We performed a comparison between Illumio Zero Trust Segmentation and Orca Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Illumio Zero Trust Segmentation provides advanced monitoring capabilities, automated policy writing, and visibility into application communication. Orca Security is a cloud-based solution that excels at risk prioritization container security. Illumio Zero Trust Segmentation could improve by supporting a wider range of operating systems. There is a need for better data security and improved effectiveness in on-premise environments. Orca Security can offer better intrusion detection, data center compatibility, and integration with non-standard ticketing systems.
Service and Support: Some users were happy with the Illumio team's quick responses and round-the-clock help. However, some said answers were unhelpful and reported slow responses. Orca Security support earned high marks for their promptness, expertise, and attentiveness to customer needs. They also valued the team's commitment to enhancing their product and the convenience of a shared Slack channel for speedy issue resolution.
Ease of Deployment: Deploying Illumio Zero Trust Segmentation requires a significant amount of time, possibly up to six months, due to the complexity of applications and tasks involved. On the other hand, Orca Security offers a fast and effortless setup process that can be completed within a few minutes, eliminating the need for ongoing maintenance or agent installation.
Pricing: Illumio Zero Trust Segmentation offers one or three-year licenses, and some users say it is expensive. Orca Security's license includes all the necessary components out of the box without additional fees.
ROI: Our reviewers haven't given any feedback on Illumio Zero Trust Segmentation's ROI. Users say Orca Security has demonstrated a substantial ROI by improving security coverage and saving costs.
Comparison Results: Orca Security is favored over Illumio Zero Trust Segmentation. Users appreciate Orca's straightforward setup process, extensive visibility, and cost-effectiveness. Our users also like Orca's all-inclusive pricing model.
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"I like CSPM the most. It captures a lot of alerts within a short period of time. When an alert gets triggered on the cloud, it throws an alert within half an hour, which is very reasonable. It is a plus point for us."
"It is pretty easy to integrate with this platform. When properly integrated, it monitors end-to-end."
"The ease of use of the platform is very nice."
"The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."
"Cloud Native Security's most valuable features include cloud misconfiguration detection and remediation, compliance monitoring, a robust authentication security engine, and cloud threat detection and response capabilities."
"Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
"It is advantageous in terms of time-saving and cost reduction."
"The solution is easy to use."
"The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies."
"The most valuable feature of Illumio Adaptive Security Platform is monitoring. When I have no requirement from the other application, I can use the web block traffic to build."
"The Explorer allows you to know the traffic between source and destination."
"The flexibility of the solution is its most valuable feature."
"The product provides visibility into how the applications communicate and how the network protocols are being used."
"The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files."
"It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation."
"Orca's dashboard is excellent. My team needs to be able to focus on specific areas for improvement in our cloud environment. And most recently, we've started to get good use out of sonar, the search capabilities, and the alert creation."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"Orca provides X-ray vision into everything within the cloud properties, whereas normally, this would require multiple tools."
"Orca's SideScanning is the biggest feature. It's the 'wow' factor... With Orca's SideScanning, they just need permissions for your account and that makes it so simple."
"Orca's platform provides an agentless data collection facility that collects information directly from the cloud using APIs, with zero impact on performance."
"The initial setup is very easy."
"Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks... You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca."
"It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just scan the entire assets in the cloud."
"I'd like to see better onboarding documentation."
"We'd like to have better notifications. We'd like them to happen faster."
"PingSafe takes four to five hours to detect and highlight an issue, and that time should be reduced."
"The cost has the potential for improvement."
"For vulnerabilities, they are showing CVE ID. The naming convention should be better so that it indicates the container where a vulnerability is present. Currently, they are only showing CVE ID, but the same CVE ID might be present in multiple containers. We would like to have the container name so that we can easily fix the issue."
"A beneficial improvement for PingSafe would be integration with Jira, allowing for a more streamlined ticketing system."
"When we request any changes, they must be reflected in the next update."
"The recommended actions aren't always specific, so it might suggest recommendations that don't apply to the particular infrastructure code I'm reviewing."
"It requires a low-level re-architecting of the product."
"The customer service is lagging a bit. It could be better."
"Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial."
"The interaction we've had with the support team hasn't been ideal. Technical support should be improved."
"I would like to see better data security in the product."
"Illumio Adaptive Security Platform could improve by supporting more operating systems. For example, Cisco and Apache appliances."
"The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules."
"The product’s agents don't work very well in OT environments."
"I would be happy if they offered more automatic remediation options. They're working on that, but the more the better. For example, if they want you to harden a server, they would offer a hardening script that would be more aware of what's going on."
"The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see."
"The presentation of the data in the dashboard is a little bit chaotic."
"Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance."
"The solution could improve by making the dashboards more elaborative and more descriptive."
"We are PCI DSS compliant, so we need to scan our environment externally with tools vetted by the PCI DSS organization. Orca doesn't scan the environment externally. It only scans what's currently in the cloud."
"I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click."
"In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
Illumio is ranked 14th in Cloud Workload Protection Platforms (CWPP) with 8 reviews while Orca Security is ranked 12th in Cloud Workload Protection Platforms (CWPP) with 15 reviews. Illumio is rated 8.0, while Orca Security is rated 9.4. The top reviewer of Illumio writes "Pprevents attackers or threats from spreading or moving laterally". On the other hand, the top reviewer of Orca Security writes "Allows agentless data collection directly from the cloud". Illumio is most compared with Akamai Guardicore Segmentation, VMware NSX, Cisco Secure Workload, Zscaler Internet Access and Zero Networks Microsegmentation, whereas Orca Security is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud, CrowdStrike Falcon Cloud Security and XM Cyber. See our Illumio vs. Orca Security report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.