We performed a comparison between Orca Security and Trend Micro Cloud One based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Orca Security is strong in container posture and cloud security posture management and has impressive SideScanning and ranking gap features. On the other hand, Trend Micro Cloud One provides excellent vulnerability protection through virtual patching and login inspection, with valuable visibility inside microservice architecture through Container Security. Orca Security could enhance their coverage, user education, and user interface. On the other hand, Trend Micro Cloud One needs to improve their pricing, automation, and marketing documentation.
Service and Support: Orca Security's customer service receives high praise for being responsive and competent, with quick response times and a willingness to incorporate feedback. On the other hand, Trend Micro Cloud One has knowledgeable and available support, but with the caveat that support is shared among multiple customers.
Ease of Deployment: Orca Security has a simple and effortless initial setup process as it does not require any installation of agents. Conversely, Trend Micro Cloud One's setup process is a mixed bag, with some finding it easy and others finding it cumbersome.
Pricing: Orca Security has a straightforward setup cost that is in line with market expectations and doesn't come with any surprise fees. In comparison, Trend Micro Cloud One's pricing can be more complicated and may require additional expenses depending on the user's needs. Some users find it reasonable, but others have found it to be more challenging compared to other options.
ROI: Orca Security offers cost savings by replacing multiple solutions and providing thorough insights with minimal IT expertise, while Trend Micro Cloud One's ROI is not clearly defined.
Comparison Results: Orca Security is the top choice when it comes to comparing it with Trend Micro Cloud One. Orca Security has an agentless approach, a user-friendly setup, and a complete set of tools for vulnerability management and attack detection. Meanwhile, Trend Micro Cloud One has limited automation and robustness, a complicated initial setup, and complicated licensing.
"With PingSafe, it's easy to onboard new accounts."
"The real-time detection and response capabilities overall are great."
"When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
"PingSafe's most valuable feature is its unified console."
"It is scalable, stable, and can detect any threat on a machine. It uses artificial intelligence and can lock down any virus."
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"It's helped free up staff time so that they can work on other projects."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"Orca's dashboard is excellent. My team needs to be able to focus on specific areas for improvement in our cloud environment. And most recently, we've started to get good use out of sonar, the search capabilities, and the alert creation."
"The reporting and automated remediation capabilities are valuable to me. They're real game-changers."
"The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments."
"The visibility Orca provides into my environment is at the highest level... When I dropped them into the environment, from the very get-go I had more insight into the risks in my environment than I had had during the entire two and a half years I had been here."
"It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just scan the entire assets in the cloud."
"With its Cloud Security Posture Management capability, we have the ability to read across all of our cloud-based environments, which includes AWS and Azure. We have visibility into those environments. Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries."
"Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks... You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca."
"Orca's platform provides an agentless data collection facility that collects information directly from the cloud using APIs, with zero impact on performance."
"Virtual patching is one of the key features, which is executed with their IPS."
"The perfect package for all security platforms, providing more than any other endpoint solution."
"The stability is quite good."
"Vision One is versatile and can be integrated with many SIEMs. You're not limited to only one SIEM, such as Microsoft Sentinel. The API integrations are seamless, and we have all the documentation needed to integrate Vision One via API."
"The tech support is excellent. They really know their products. They also know a lot of about the integrations between different solutions."
"The most valuable part of Trend Vision One - Cloud Security is its dashboard, as it's simple. It's easy to manage, and you can better control the solution."
"Trend Vision One - Cloud Security's best features are security analysis, remote access security, and driver security."
"The most valuable features are intrusion prevention and anti-malware capabilities."
"I'd like to see better onboarding documentation."
"The main area for improvement I want to see is for the platform to become less resource-intensive. Right now, it can slow down processes on the machine, and it would be a massive improvement if it were more lightweight than it currently is."
"We can customize security policies but lack auditing capabilities."
"There's room for improvement in the graphic explorer."
"Whenever I view the processes and the process aspect, it takes a long time to load."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"The recommended actions aren't always specific, so it might suggest recommendations that don't apply to the particular infrastructure code I'm reviewing."
"We use PingSafe and also SentinelOne. If PingSafe integrated some of the endpoint security features of SentinelOne, it would be the perfect one-stop solution for everything. We wouldn't need to switch between the products. At my organization, I am responsible for endpoint security and vulnerability management. Integrating both functions into one application would be ideal because I could see all the alerts, heat maps, and reports in one console."
"As with all software, the user interface can always be made simpler to use. It would be helpful for people with very little knowledge, like somebody sitting behind the SOC, to allow them to be able to drill down into things a little bit easier than it is currently."
"The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see."
"In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties."
"I would like to see an option to do security checks on a code level. This is possible because they have access to all of the code running in the cloud provider, and combining their site-scanning solution with that would be a nice add-on."
"They can expand a little bit in anti-malware detection. While we have pretty good confidence that it's going to detect some of the static malware, some of the detections are heuristics. There could be a growth in the library from where they're pulling their information, but we don't get a lot of those alerts based on the design of our products. In general, that might be an area that needs to be filled since they offer it as a service within it."
"I think Orca could give me more alerts. It could give me a dashboard with all the specific types of alerts I want to see for the day. It should just be one click."
"Another improvement would be that, in addition to focusing on endpoint compliance, they would focus on general compliance."
"The interface can be a bit cranky and sometimes takes a lot of time to load."
"They should provide a way for users to see violations for specific compliance."
"The local agent should be able to show more logs. At present, the logs are only available from the web console and not from the local agent."
"The firewall configuration should have been automated based on the understanding of the application, utilities, and protocols."
"Documentation on cloud architecture and job architecture would be helpful."
"The product could use a little bit of automation."
"The initial setup can be complex for the inexperienced."
"The initial setup is easy for someone who operates container platforms on a daily basis. However, it could be difficult for those coming purely from informational security or another field of an IT."
"There are also some loopholes because it's a new product that they have recently migrated to the cloud. We do see some issues with the policies we have assigned when it comes to a particular account. There are some issues with system support, such as a particular server kernel version that is not supported."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Trend Vision One - Cloud Security Pricing and Cost Advice →
Orca Security is ranked 12th in Container Security with 15 reviews while Trend Vision One - Cloud Security is ranked 8th in Container Security with 17 reviews. Orca Security is rated 9.4, while Trend Vision One - Cloud Security is rated 8.6. The top reviewer of Orca Security writes "Allows agentless data collection directly from the cloud". On the other hand, the top reviewer of Trend Vision One - Cloud Security writes "We can quickly deploy cloud conformity, provides good visibility, and control". Orca Security is most compared with Wiz, Prisma Cloud by Palo Alto Networks, Microsoft Defender for Cloud and CrowdStrike Falcon Cloud Security, whereas Trend Vision One - Cloud Security is most compared with Microsoft Defender for Cloud, AWS GuardDuty, Check Point Harmony Email & Collaboration, Prisma Cloud by Palo Alto Networks and Tenable Security Center. See our Orca Security vs. Trend Vision One - Cloud Security report.
See our list of best Container Security vendors, best Cloud Workload Protection Platforms (CWPP) vendors, and best Cloud Security Posture Management (CSPM) vendors.
We monitor all Container Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.