We changed our name from IT Central Station: Here's why

Orca Security vs Wiz comparison

You must select at least 2 products to compare!
Orca Security Logo
1,631 views|1,295 comparisons
Wiz Logo
1,822 views|1,510 comparisons
Featured Review
Find out what your peers are saying about Palo Alto Networks, Microsoft, Check Point and others in Cloud Workload Security. Updated: January 2022.
563,208 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
  • "The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
  • "It is the cost of the visibility that you get. When you really sit down and think about what do you need to do to secure an environment with a low impact on the business, and you take a look out into the world, I think this tool is well justified around cost."
  • "While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
  • "The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
  • "Overall, the pricing is reasonable and the discounts have been acceptable."
  • "I think their pricing model is aligned with market demand. Of course, Orca could probably better align their pricing model with the needs of smaller businesses as well as some larger-scale enterprises with millions of assets. But in all fairness, I think the Orca sales team has been accommodating and ensured that we're happy with the pricing."
  • More Orca Security Pricing and Cost Advice →

    Information Not Available
    Use our free recommendation engine to learn which Cloud Workload Security solutions are best for your needs.
    563,208 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: 
    The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments.
    Top Answer: 
    In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties. I would like to see support for FedRAMP… more »
    Top Answer: 
    We manufacture cloud solutions and we employ Orca Security to monitor them.
    Ask a question

    Earn 20 points

    Average Words per Review
    Average Words per Review
    Learn More
    Video Not Available

    Orca Security, the cloud security innovation leader, provides instant-on security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents or sidecars.

    Give your team superpowers and simplify cloud security operations with a single CNAPP platform for workload and data protection, cloud security posture management, vulnerability management, and compliance management. Instead of disparate tools operating in silos, Orca Security builds a graph that encompasses all cloud assets, software, connectivity, and trust - then prioritizes risk based on the severity of the underlying security issue, its accessibility, and business impact. This eliminates thousands of meaningless security alerts and helps you focus on what matters most.

    With Orca Security, no code runs within your cloud environment. Orca SideScanning™ reads your cloud configuration and workloads’ runtime block storage out-of-band, detecting vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and unsecured PII. There are no overlooked assets, no DevOps headaches, and no performance hits on live environments.

    The Cloud Security Platform.
    The first cloud visibility solution for enterprise security:
    A 360° view of security risks across clouds, containers and workloads.
    No agents. No sidecars.

    Learn more about Orca Security
    Learn more about Wiz
    Sample Customers
    Autodesk, BeyondTrust, Carta, Databricks, Druva, Duolingo, Fiverr, Live Oak Bank, News Corp, NCR, Payoneer, Robinhood, Unity, and USA Today.
    Information Not Available
    Top Industries
    Computer Software Company27%
    Comms Service Provider25%
    Financial Services Firm11%
    Manufacturing Company5%
    Computer Software Company25%
    Comms Service Provider22%
    Financial Services Firm12%
    Manufacturing Company5%
    Company Size
    Small Business38%
    Midsize Enterprise63%
    No Data Available
    Find out what your peers are saying about Palo Alto Networks, Microsoft, Check Point and others in Cloud Workload Security. Updated: January 2022.
    563,208 professionals have used our research since 2012.

    Orca Security is ranked 7th in Cloud Workload Security with 8 reviews while Wiz is ranked 17th in Cloud Workload Security. Orca Security is rated 9.6, while Wiz is rated 0.0. The top reviewer of Orca Security writes "Agentless approach makes it simple, reducing the number of tools we use, while rankings helps focus our engineers". On the other hand, Orca Security is most compared with Prisma Cloud by Palo Alto Networks, Lacework, Salt Security API Protection Platform, Tenable.io Vulnerability Management and Rapid7 InsightVM, whereas Wiz is most compared with Prisma Cloud by Palo Alto Networks, Lacework, Microsoft Defender for Cloud, Aqua Security and Sysdig Secure.

    See our list of best Cloud Workload Security vendors and best Cloud Security Posture Management (CSPM) vendors.

    We monitor all Cloud Workload Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.