Founded Year

2019

Stage

Series C - II | Alive

Total Raised

$632M

Valuation

$0000 

Last Raised

$340M | 7 mos ago

Mosaic Score

+20 points in the past 30 days

What is a Mosaic Score?
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

About Orca Security

Orca Security is a cloud visibility company. Its Orca Cloud Visibility Platform utilizes its SideScanning technology to deliver full-stack visibility into the entire cloud infrastructure and assets.

Orca Security Headquarter Location

2175 NW Raleigh St Suite 110

Portland, Oregon, 97210,

United States

Orca Security's Product Videos

ESPs containing Orca Security

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

EXECUTION STRENGTHMARKET STRENGTHLEADERHIGHFLIEROUTPERFORMERCHALLENGER
Consumer & Retail / Cybersecurity

These solutions secure cloud infrastructure (e.g., containers, microservices), control cloud access, and ensure appropriate cloud configurations and security policies.

Orca Security named as Outperformer among 10 other companies, including Netskope, Wiz, and Menlo Security.

EXECUTION STRENGTHMARKET STRENGTHLEADERHIGHFLIEROUTPERFORMERCHALLENGER
Fintech / Cybersecurity

These solutions secure containers, monitor microservices, control cloud access, and ensure appropriate cloud configurations and security policies.

Orca Security named as Outperformer among 9 other companies, including Netskope, Lacework, and Aqua Security.

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Orca Security's Products & Differentiation

See Orca Security's products and how their products differentiate from alternatives and competitors

  • Orca Cloud Security Platform

    Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes.

    Differentiation

    Rapid time to value: By reading your cloud configuration and workloads’ runtime block storage out-of-band without agents, Orca deploys in minutes - surfacing the most critical risks without the perf… 

    Multiple tools in one: As a CNAPP, Orca simplifies cloud security by replacing multiple tools with a single SaaS-based cloud security platform for workload protection (CWPP), cloud security posture … 

    Prioritize the 1% of alerts that matter: Unlike other tools that operate in silos, Orca sees the big picture and prioritizes risk based on context, eliminating wasted time sifting through meaningles… 

Research containing Orca Security

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Orca Security in 1 CB Insights research brief, most recently on Jan 20, 2021.

Expert Collections containing Orca Security

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Orca Security is included in 3 Expert Collections, including Unicorns- Billion Dollar Startups.

U

Unicorns- Billion Dollar Startups

1,112 items

C

Cybersecurity

5,059 items

C

Cyber Defenders

28 items

Our selected startups are early to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity.

Orca Security Patents

Orca Security has filed 4 patents.

The 3 most popular patent topics include:

  • Cloud computing
  • Cloud infrastructure
  • Cloud platforms
patents chart

Application Date

Grant Date

Title

Related Topics

Status

1/23/2020

Cloud computing, Cloud platforms, Computer security, Cloud infrastructure, Cyberwarfare

Application

Application Date

1/23/2020

Grant Date

Title

Related Topics

Cloud computing, Cloud platforms, Computer security, Cloud infrastructure, Cyberwarfare

Status

Application

Latest Orca Security News

New infosec products of the week: May 13, 2022

May 13, 2022

New infosec products of the week: May 13, 2022 Here’s a look at the most interesting products from the past week, featuring releases from Cohesity, ForgeRock, iDenfy, Nasuni, Orca Security, SecureAge, and Sonatype. SecureAge CatchPulse safeguards enterprises against complex security threats CatchPulse provides always-on, real-time protection to catch threats by simply blocking all unauthorised applications, processes or scripts from executing. It helps organisations stay one step ahead of unknown threats and offers a simple experience for users of all levels, from novice home users to IT professionals. Nasuni Ransomware Protection defends critical business data against ransomware attacks Nasuni announced Nasuni Ransomware Protection , a new add-on service to the latest release of the Nasuni File Data Platform that offers an in-line ransomware edge detection capabilities for file data. The new service gives businesses confidence that their file data can not only be quickly recovered following an attack, but that they can now detect live attacks and reduce the time and resources needed to uncover the source of the threat. ForgeRock Autonomous Access prevents identity-based cyber attacks and fraud Autonomous Access uses the power of artificial intelligence (AI) to monitor login requests in real time, blocking malicious attempts and adding authentication steps when it detects anomalous behaviors. Orca Security unveils Shift Left Security capabilities to prevent cloud application issues Orca Security announced a cloud security solution to provide context-aware Shift Left Security for cloud infrastructure and applications. Orca’s new command-line interface (CLI) called Orca CLI enables developers and DevOps teams to scan locally hosted images and IaC templates, view results directly in developer tools, and surface findings within the Orca platform. Sonatype launches solution to remediate malicious and outdated InnerSource components Sonatype announced a capability focused on identifying and remediating InnerSource components that contain vulnerable, malicious, or outdated open source dependencies. With InnerSource Insight , developers can manage their InnerSource components, see what open source packages they’re dependent on, remediate concerns immediately, and identify safe upgrade paths that won’t break builds. iDenfy introduces Business Verification platform to help customers detect bogus companies iDenfy’s Business Verification services will offer custom automatizations in one API, helping businesses to screen other companies and detect criminal activity. According to the images, iDenfy distinguishes whether it is a dormitory, a residential house, a commercial premise, or a luxury office. The new Business Verification services even determine the company’s office rental price. Cohesity FortKnox helps organizations combat sophisticated attacks and accelerate recovery Cohesity released Cohesity FortKnox — a SaaS data isolation and recovery solution, adding to the company’s Data Management as a Service portfolio of offerings that run on AWS. It is designed to provide an additional layer of off-site protection while simplifying operations and lowering costs compared to magnetic-tape and self-managed data vaults. Daily Newsletter - E-mail sent every business day with a recap of the last 24 hours Weekly Newsletter - E-mail sent every Monday with a recap of the last 7 days (IN)SECURE Magazine - E-mail sent when a new issue is released

Orca Security Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Orca Security Rank

You May Also Like

Aqua Security Logo
Aqua Security

Aqua Security enables enterprises to secure their virtual container environments from development to production, accelerating container adoption and bridging the gap between DevOps and IT security. Aqua's Container Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks in real time. Integrated with container lifecycle and orchestration tools, the Aqua platform provides transparent, automated security while helping to enforce policy and simplify regulatory compliance.

W
Wiz

Wiz operates as a cloud security company that allows companies to secure their cloud infrastructure at scale. Wiz delivers a contextual risk assessment of a client's cloud with the aims of enabling a reduction in security alerts, a clear action plan, and cloud hygiene at scale.

Sysdig Logo
Sysdig

Sysdig provides an intelligence platform to deliver monitoring, security, and troubleshooting in a microservices-friendly architecture used by a community of developers, administrators, and other IT professionals looking for visibility into systems and containers.

Lacework Logo
Lacework

Lacework delivers a complete security platform for the entire IT infrastructure, from DevOps and orchestration environments to cloud and hybrid workloads. Lacework is designed to self-adapt to the cloud's ever-changing configurations to provide visibility and intrusion detection that helps enterprises keep their data and resources safe.

Uptycs Logo
Uptycs

Uptycs develops a fast way to deploy osquery at scale. The company provides a cloud solution for system management, anomaly detection, and incident response using a robust analytics platform and out-of-the-box integration with threat intelligence.

Ermetic Logo
Ermetic

Ermetic is a platform for managing user and service permissions across cloud environments.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.