We performed a comparison between Orca Security and AWS GuardDuty based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Orca Security offers comprehensive cloud visibility and simplified insights through its patented agentless SideScanning technology. Users like its container security, compliance dashboard, and non-intrusive vulnerability management. AWS GuardDuty stands out for its single pane of glass data collection and the ability to monitor AWS accounts at no additional cost. Orca Security could enhance its intrusion detection, data center compatibility, and integration with non-standard ticketing systems. AWS GuardDuty would benefit from a mobile version and stronger dashboard analytics.
Service and Support: Users praised Orca Security's customer service for their prompt assistance and proactive approach to meeting customer requirements. Users value the team's commitment to enhancing their product. Reviewers also spoke highly of AWS technical support, but some users reported occasional delays when reaching out via phone.
Ease of Deployment: The initial setup of Orca Security is quick and uncomplicated, requiring minimal effort and no ongoing maintenance. AWS GuardDuty is also relatively simple and efficient to set up, although it may vary in complexity based on the architecture and integrations involved.
Pricing: Some Orca Security users find it expensive compared to alternatives like Wiz. At the same time, many think the cost is justified due to the level of visibility and security it offers. AWS GuardDuty offers a competitive pay-go license without any extra charges.
ROI: Orca Security offers an all-inclusive security solution that saves users money and allows them to consolidate tools. It delivers instant results, and minimal training is required. Additionally, Orca Security constantly introduces new features without additional charges. In contrast, AWS GuardDuty enhances an organization's overall security posture, resulting in improved customer trust and potential business prospects.
Comparison Results: Orca Security is favored over AWS GuardDuty. Users appreciate the visibility Orca Security offers and find it easy to gain insight into their environment. Orca Security effectively ranks vulnerabilities and risks and excels in container security. Users complained about AWS GuardDuty's lack of dashboard analytics and mobile app.
"The UI is responsive and user-friendly."
"When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
"We use the infrastructure as code scanning, which is good."
"We really appreciate the Slack integration. When we have an incident, we get an instant notification. We also use Joe Sandbox, which Singularity can integrate with, so we can verify if a threat is legitimate."
"It's helped free up staff time so that they can work on other projects."
"The solution helped free other staff to work on other projects or other tasks. We basically just had to do a bunch of upfront configuring. With it, we do not have to spend as much time in the console."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"The solution's most valuable features are its ability to detect vulnerabilities inside AWS resources and its ability to rescan after a specific duration set by the administrator."
"The way it monitors accounts is definitely a very important feature."
"With anomaly detection, active threat monitoring, and set correlation, GuardDuty alerts me to any unusual user behavior or traffic patterns right away, which is great for staying on top of potential security risks."
"AWS GuardDuty helps by providing continuous threat detection and signaling potential threats. Its most valuable feature is continuous monitoring. The tool's integration with other AWS services has improved security. It provides continuous monitoring and intelligent threat detection, quickly signaling any issues. I would rate this improvement a seven out of ten."
"The most valuable features are the single system for data collection and the alert mechanisms."
"The out-of-band malware detection from the EBS volumes. It's really cool. No agents or anything needed, it automatically finds and correlates based on malware."
"We use the tool for threat detection. AWS includes AI features as well. AWS GuardDuty gives us reports."
"Deployment is great, and we didn't face any big challenges."
"It helps us detect brute-force attacks based on machine learning."
"The reporting and automated remediation capabilities are valuable to me. They're real game-changers."
"Orca Security has updated its interface, making it more user-friendly. I find it particularly useful as it allows me to easily navigate the dashboard and prioritize actions based on severity and criticality."
"There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report."
"Orca's SideScanning is the biggest feature. It's the 'wow' factor... With Orca's SideScanning, they just need permissions for your account and that makes it so simple."
"The most valuable feature of Orca Security is the automated scanning tool, user-friendliness, and ease of use."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"Orca provides X-ray vision into everything within the cloud properties, whereas normally, this would require multiple tools."
"Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks... You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca."
"here is a bit of a learning curve. However, you only need two to three days to identify options and get accustomed."
"Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time."
"PingSafe is an excellent CSPM tool, but the CWPP features need to improve, and there is a scope for more application security posture management features. There aren't many ASPM solutions on the market, and existing ones are costly. I would like to see PingSafe develop into a single pane of glass for ASPM, CSPM, and CWPP. Another feature I'd like to see is runtime protection."
"It does not bring much threat intel from the outside world. All it does is scan. If it can also correlate things, it will be better."
"While it is good, I think the solution's console could be improved."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"I want PingSafe to integrate additional third-party resources. For example, PingSafe is compatible with Azure and AWS, but Azure AD isn't integrated with AWS. If PingSafe had that ability, it would enrich the data because how users interact with our AWS environment is crucial. All the identity-related features require improvement."
"One improvement I would suggest for AWS GuardDuty is the ability to assign findings to specific users or groups, facilitating better communication and follow-up actions."
"The product needs to improve its cost-efficiency since it is expensive."
"It would be great if the solution had some automation capabilities."
"The solution has to be integrated with new services that AWS adds like QuickSight, Managed Airflow, AppFlow and MWAA."
"There is currently no consolidated dashboard for AWS GuardDuty. It would be helpful if they could provide a dashboard based on severity levels (high, medium, low) and offer insights account-wise, especially for users utilizing automation structures."
"Cost changes. It's very expensive. If you turn on every feature, it's more than most commercial vendors. For smaller orgs, that doesn't make sense."
"Improvement-wise, Amazon GuardDuty should have an overall dashboard analytics function so we could see what's in the current environment, and then in addition to that, provide best practices and recommendations, particularly to provide some type of observability, and then figure out the login side of it, based on our current environment, in terms of what we're not monitoring and what we should monitor. The solution should also give us a sample code configuration to implement that added feature or feature request. What I'd like to see in the next release of Amazon GuardDuty are more security analytics, reporting, and monitoring. They should provide recommendations and additional options that answer questions such as "Hey, what can we see in our environment?", "What should we implement within the environment?", What's recommended?" We know that cost will always be associated with that, but Amazon GuardDuty should show us the increased costs or decreased costs if we implement it or don't implement it, and that would be a good feature request, particularly with all products within AWS, just for cloud products in general because there are times features are implemented, but once they're deployed, they don't tell you about costs that would be generated along with those features. After features are deployed, there should a summary of the costs that would be generated, and projected based on current usage, so they would give us the option to figure out how long we're going to use those features and the option to keep those on or turn those off. If more services were like that, a lot more people would use those on the cloud."
"For me, I would say just the presentation of findings, like the dashboards and other stuff, could be improved a bit."
"I would like to see better customization options for security frameworks and better integration with reporting tools like Power BI or Grafana dashboards."
"The interface can be a bit cranky and sometimes takes a lot of time to load."
"The presentation of the data in the dashboard is a little bit chaotic."
"They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it."
"The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see."
"I would be happy if they offered more automatic remediation options. They're working on that, but the more the better. For example, if they want you to harden a server, they would offer a hardening script that would be more aware of what's going on."
"I would like to see an option to do security checks on a code level. This is possible because they have access to all of the code running in the cloud provider, and combining their site-scanning solution with that would be a nice add-on."
"I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
AWS GuardDuty is ranked 4th in Cloud Workload Protection Platforms (CWPP) with 20 reviews while Orca Security is ranked 12th in Cloud Workload Protection Platforms (CWPP) with 15 reviews. AWS GuardDuty is rated 8.2, while Orca Security is rated 9.4. The top reviewer of AWS GuardDuty writes "A stellar threat-detection service that has helped bolster security against malicious threats". On the other hand, the top reviewer of Orca Security writes "Allows agentless data collection directly from the cloud". AWS GuardDuty is most compared with Microsoft Defender for Cloud, Prisma Cloud by Palo Alto Networks, CrowdStrike Falcon Cloud Security, Wiz and Threat Stack Cloud Security Platform, whereas Orca Security is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud, CrowdStrike Falcon Cloud Security and Qualys VMDR. See our AWS GuardDuty vs. Orca Security report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.