Orca Security Wants To Streamline Cloud Computing

Israeli upstart Orca Security has raised $55m to fund its plan to disrupt the cloud security industry with touchless, workload-deep, context-aware security and compliance for AWS, Microsoft Azure and Google Cloud Platform. The aim of the company is to reduce thousands of security alerts to the critical few that matter, along with their precise path to remediation.

“Cloud security is fundamentally broken. Practitioners are forced to waste their time installing and maintaining security agents instead of managing actual security risks,” said Avi Shua, CEO of Orca Security.

Orca treats each customer’s cloud estate as an interconnected web of assets, prioritising risk based on the underlying security issue combined with environmental context, including its accessibility and potential damage to the business. Orca’s patent pending SideScanning technology, reads the cloud configuration and workloads’ runtime block storage out-of-band to detect vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, secret keys, unsecured PII, and more. 

Orca Security has created the first cloud security solution that can meet these needs without agents or per asset integration, gaining full coverage within minutes. 

Unlike competing tools that operate in silos, Orca treats the cloud as an interconnected web of assets, prioritising risk based on the severity of the underlying security issue combined with environmental context, including its accessibility and potential damage to the business.

The idea is to eliminate numerous unfiltered security alerts and  to provide only a  critical few, along with their precise path to remediation.  

Orca Security plans to triple the size of  its R&D team and to expand its sales team to nearly 30 people to meet anticipated global  demand. Sales offices in the UK and Australia to serve the European and APAC markets are intended.

Orca Security:       

You Might Also Read: 

IBM Restructures To Concentrate On The Cloud:

 

« The Cause Of Amazon’s Cloud Outage
Data Breaches: 40% of SME Employees Think They Will Be Blamed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

Flatt Security

Flatt Security

Flatt Security is a cyber security startup based in Japan providing security assessments and other cyber security services.

Mode Solutions

Mode Solutions

Mode guarantee IT performance where you need it most, creating seamless and secure solutions that will alleviate pressure from your business.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.

DynTek

DynTek

DynTek delivers exceptional, cost-effective professional IT consulting services, end-to-end IT solutions and managed IT services.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.