Orca Security Wants To Streamline Cloud Computing

Israeli upstart Orca Security has raised $55m to fund its plan to disrupt the cloud security industry with touchless, workload-deep, context-aware security and compliance for AWS, Microsoft Azure and Google Cloud Platform. The aim of the company is to reduce thousands of security alerts to the critical few that matter, along with their precise path to remediation.

“Cloud security is fundamentally broken. Practitioners are forced to waste their time installing and maintaining security agents instead of managing actual security risks,” said Avi Shua, CEO of Orca Security.

Orca treats each customer’s cloud estate as an interconnected web of assets, prioritising risk based on the underlying security issue combined with environmental context, including its accessibility and potential damage to the business. Orca’s patent pending SideScanning technology, reads the cloud configuration and workloads’ runtime block storage out-of-band to detect vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, secret keys, unsecured PII, and more. 

Orca Security has created the first cloud security solution that can meet these needs without agents or per asset integration, gaining full coverage within minutes. 

Unlike competing tools that operate in silos, Orca treats the cloud as an interconnected web of assets, prioritising risk based on the severity of the underlying security issue combined with environmental context, including its accessibility and potential damage to the business.

The idea is to eliminate numerous unfiltered security alerts and  to provide only a  critical few, along with their precise path to remediation.  

Orca Security plans to triple the size of  its R&D team and to expand its sales team to nearly 30 people to meet anticipated global  demand. Sales offices in the UK and Australia to serve the European and APAC markets are intended.

Orca Security:       

You Might Also Read: 

IBM Restructures To Concentrate On The Cloud:

 

« The Cause Of Amazon’s Cloud Outage
Data Breaches: 40% of SME Employees Think They Will Be Blamed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Security Affairs

Security Affairs

Security Affairs is a blog covering all aspects of cyber security.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

RiskRecon

RiskRecon

RiskRecon makes it easy to gain deep, risk contextualized insight into the cybersecurity risk performance of all of your third parties.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

Pioneer Search

Pioneer Search

Pioneer Search is a UK based Technology & Change, Electronics Engineering, Cyber Security & Cloud and Data & Analytics Employment Agency.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

CRI Group

CRI Group

CRI Group excels at deterring, detecting and investigating crimes against businesses using a global network of professionals specially trained in Anti-Corruption, Risk Management and Compliance.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

MAXXeGUARD: The High Security Shredder. MAXXeGUARD easily destroys hard disks up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s etc.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

CySecK

CySecK

CySecK is a Centre of Excellence in Cybersecurity formed in 2017 by the Government of Karnataka, as part of the Technology Innovation Strategy.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.

Cyber Husky

Cyber Husky

Cyber Husky is an agile technology company that specializes in cloud solutions, cybersecurity, and managed IT services.