Orca Security Wants To Streamline Cloud Computing

Israeli upstart Orca Security has raised $55m to fund its plan to disrupt the cloud security industry with touchless, workload-deep, context-aware security and compliance for AWS, Microsoft Azure and Google Cloud Platform. The aim of the company is to reduce thousands of security alerts to the critical few that matter, along with their precise path to remediation.

“Cloud security is fundamentally broken. Practitioners are forced to waste their time installing and maintaining security agents instead of managing actual security risks,” said Avi Shua, CEO of Orca Security.

Orca treats each customer’s cloud estate as an interconnected web of assets, prioritising risk based on the underlying security issue combined with environmental context, including its accessibility and potential damage to the business. Orca’s patent pending SideScanning technology, reads the cloud configuration and workloads’ runtime block storage out-of-band to detect vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, secret keys, unsecured PII, and more. 

Orca Security has created the first cloud security solution that can meet these needs without agents or per asset integration, gaining full coverage within minutes. 

Unlike competing tools that operate in silos, Orca treats the cloud as an interconnected web of assets, prioritising risk based on the severity of the underlying security issue combined with environmental context, including its accessibility and potential damage to the business.

The idea is to eliminate numerous unfiltered security alerts and  to provide only a  critical few, along with their precise path to remediation.  

Orca Security plans to triple the size of  its R&D team and to expand its sales team to nearly 30 people to meet anticipated global  demand. Sales offices in the UK and Australia to serve the European and APAC markets are intended.

Orca Security:       

You Might Also Read: 

IBM Restructures To Concentrate On The Cloud:

 

« The Cause Of Amazon’s Cloud Outage
Data Breaches: 40% of SME Employees Think They Will Be Blamed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Blackfoot Cybersecurity

Blackfoot Cybersecurity

At Blackfoot, we work in partnership with you to deliver on-demand cyber security expertise and assurance, keeping you one step ahead of threats & compliant with regulations.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

Buchbinder Information Technology Solutions

Buchbinder Information Technology Solutions

Buchbinder Tunick & Company is a premier CPA and advisory firm offering a broad range of assurance, tax, business consulting and IT consulting services.

Secureframe

Secureframe

Companies from startups to enterprises use Secureframe to automate SOC 2 and ISO 27001 compliance, complete audits, and continuously monitor their security.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

Path Forward IT

Path Forward IT

Path Forward IT has been troubleshooting, architecting, migrating, protecting, and securing IT environments for businesses across the USA since 2002.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.