction we've had with the support team hasn't been ideal. Technical support should be improved."
"I would like to see better data security in the product."
"Illumio Adaptive Security Platform could improve by supporting more operating systems. For example, Cisco and Apache appliances."
"The customer service is lagging a bit. It could be better."
"The presentation of the data in the dashboard is a little bit chaotic."
"I would like to see better customization options for security frameworks and better integration with reporting tools like Power BI or Grafana dashboards."
"I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click."
"The solution could improve by making the dashboards more elaborative and more descriptive."
"I would like to see an option to do security checks on a code level. This is possible because they have access to all of the code running in the cloud provider, and combining their site-scanning solution with that would be a nice add-on."
"We are PCI DSS compliant, so we need to scan our environment externally with tools vetted by the PCI DSS organization. Orca doesn't scan the environment externally. It only scans what's currently in the cloud."
"They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it."
"As with all software, the user interface can always be made simpler to use. It would be helpful for people with very little knowledge, like somebody sitting behind the SOC, to allow them to be able to drill down into things a little bit easier than it is currently."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
Illumio is ranked 14th in Cloud Workload Protection Platforms (CWPP) with 8 reviews while Orca Security is ranked 12th in Cloud Workload Protection Platforms (CWPP) with 15 reviews. Illumio is rated 8.0, while Orca Security is rated 9.4. The top reviewer of Illumio writes "Pprevents attackers or threats from spreading or moving laterally". On the other hand, the top reviewer of Orca Security writes "Allows agentless data collection directly from the cloud". Illumio is most compared with Akamai Guardicore Segmentation, VMware NSX, Cisco Secure Workload, Zscaler Internet Access and Zero Networks Microsegmentation, whereas Orca Security is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud, CrowdStrike Falcon Cloud Security and XM Cyber. See our Illumio vs. Orca Security report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.