We performed a comparison between CrowdStrike Falcon Cloud Security and Orca Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: CrowdStrike Falcon Cloud Security was lauded for its strong adherence to security best practices. It particularly excels in endpoint protection and its ability to leverage machine learning and AI. Orca Security provides comprehensive cloud insights with its patented SideScanning feature. Users like how it prioritizes vulnerabilities and risks. CrowdStrike Falcon Cloud Security could improve its Kubernetes and GCP support. Orca Security could improve intrusion detection and data center compatibility. Reviewers also want to improve integration with non-standard ticketing systems.
Service and Support: CrowdStrike Falcon Cloud Security users are generally content with the support team's assistance and promptness. Orca Security's customer service has been commended for being prompt, skilled, and attentive to customers' needs.
Ease of Deployment: The setup for CrowdStrike Falcon Cloud Security was deemed easy, but some users struggled with the Kubernetes implementation. Orca Security offers a quick and uncomplicated initial setup, requiring just a few minutes and no ongoing maintenance.
Pricing: Users consider the pricing of CrowdStrike Falcon Cloud Security to be fair, but it may be pricier than on-premises alternatives. Some have suggested that Orca Security's price could be lower, but others say the cost is justified because of the visibility and security it offers.
ROI: Users have provided limited feedback about the return on investment for CrowdStrike Falcon Cloud Security. Orca Security is a holistic security solution that results in significant cost savings. It offers immediate results and does not require much training.
"The most valuable features of PingSafe are the asset inventory and issue indexing."
"Cloud Native Security offers a valuable tool called an offensive search engine."
"The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"The visibility is the best part of the solution."
"Cloud Native Security is user-friendly. Everything in the Cloud Native Security tool is straightforward, including detections, integration, reporting, etc. They are constantly improving their UI by adding plugins and other features."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"There is a lot that it can do, but endpoint protection is the main thing about it. The fact that it uses machine learning and artificial intelligence to monitor and remediate the issues in real-time is probably the bread and butter of the product."
"Cloud security is one valuable feature. Spotlight is the other one. There is also vulnerability management and a couple of more features."
"Cloud security posture management (CSPM) is most valuable."
"CrowdStrike utilizes signatureless technology, eliminating the need for regular signature updates on endpoint systems."
"The most significant benefit is how quickly malware and other malicious attacks are detected."
"The most valuable feature of Falcon Cloud Security is its comprehensive threat-hunting ability."
"The RTR feature stands out as particularly valuable to me due to its capability to log into machines."
"It is fully cloud-based, so we don't need to invest in third-party agents repeatedly."
"Orca's dashboard is excellent. My team needs to be able to focus on specific areas for improvement in our cloud environment. And most recently, we've started to get good use out of sonar, the search capabilities, and the alert creation."
"It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just scan the entire assets in the cloud."
"Orca's SideScanning is the biggest feature. It's the 'wow' factor... With Orca's SideScanning, they just need permissions for your account and that makes it so simple."
"Orca provides X-ray vision into everything within the cloud properties, whereas normally, this would require multiple tools."
"The initial setup is very easy."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments."
"Orca Security has patented technologies. It's an agentless solution, so you don't need to install an agent. Instead, it contacts your account provider and fetches metadata, eliminating the need for snapshots or reserved space to copy client infrastructure."
"Customized queries should be made easier to improve PingSafe."
"The integration with Oracle has room for improvement."
"One area for improvement could be the internal analysis process, specifically the guidance provided for remediation."
"SentinelOne currently lacks a break glass account feature, which is critical for implementing Single Sign-On."
"I want PingSafe to integrate additional third-party resources. For example, PingSafe is compatible with Azure and AWS, but Azure AD isn't integrated with AWS. If PingSafe had that ability, it would enrich the data because how users interact with our AWS environment is crucial. All the identity-related features require improvement."
"We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks."
"The alerting system of the product is an area that I look at and sometimes get confused about. I feel the alerting feature needs improvement."
"We don't get any notifications from PingSafe when the clusters are down."
"CrowdStrike Falcon Cloud Security is expensive."
"There should be cloud storage scanning. We would like to have cloud storage vulnerability and threat management on any cloud storage."
"The CrowdStrike dashboard currently lacks a username field."
"It would be more convenient if there was an easier way to install CrowdStrike, perhaps through better integration with Active Directory."
"The threat intelligence and user behavioral analysis could be more comprehensive."
"The only challenge lies in token verification."
"The only suggestion for improvement would be the pricing."
"One area for improvement in Falcon Cloud Security is the support portal."
"It's not all clouds that they are currently onboarded with. For instance, they are not yet with public cloud and many other private clouds."
"The interface can be a bit cranky and sometimes takes a lot of time to load."
"There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. But relative to my other security tools, Orca is definitely the most stable that I've seen."
"The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see."
"I would be happy if they offered more automatic remediation options. They're working on that, but the more the better. For example, if they want you to harden a server, they would offer a hardening script that would be more aware of what's going on."
"Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance."
"The solution could improve by making the dashboards more elaborative and more descriptive."
"They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More CrowdStrike Falcon Cloud Security Pricing and Cost Advice →
CrowdStrike Falcon Cloud Security is ranked 8th in Cloud Security Posture Management (CSPM) with 15 reviews while Orca Security is ranked 9th in Cloud Security Posture Management (CSPM) with 15 reviews. CrowdStrike Falcon Cloud Security is rated 8.6, while Orca Security is rated 9.4. The top reviewer of CrowdStrike Falcon Cloud Security writes "Enhances the overall safety of our company's environment from cyber threats". On the other hand, the top reviewer of Orca Security writes "Allows agentless data collection directly from the cloud". CrowdStrike Falcon Cloud Security is most compared with Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Wiz, Qualys VMDR and Red Hat Advanced Cluster Security for Kubernetes, whereas Orca Security is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud, Tenable Vulnerability Management and Qualys VMDR. See our CrowdStrike Falcon Cloud Security vs. Orca Security report.
See our list of best Cloud Security Posture Management (CSPM) vendors, best Container Security vendors, and best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.