Orca Security Wants To Streamline Cloud Computing

Israeli upstart Orca Security has raised $55m to fund its plan to disrupt the cloud security industry with touchless, workload-deep, context-aware security and compliance for AWS, Microsoft Azure and Google Cloud Platform. The aim of the company is to reduce thousands of security alerts to the critical few that matter, along with their precise path to remediation.

“Cloud security is fundamentally broken. Practitioners are forced to waste their time installing and maintaining security agents instead of managing actual security risks,” said Avi Shua, CEO of Orca Security.

Orca treats each customer’s cloud estate as an interconnected web of assets, prioritising risk based on the underlying security issue combined with environmental context, including its accessibility and potential damage to the business. Orca’s patent pending SideScanning technology, reads the cloud configuration and workloads’ runtime block storage out-of-band to detect vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, secret keys, unsecured PII, and more. 

Orca Security has created the first cloud security solution that can meet these needs without agents or per asset integration, gaining full coverage within minutes. 

Unlike competing tools that operate in silos, Orca treats the cloud as an interconnected web of assets, prioritising risk based on the severity of the underlying security issue combined with environmental context, including its accessibility and potential damage to the business.

The idea is to eliminate numerous unfiltered security alerts and  to provide only a  critical few, along with their precise path to remediation.  

Orca Security plans to triple the size of  its R&D team and to expand its sales team to nearly 30 people to meet anticipated global  demand. Sales offices in the UK and Australia to serve the European and APAC markets are intended.

Orca Security:       

You Might Also Read: 

IBM Restructures To Concentrate On The Cloud:

 

« The Cause Of Amazon’s Cloud Outage
Data Breaches: 40% of SME Employees Think They Will Be Blamed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

MadSec Security

MadSec Security

MadSec Security is a leading consulting company whose expertise are information and cyber security.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

ubirch

ubirch

The ubirch platform is designed to ensure that IoT data is trustworthy and secure.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

GetHacked.ca

GetHacked.ca

GetHackded.ca is a certified company offering penetration testing and specialized cybersecurity services.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

Salus Cyber

Salus Cyber

Salus is a provider of world-class cyber security services, enabling our clients to identify and manage their cyber risks proactively and effectively.

Mobb

Mobb

Mobb's AI-powered technology automates vulnerability remediations to significantly reduce security backlogs and free developers to focus on innovation.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.

Dryad Global

Dryad Global

Dryad Global offers a comprehensive suite of maritime intelligence solutions, including a best-in-class situational awareness, planning and security system and industry-leading cyber protection tools.

Black Belt Secure

Black Belt Secure

We provide critical cybersecurity services such as managed security, ransomware mitigation, penetration testing, system auditing and compliance services to your organization.