We performed a comparison between CrowdStrike Falcon Cloud Security and Orca Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: CrowdStrike Falcon Cloud Security was lauded for its strong adherence to security best practices. It particularly excels in endpoint protection and its ability to leverage machine learning and AI. Orca Security provides comprehensive cloud insights with its patented SideScanning feature. Users like how it prioritizes vulnerabilities and risks. CrowdStrike Falcon Cloud Security could improve its Kubernetes and GCP support. Orca Security could improve intrusion detection and data center compatibility. Reviewers also want to improve integration with non-standard ticketing systems.
Service and Support: CrowdStrike Falcon Cloud Security users are generally content with the support team's assistance and promptness. Orca Security's customer service has been commended for being prompt, skilled, and attentive to customers' needs.
Ease of Deployment: The setup for CrowdStrike Falcon Cloud Security was deemed easy, but some users struggled with the Kubernetes implementation. Orca Security offers a quick and uncomplicated initial setup, requiring just a few minutes and no ongoing maintenance.
Pricing: Users consider the pricing of CrowdStrike Falcon Cloud Security to be fair, but it may be pricier than on-premises alternatives. Some have suggested that Orca Security's price could be lower, but others say the cost is justified because of the visibility and security it offers.
ROI: Users have provided limited feedback about the return on investment for CrowdStrike Falcon Cloud Security. Orca Security is a holistic security solution that results in significant cost savings. It offers immediate results and does not require much training.
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"We really appreciate the Slack integration. When we have an incident, we get an instant notification. We also use Joe Sandbox, which Singularity can integrate with, so we can verify if a threat is legitimate."
"All the features we use are equal and get the job done."
"We noted immediate benefits from using the solution."
"The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well."
"The solution's most valuable features are its ability to detect vulnerabilities inside AWS resources and its ability to rescan after a specific duration set by the administrator."
"With PingSafe, it's easy to onboard new accounts."
"Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks."
"Cloud security is one valuable feature. Spotlight is the other one. There is also vulnerability management and a couple of more features."
"It is fully cloud-based, so we don't need to invest in third-party agents repeatedly."
"CrowdStrike utilizes signatureless technology, eliminating the need for regular signature updates on endpoint systems."
"The initial setup is easy ."
"The immediate mitigation of potential threats and instant alerts are valuable."
"The RTR feature stands out as particularly valuable to me due to its capability to log into machines."
"It's easy to gather insights and conduct analysis about existing threats."
"The most valuable feature of Falcon Cloud Security is its comprehensive threat-hunting ability."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"Orca Security has patented technologies. It's an agentless solution, so you don't need to install an agent. Instead, it contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure."
"The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments."
"Orca provides X-ray vision into everything within the cloud properties, whereas normally, this would require multiple tools."
"Orca's SideScanning is the biggest feature. It's the 'wow' factor... With Orca's SideScanning, they just need permissions for your account and that makes it so simple."
"The reporting and automated remediation capabilities are valuable to me. They're real game-changers."
"Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool."
"Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks... You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca."
"There should be more documentation about the product."
"We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks."
"I would like additional integrations."
"The recommended actions aren't always specific, so it might suggest recommendations that don't apply to the particular infrastructure code I'm reviewing."
"Bugs need to be disclosed quickly."
"I want PingSafe to integrate additional third-party resources. For example, PingSafe is compatible with Azure and AWS, but Azure AD isn't integrated with AWS. If PingSafe had that ability, it would enrich the data because how users interact with our AWS environment is crucial. All the identity-related features require improvement."
"The Kubernetes scanning on the Oracle Cloud needs to be improved. It's on the roadmap. AWS has this capability, but it's unavailable for Oracle Cloud."
"PingSafe takes four to five hours to detect and highlight an issue, and that time should be reduced."
"The only challenge lies in token verification."
"Incorporating threat intelligence into the system would be a valuable addition."
"CrowdStrike Falcon Cloud Security is expensive."
"The log scale or Humio side of it where it collects the data and expands into the XDR world still needs time to develop in terms of the way it combines the data and metadata that flows into the platform. I know they're working on it."
"One area for improvement in Falcon Cloud Security is the support portal."
"The CrowdStrike dashboard currently lacks a username field."
"The UI part needs to be improved."
"There should be cloud storage scanning. We would like to have cloud storage vulnerability and threat management on any cloud storage."
"Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance."
"The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see."
"The interface can be a bit cranky and sometimes takes a lot of time to load."
"In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties."
"There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. But relative to my other security tools, Orca is definitely the most stable that I've seen."
"I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click."
"They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it."
"I would like to see better customization options for security frameworks and better integration with reporting tools like Power BI or Grafana dashboards."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More CrowdStrike Falcon Cloud Security Pricing and Cost Advice →
CrowdStrike Falcon Cloud Security is ranked 7th in Cloud Security Posture Management (CSPM) with 13 reviews while Orca Security is ranked 8th in Cloud Security Posture Management (CSPM) with 15 reviews. CrowdStrike Falcon Cloud Security is rated 8.8, while Orca Security is rated 9.4. The top reviewer of CrowdStrike Falcon Cloud Security writes "Enhances the overall safety of our company's environment from cyber threats". On the other hand, the top reviewer of Orca Security writes "Allows agentless data collection directly from the cloud". CrowdStrike Falcon Cloud Security is most compared with Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Wiz, Qualys VMDR and Azure Kubernetes Service (AKS), whereas Orca Security is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud, Tenable Vulnerability Management and Qualys VMDR. See our CrowdStrike Falcon Cloud Security vs. Orca Security report.
See our list of best Cloud Security Posture Management (CSPM) vendors, best Container Security vendors, and best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.