Orca Security Wants To Streamline Cloud Computing

Israeli upstart Orca Security has raised $55m to fund its plan to disrupt the cloud security industry with touchless, workload-deep, context-aware security and compliance for AWS, Microsoft Azure and Google Cloud Platform. The aim of the company is to reduce thousands of security alerts to the critical few that matter, along with their precise path to remediation.

“Cloud security is fundamentally broken. Practitioners are forced to waste their time installing and maintaining security agents instead of managing actual security risks,” said Avi Shua, CEO of Orca Security.

Orca treats each customer’s cloud estate as an interconnected web of assets, prioritising risk based on the underlying security issue combined with environmental context, including its accessibility and potential damage to the business. Orca’s patent pending SideScanning technology, reads the cloud configuration and workloads’ runtime block storage out-of-band to detect vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, secret keys, unsecured PII, and more. 

Orca Security has created the first cloud security solution that can meet these needs without agents or per asset integration, gaining full coverage within minutes. 

Unlike competing tools that operate in silos, Orca treats the cloud as an interconnected web of assets, prioritising risk based on the severity of the underlying security issue combined with environmental context, including its accessibility and potential damage to the business.

The idea is to eliminate numerous unfiltered security alerts and  to provide only a  critical few, along with their precise path to remediation.  

Orca Security plans to triple the size of  its R&D team and to expand its sales team to nearly 30 people to meet anticipated global  demand. Sales offices in the UK and Australia to serve the European and APAC markets are intended.

Orca Security:       

You Might Also Read: 

IBM Restructures To Concentrate On The Cloud:

 

« The Cause Of Amazon’s Cloud Outage
Data Breaches: 40% of SME Employees Think They Will Be Blamed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber Center (LECC)

LECC is designed to assist police, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.

Packet Ninjas

Packet Ninjas

Packet Ninjas is a niche cyber security agency with specialized expertise in the use of digital intelligence to strengthen cyber security.

Avatier

Avatier

Avatier identity management software products automate identity access management, user provisioning and IT governance to ensure information security and compliance.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

Stripe OLT

Stripe OLT

At Stripe OLT, we provide complete business technology solutions - Our team has an unrivalled reputation as a Microsoft Gold Partner, specialising in secure, cloud-first technology.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

AI Safety Institute (AISI)

AI Safety Institute (AISI)

The AI Safety Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI.