We performed a comparison between Illumio Zero Trust Segmentation and Orca Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Illumio Zero Trust Segmentation provides advanced monitoring capabilities, automated policy writing, and visibility into application communication. Orca Security is a cloud-based solution that excels at risk prioritization container security. Illumio Zero Trust Segmentation could improve by supporting a wider range of operating systems. There is a need for better data security and improved effectiveness in on-premise environments. Orca Security can offer better intrusion detection, data center compatibility, and integration with non-standard ticketing systems.
Service and Support: Some users were happy with the Illumio team's quick responses and round-the-clock help. However, some said answers were unhelpful and reported slow responses. Orca Security support earned high marks for their promptness, expertise, and attentiveness to customer needs. They also valued the team's commitment to enhancing their product and the convenience of a shared Slack channel for speedy issue resolution.
Ease of Deployment: Deploying Illumio Zero Trust Segmentation requires a significant amount of time, possibly up to six months, due to the complexity of applications and tasks involved. On the other hand, Orca Security offers a fast and effortless setup process that can be completed within a few minutes, eliminating the need for ongoing maintenance or agent installation.
Pricing: Illumio Zero Trust Segmentation offers one or three-year licenses, and some users say it is expensive. Orca Security's license includes all the necessary components out of the box without additional fees.
ROI: Our reviewers haven't given any feedback on Illumio Zero Trust Segmentation's ROI. Users say Orca Security has demonstrated a substantial ROI by improving security coverage and saving costs.
Comparison Results: Orca Security is favored over Illumio Zero Trust Segmentation. Users appreciate Orca's straightforward setup process, extensive visibility, and cost-effectiveness. Our users also like Orca's all-inclusive pricing model.
"We noted immediate benefits from using the solution."
"The most valuable features of PingSafe are the asset inventory and issue indexing."
"It is advantageous in terms of time-saving and cost reduction."
"The management console is the most valuable feature."
"Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks."
"Cloud Native Security is user-friendly. Everything in the Cloud Native Security tool is straightforward, including detections, integration, reporting, etc. They are constantly improving their UI by adding plugins and other features."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"The user interface is well-designed and easy to navigate."
"The flexibility of the solution is its most valuable feature."
"The most valuable feature of Illumio Adaptive Security Platform is monitoring. When I have no requirement from the other application, I can use the web block traffic to build."
"The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies."
"The product provides visibility into how the applications communicate and how the network protocols are being used."
"The solution is easy to use."
"The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files."
"The Explorer allows you to know the traffic between source and destination."
"It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation."
"It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just scan the entire assets in the cloud."
"Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks... You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca."
"The most valuable feature of Orca Security is the automated scanning tool, user-friendliness, and ease of use."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"There are so many valuable features that I could list, but one that I appreciate is the PCI DSS compliance report."
"The initial setup is very easy."
"Orca Security has updated its interface, making it more user-friendly. I find it particularly useful as it allows me to easily navigate the dashboard and prioritize actions based on severity and criticality."
"The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments."
"Cloud Native Security's reporting could be better. We are unable to see which images are impacted. Several thousand images have been deployed, so if we can see some application-specific information in the dashboard, we can directly send that report to the team that owns the application. We'd also like the option to download the report from the portal instead of waiting for the report to be sent to our email."
"There should be more documentation about the product."
"I would like PingSafe to add real-time detection of vulnerabilities and cloud misconfigurations."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"The main area for improvement I want to see is for the platform to become less resource-intensive. Right now, it can slow down processes on the machine, and it would be a massive improvement if it were more lightweight than it currently is."
"Customized queries should be made easier to improve PingSafe."
"The could improve their mean time to detect."
"I would like to see better data security in the product."
"The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules."
"It requires a low-level re-architecting of the product."
"The product’s agents don't work very well in OT environments."
"The interaction we've had with the support team hasn't been ideal. Technical support should be improved."
"Illumio Adaptive Security Platform could improve by supporting more operating systems. For example, Cisco and Apache appliances."
"The customer service is lagging a bit. It could be better."
"Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial."
"There were a couple of times when Orca was down when I was trying to access it. I work strange hours because all of my team is in the UK right now. It was 2 a.m. on a Saturday and I was trying to log in but it wasn't working. But relative to my other security tools, Orca is definitely the most stable that I've seen."
"Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance."
"The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see."
"I would like to see an option to do security checks on a code level. This is possible because they have access to all of the code running in the cloud provider, and combining their site-scanning solution with that would be a nice add-on."
"In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties."
"We are PCI DSS compliant, so we need to scan our environment externally with tools vetted by the PCI DSS organization. Orca doesn't scan the environment externally. It only scans what's currently in the cloud."
"The presentation of the data in the dashboard is a little bit chaotic."
"I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
Illumio is ranked 14th in Cloud Workload Protection Platforms (CWPP) with 8 reviews while Orca Security is ranked 12th in Cloud Workload Protection Platforms (CWPP) with 15 reviews. Illumio is rated 8.0, while Orca Security is rated 9.4. The top reviewer of Illumio writes "Pprevents attackers or threats from spreading or moving laterally". On the other hand, the top reviewer of Orca Security writes "Allows agentless data collection directly from the cloud". Illumio is most compared with Akamai Guardicore Segmentation, VMware NSX, Cisco Secure Workload, Zscaler Internet Access and Zero Networks Microsegmentation, whereas Orca Security is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud, CrowdStrike Falcon Cloud Security and XM Cyber. See our Illumio vs. Orca Security report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.