
Orca Security
Founded Year
2018Stage
Series C - II | AliveTotal Raised
$632MValuation
$0000Last Raised
$340M | 2 yrs agoAbout Orca Security
Orca Security operates as a cloud security platform. It provides solutions such as malware detection, vulnerability management, sensitive data detection, data security and posture management, and more. It serves industries such as financial services, healthcare, retail, and more. It was founded in 2018 and is based in Portland, Oregon.
Orca Security's Product Videos


ESPs containing Orca Security
The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.
The infrastructure as code (IaC) security & automation market focuses on implementing and managing infrastructure through code and addressing associated security challenges. These solutions provide visibility and control over the entire infrastructure lifecycle and help organizations maintain a strong security posture in dynamic and changing infrastructure environments. By incorporating security i…
Orca Security named as Challenger among 13 other companies, including Snyk, Wiz, and Sysdig.
Orca Security's Products & Differentiators
Orca Cloud Security Platform
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes.
Research containing Orca Security
Get data-driven expert analysis from the CB Insights Intelligence Unit.
CB Insights Intelligence Analysts have mentioned Orca Security in 9 CB Insights research briefs, most recently on Sep 6, 2023.

Sep 6, 2023
The data security market map
Aug 10, 2023
How much are CISOs spending for cloud security?
Jul 28, 2023
The cloud security market map

Oct 11, 2022
The Transcript from Yardstiq: Klarna vs. Afterpay
Oct 4, 2022
The Transcript from Yardstiq: Ramp vs. Brex
Sep 26, 2022 report
Top cloud security companies — and why customers chose themExpert Collections containing Orca Security
Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.
Orca Security is included in 3 Expert Collections, including Unicorns- Billion Dollar Startups.
Unicorns- Billion Dollar Startups
1,221 items
Regtech
1,611 items
Technology that addresses regulatory challenges and facilitates the delivery of compliance requirements. Regulatory technology helps companies and regulators address challenges ranging from compliance (e.g. AML/KYC) automation and improved risk management.
Cybersecurity
7,220 items
These companies protect organizations from digital threats.
Orca Security Patents
Orca Security has filed 20 patents.
The 3 most popular patent topics include:
- Cloud computing
- Cloud infrastructure
- Cloud storage

Application Date | Grant Date | Title | Related Topics | Status |
---|---|---|---|---|
11/14/2022 | 8/29/2023 | Computer security, Cloud computing, Cloud platforms, Cloud infrastructure, Cyberwarfare | Grant |
Application Date | 11/14/2022 |
---|---|
Grant Date | 8/29/2023 |
Title | |
Related Topics | Computer security, Cloud computing, Cloud platforms, Cloud infrastructure, Cyberwarfare |
Status | Grant |
Latest Orca Security News
Sep 18, 2023
Presented by Orca Security Cloud-native applications have unique security risks. In this VB Spotlight, learn everything you need to know about locking down your containers and Kubernetes through all stages of the development lifecycle, the ideal DevSecOps journey and more. Containers, and Kubernetes in particular, are custom-made to run the microservices that make it possible to scale cloud adoption more effectively and make it more cost-efficient. They’ve also proven crucial in maintaining applications and staying agile — enabling fast updates and deployment. But containers and Kubernetes also have some unique security risks and challenges across all stages of the development lifecycle, and a partnership between DevOps and security is crucial, says Neil Carpenter, principal technical evangelist at Orca Security. “Security is now realizing that their existing tooling and processes don’t cover the magic new world of cloud applications and containers — they’re running to catch up and that’s a dangerous space,” Carpenter says. “Understanding what DevOps does, being part of the team, and building bridges is certainly a line item in a bigger picture, but it’s foundational to a strong security stance.” A look at container security risks There are two phases to running a container, and risk detection and elimination needs to be active in both, as well as a partnership between the IT security team and the DevOps team. The first phase encompasses the development of the container, and then everything that happens after it’s up and running. Before deployment The first half is typically a DevOps-driven process, with developers writing code and checking it in. Automation is used in testing, building container images and deploying them back into the pipeline for user testing and acceptance, and then into production. DevOps thrives on automation, Carpenter says, and the same problem is never solved twice — the solution is automated and it solves itself going forward. “For IT security professionals, this DevOps-driven world is new to us,” Carpenter says. “But vulnerability assessment is central to how IT security teams work, so scanning for critical vulnerabilities and fixing them before they become a problem is great for both the security team and development teams. Putting a collaborative process in place makes us all far better off.” Many DevOps engineers leverage infrastructure-as-code (IAC), which means writing the machine learning code that automates things like deployment, monitoring load, autoscaling, exposing ports and more. And this same code can be used to deploy across any number of environments. Security scanning IAC artifacts in the development pipeline, looking for problematic configurations is key — they can be caught and blocked before they’re ever deployed. Once it’s up and running The first challenge of a running container is ensuring that it’s securely deployed and configured. Unlike VMs, which are securely separated from each other, containers are not a security boundary. An engineer running a privileged container, or running as root, can read and write other containers running on the same machine. On top of that, risks also depend on the workload itself, which is a moving target. Even if you’re scanning it regularly, new critical vulnerabilities can be lurking around the corner. Developers need to have a full view of each container’s running workloads to look for anomalous behavior, unexpected outbound connections and unexpected process execution, as well as keep up with potential new risks. How DevOps is changing people and processes The most important issue in delivering secure cloud applications isn’t process or technology, it’s getting people together and tearing down boundaries. “I think traditionally security people, developers and DevOps have been natural enemies,” Carpenter says. “That’s not going to work in a cloud application world because so much of the responsibility for finding and addressing problems cuts across these lines.” For example, a remote code execution vulnerability in a Tomcat app running on VMs have the same vulnerability as containers running on Kubernetes in the cloud; what’s different is who will fix it and the process for fixing it. The security team can’t patch container vulnerabilities — they have to create a ticket for developers, and getting it fixed requires a completely different set of people and processes that are fairly alien to most security teams. “Bridge-building is critical,” Carpenter says. “On the security side we have to understand how this new world works and all the pieces that are involved. On the DevOps side, they have to have some understanding of why the security piece is important, and they need to deliver solutions in a way that integrates with the work they’re already doing, as well as drives what they’re already doing.” Piece two is on the security side, building out the end-to-end process and integration of security solutions, in a way that doesn’t break or interfere with the way DevOps works for the enterprise. “Don’t kill the agility,” he says. “Automate things so that everything’s at our fingertips, right where we need it, when we need it. When possible, provide context for why something is important or why something is not important. Be flexible where you can. Have exception processes that are easily manageable, monitorable and rational. Don’t be the engine of ‘no’ or whatever people use to refer to security as. Find that balance of risk where we can keep moving forward.” For a deep dive into the ways security and DevOps teams can address critical risk, the tools and solutions that can help mitigate security issues across teams and how to approach containers from the security perspective at every level of maturity, don’t miss this VB Spotlight.
Orca Security Frequently Asked Questions (FAQ)
When was Orca Security founded?
Orca Security was founded in 2018.
Where is Orca Security's headquarters?
Orca Security's headquarters is located at 2175 North West Raleigh Street, Portland.
What is Orca Security's latest funding round?
Orca Security's latest funding round is Series C - II.
How much did Orca Security raise?
Orca Security raised a total of $632M.
Who are the investors of Orca Security?
Investors of Orca Security include GGV Capital, ICONIQ Capital, CapitalG, Redpoint Ventures, Stripes Group and 13 more.
Who are Orca Security's competitors?
Competitors of Orca Security include Ermetic, OpsHelm, Horangi Cyber Security, Lightspin, Wiz and 13 more.
What products does Orca Security offer?
Orca Security's products include Orca Cloud Security Platform.
Who are Orca Security's customers?
Customers of Orca Security include Sisense and Lemonade.
Compare Orca Security to Competitors

Wiz provides software-as-a-service (SaaS) based cloud security services. It helps organizations identify and mitigate security risks in their cloud environments. It offers solutions such as vulnerability management, container, and kubernetes security, infrastructure as code (IaC) scanning, and more. The company was founded in 2020 and is based in New York, New York.

Lacework develops a data-driven cloud-native application protection platform (CNAPP). It offers threat detection solutions, vulnerability risk management solutions, container security solutions, cloud security solutions, and more. It was founded in 2015 and is based in Mountain View, California.

Aqua Security prevents cloud-native attacks. It enables enterprises to secure their virtual container environments from development to production, accelerating container adoption and bridging the gap between DevOps and IT security. The company's container security platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks in real-time. Aqua was formerly known as Scalock and changed its name to Aqua Security. It was founded in 2015 and is based in Burlington, Massachusetts.

Sysdig operates as a cloud innovation platform. It offers vulnerability management, posture management, entitlement management, Kubernetes monitoring, Prometheus monitoring, and more services. It serves the community of developers, administrators, and other information technology (IT) professionals. Sysdig was formerly known as Draios. It was founded in 2013 and is based in San Francisco, California.

Uptycs develops a structured query language (SQL)-powered cloud-based security analytics platform. It connects insights across attack surfaces and unites teams to tackle security challenges, including cyber asset inventory, compliance, vulnerability, and more. The company was founded in 2016 and is based in Waltham, Massachusetts.

Runecast Solutions provides a patented, AI-driven CNAPP solution to enable organizations with a proactive approach to Security Compliance, Container Security and ITOM. Runecast was founded in 2014 and is based in London, U.K.