# Cortex Cloud vs Orca Security Comparison
---
## AI Generated Summary
- **G2 reviewers report** that Orca Security excels in user satisfaction, boasting a significantly higher overall score compared to Cortex Cloud. Users appreciate its intuitive dashboards and seamless integration with tools like Jira, which enhances their workflow efficiency.
- **According to verified reviews** , Cortex Cloud is praised for its **quick setup** and ease of use, making it a favorable choice for teams looking to streamline their security operations. Users highlight how its automation features help in speeding up daily tasks and improving overall productivity.
- **Reviewers mention** that Orca Security&#39;s implementation process is notably swift, with some users completing it in under an hour. This quick onboarding is complemented by responsive customer support, which users find helpful even at standard support levels.
- **Users say** that Cortex Cloud provides a unified platform for security operations, integrating threat detection, investigation, and response. This centralization is seen as a major advantage, allowing for better decision-making and performance monitoring.
- **G2 reviewers highlight** that while Cortex Cloud has a solid feature set, it sometimes struggles with specific workflow needs, leading to configuration challenges. In contrast, Orca Security&#39;s comprehensive overview of cloud security is often cited as a strong point, helping users feel more secure in their environments.
- **According to recent user feedback** , both products offer valuable features, but Orca Security tends to have a slight edge in areas like **runtime protection** and vulnerability scanning, which users find crucial for maintaining robust security in their cloud environments.



| | Cortex Cloud | Orca Security | 
|---|---|---|
| **Star Rating** | 4.1 out of 5 | 4.6 out of 5 | 
| **Total Reviews** | 112 | 254 | 
| **Largest Market Segment** | Enterprise (38.2% of reviews) | Mid-Market (44.7% of reviews) | 
| **Entry Level Price** | No pricing available | Contact Us | 

---
## Top Pros & Cons

### Cortex Cloud

Pros:
- Ease of Use (49 reviews)
- Features (45 reviews)

Cons:
- Expensive (31 reviews)
- Difficult Learning (30 reviews)

### Orca Security

Pros:
- Ease of Use (37 reviews)
- Features (33 reviews)

Cons:
- Improvement Needed (15 reviews)
- Feature Limitations (12 reviews)

---
## Ratings Comparison
| Rating | Cortex Cloud | Orca Security | 
|---|---|---|
  | **Meets Requirements** | 8.3 (99 reviews) | 9.0 (199 reviews) | 
  | **Ease of Use** | 7.7 (101 reviews) | 9.1 (226 reviews) | 
  | **Ease of Setup** | 7.6 (90 reviews) | 9.3 (202 reviews) | 
  | **Ease of Admin** | 7.9 (52 reviews) | 9.0 (151 reviews) | 
  | **Quality of Support** | 7.9 (95 reviews) | 9.1 (194 reviews) | 
  | **Has the product been a good partner in doing business?** | 8.0 (48 reviews) | 9.4 (150 reviews) | 
  | **Product Direction (% positive)** | 8.8 (96 reviews) | 9.8 (188 reviews) | 

---
## Pricing

### Cortex Cloud

#### Entry-Level Pricing

No pricing available

#### Free Trial

Yes

### Orca Security

#### Entry-Level Pricing

Plan: By Compute Asset

Price: Contact Us

Description: An annual Orca subscription license is priced by compute asset. This lets you embrace new technologies (such as Orca) without concern of being charged for such assets as cloud storage or databases.

Key Features:
- visit website for all features

[Learn more about Orca Security](https://www.g2.com/products/orca-security/reviews)

#### Free Trial

Yes

---
## Features Comparison By Category

### Cloud Workload Protection Platforms

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | 8.7/10 | 10 |
| **Orca Security** | 8.5/10 | 88 |

#### Management

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Dashboards and Reports** | 7.9 (7 reviews) | 8.1 (71 reviews) | 
| **Workflow Management** | 8.3 (7 reviews) | 7.9 (52 reviews) | 
| **Administration Console** | 8.1 (7 reviews) | 8.5 (65 reviews) | 

#### Operations

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Governance** | 8.6 (7 reviews) | 8.5 (51 reviews) | 
| **Logging and Reporting** | 8.8 (7 reviews) | 8.5 (59 reviews) | 
| **API / Integrations** | 9.4 (6 reviews) | 8.8 (62 reviews) | 

#### Security Controls 

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Anomaly Detection** | 8.9 (6 reviews) | 8.7 (56 reviews) | 
| **Data Loss Prevention** | 8.5 (8 reviews) | 7.7 (53 reviews) | 
| **Security Auditing** | 9.0 (7 reviews) | 9.1 (74 reviews) | 
| **Cloud Gap Analytics** | 9.2 (6 reviews) | 8.7 (57 reviews) | 

### Container Security

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | 8.0/10 | 16 |
| **Orca Security** | 8.2/10 | 60 |

#### Administration

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Risk Scoring** | 8.1 (14 reviews) | 8.6 (59 reviews) | 
| **Secrets Management** | 7.7 (14 reviews) | 8.0 (51 reviews) | 
| **Security Auditing** | 8.3 (14 reviews) | 8.9 (58 reviews) | 
| **Configuration Management** | 8.1 (14 reviews) | 8.6 (56 reviews) | 

#### Monitoring

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Continuous Image Assurance** | 8.1 (14 reviews) | 8.4 (50 reviews) | 
| **Behavior Monitoring** | 8.1 (14 reviews) | 7.8 (48 reviews) | 
| **Observability** | 7.9 (14 reviews) | 8.5 (52 reviews) | 

#### Protection

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Dynamic Image Scanning** | 7.9 (14 reviews) | 8.1 (52 reviews) | 
| **Runtime Protection** | 8.3 (14 reviews) | 7.5 (48 reviews) | 
| **Workload Protection** | 7.7 (14 reviews) | 7.8 (51 reviews) | 
| **Network Segmentation** | 7.7 (14 reviews) | 7.7 (47 reviews) | 

### Cloud Compliance

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | 8.4/10 | 39 |
| **Orca Security** | 8.4/10 | 118 |

#### Security

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Compliance Monitoring** | 8.5 (37 reviews) | 8.9 (114 reviews) | 
| **Anomoly Detection** | 8.2 (36 reviews) | 8.0 (110 reviews) | 
| **Data Loss Prevention** | 8.0 (34 reviews) | 7.7 (101 reviews) | 
| **Cloud Gap Analytics** | 8.1 (36 reviews) | 8.5 (108 reviews) | 

#### Compliance

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Governance** | 8.5 (37 reviews) | 8.8 (106 reviews) | 
| **Data Governance** | 8.3 (36 reviews) | 8.3 (100 reviews) | 
| **Sensitive Data Compliance** | 8.3 (36 reviews) | 8.5 (105 reviews) | 

#### Administration

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Policy Enforcement** | 8.7 (36 reviews) | 8.3 (105 reviews) | 
| **Auditing** | 8.6 (35 reviews) | 8.6 (109 reviews) | 
| **Workflow Management** | 8.5 (36 reviews) | 7.9 (102 reviews) | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | N/A | N/A |
| **Orca Security** | 7.9/10 | 123 |

#### Performance

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Issue Tracking** | Not enough data | 8.6 (110 reviews) | 
| **Detection Rate** | Not enough data | 8.8 (117 reviews) | 
| **False Positives** | Not enough data | 7.5 (118 reviews) | 
| **Automated Scans** | Not enough data | 9.2 (120 reviews) | 

#### Network

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Compliance Testing** | Not enough data | 8.6 (112 reviews) | 
| **Perimeter Scanning** | Not enough data | 8.6 (107 reviews) | 
| **Configuration Monitoring** | Not enough data | 8.7 (112 reviews) | 

#### Application

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Manual Application Testing** | Not enough data | 6.2 (88 reviews) | 
| **Static Code Analysis** | Not enough data | 6.5 (85 reviews) | 
| **Black Box Testing** | Not enough data | 6.3 (84 reviews) | 

#### Agentic AI - Vulnerability Scanner

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | 

### Software Composition Analysis

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | N/A | N/A |
| **Orca Security** | N/A | N/A |

#### Functionality - Software Composition Analysis 

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Language Support** | Not enough data | Not enough data | 
| **Integration** | Not enough data | Not enough data | 
| **Transparency** | Not enough data | Not enough data | 

#### Effectiveness - Software Composition Analysis

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Remediation Suggestions** | Not enough data | Not enough data | 
| **Continuous Monitoring** | Not enough data | Not enough data | 
| **Thorough Detection** | Not enough data | Not enough data | 

### Risk-Based Vulnerability Management

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | 7.8/10 | 6 |
| **Orca Security** | N/A | N/A |

#### Risk Analysis

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Risk Scoring** | 8.3 (5 reviews) | Not enough data | 
| **Reporting** | 7.8 (6 reviews) | Not enough data | 
| **Risk-Prioritization** | 8.1 (6 reviews) | Not enough data | 

#### Vulnerability Assesment

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Vulnerability Scanning** | 8.3 (5 reviews) | Not enough data | 
| **Vulnerability Intelligence** | 7.5 (6 reviews) | Not enough data | 
| **Contextual Data** | 8.0 (5 reviews) | Not enough data | 
| **Dashboards** | 7.0 (5 reviews) | Not enough data | 

#### Automation

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Automated Remediation** | 7.3 (5 reviews) | Not enough data | 
| **Workflow Automation** | 7.0 (5 reviews) | Not enough data | 
| **Security Testing** | 8.3 (5 reviews) | Not enough data | 
| **Test Automation** | 8.3 (5 reviews) | Not enough data | 

### API Security

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | N/A | N/A |
| **Orca Security** | 8.1/10 | 33 |

#### API Management 

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **API Discovery** | Not enough data | 8.6 (33 reviews) | 
| **API Monitoring** | Not enough data | 8.5 (31 reviews) | 
| **Reporting** | Not enough data | 8.4 (33 reviews) | 
| **Change Management** | Not enough data | 8.1 (30 reviews) | 

#### Security Testing

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Compliance Monitoring** | Not enough data | 8.8 (30 reviews) | 
| **API Verification** | Not enough data | 7.9 (29 reviews) | 
| **API Testing** | Not enough data | 7.5 (29 reviews) | 

#### Security Management

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Security and Policy Enforcement** | Not enough data | 8.5 (29 reviews) | 
| **Anomoly Detection** | Not enough data | 8.2 (31 reviews) | 
| **Bot Detection** | Not enough data | 6.0 (29 reviews) | 

### Cloud Security Posture Management (CSPM)

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | 7.7/10 | 24 |
| **Orca Security** | 8.5/10 | 115 |

#### Configuration

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **DLP Configuration** | 7.7 (20 reviews) | 6.8 (82 reviews) | 
| **Configuration Monitoring** | 7.6 (21 reviews) | 8.5 (95 reviews) | 
| **Unified Policy Management** | 7.7 (21 reviews) | 8.1 (83 reviews) | 
| **Adaptive Access Control** | 7.8 (18 reviews) | 7.6 (84 reviews) | 
| **API / Integrations** | 7.1 (20 reviews) | 8.5 (92 reviews) | 

#### Visibility

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Multicloud Visibility** | 8.2 (22 reviews) | 9.0 (101 reviews) | 
| **Asset Discovery** | 7.5 (21 reviews) | 9.4 (104 reviews) | 

#### Vulnerability Management

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Threat Hunting** | 7.8 (18 reviews) | 8.3 (90 reviews) | 
| **Vulnerability Scanning** | 7.9 (21 reviews) | 9.1 (105 reviews) | 
| **Vulnerability Intelligence** | 8.0 (19 reviews) | 8.9 (95 reviews) | 
| **Risk-Prioritization** | 7.8 (21 reviews) | 8.9 (101 reviews) | 

### Cloud Infrastructure Entitlement Management (CIEM)

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | 8.5/10 | 10 |
| **Orca Security** | 8.4/10 | 31 |

#### Access control - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Policy Management** | 8.7 (9 reviews) | 8.9 (31 reviews) | 
| **Fine-Grained Access Control** | 8.5 (10 reviews) | 8.4 (30 reviews) | 
| **Role-Based Access Control (RBAC)** | 8.7 (10 reviews) | 8.3 (30 reviews) | 
| **AI-driven access control** | 8.1 (8 reviews) | 7.6 (30 reviews) | 

#### Monitoring - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Monitoring** | 9.0 (10 reviews) | 8.4 (31 reviews) | 
| **AI-based detection** | 7.8 (10 reviews) | 7.5 (30 reviews) | 

#### Auditing - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Visibility** | 8.7 (10 reviews) | 9.2 (31 reviews) | 
| **Compliance Reporting** | 8.3 (10 reviews) | 8.8 (31 reviews) | 

### AI Governance Tools

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | 7.3/10 | 6 |
| **Orca Security** | N/A | N/A |

#### AI Compliance

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Regulatory Reporting** | 7.5 (6 reviews) | Not enough data | 
| **Automated Compliance** | 6.7 (6 reviews) | Not enough data | 
| **Audit Trails** | 8.1 (6 reviews) | Not enough data | 

#### Risk Management &amp; Monitoring

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **AI Risk Management** | 6.4 (6 reviews) | Not enough data | 
| **Real-time Monitoring** | 7.8 (6 reviews) | Not enough data | 

#### AI Lifecycle Management

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Lifecycle Automation** | 7.2 (6 reviews) | Not enough data | 

#### Access Control and Security

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Pole-based Access Control (RBAC)** | 7.2 (6 reviews) | Not enough data | 

#### Collaboration and Communication 

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Model Sharing and Reuse** | 7.5 (6 reviews) | Not enough data | 

#### Agentic AI - AI Governance Tools

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Multi-step Planning** | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | 
| **Natural Language Interaction** | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | 

### Cloud-Native Application Protection Platform (CNAPP)

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | N/A | N/A |
| **Orca Security** | N/A | N/A |

#### Security - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Workload and container security** | Not enough data | Not enough data | 
| **Threat detection and response** | Not enough data | Not enough data | 
| **DevSecOps Integrations** | Not enough data | Not enough data | 
| **Unified Visibility** | Not enough data | Not enough data | 

#### Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Intelligent remediations and suggestions** | Not enough data | Not enough data | 
| **Risk prioritization** | Not enough data | Not enough data | 
| **Anomaly detection using machine learning** | Not enough data | Not enough data | 

#### Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Multi-cloud visibility** | Not enough data | Not enough data | 
| **Cloud Security Posture Management (CSPM)** | Not enough data | Not enough data | 

#### Agentic AI - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | 

### Data Security Posture Management (DSPM)

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | N/A | N/A |
| **Orca Security** | N/A | N/A |

#### Discovery &amp; Classification - Data Security Posture Management (DSPM)

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Continuous real‑time monitoring** | Not enough data | Not enough data | 
| **Discover &amp; classify sensitive data** | Not enough data | Not enough data | 
| **Custom classification support** | Not enough data | Not enough data | 

#### Risk Prioritization - Data Security Posture Management (DSPM)

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Detect excessive entitlements &amp; toxic combinations** | Not enough data | Not enough data | 
| **Compliance posture assessment** | Not enough data | Not enough data | 
| **Risk‑based exposure scoring** | Not enough data | Not enough data | 

#### Remediation &amp; Governance - Data Security Posture Management (DSPM)

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Guided remediation actions** | Not enough data | Not enough data | 
| **Integration with enforcement tools** | Not enough data | Not enough data | 
| **Track remediation progress &amp; trends** | Not enough data | Not enough data | 

### AI Security Posture Management (AI-SPM) Tools

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | N/A | N/A |
| **Orca Security** | N/A | N/A |

#### Functionality - AI Security Posture Management (AI-SPM) Tools

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Security Ecosystem Integration** | Not enough data | Not enough data | 
| **AI Asset Discovery** | Not enough data | Not enough data | 
| **Adaptive Policy Updates** | Not enough data | Not enough data | 
| **Access and Permissions Monitoring** | Not enough data | Not enough data | 
| **Policy Enforcement** | Not enough data | Not enough data | 

#### Risk Assessment - AI Security Posture Management (AI-SPM) Tools

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **AI Risk Assessment** | Not enough data | Not enough data | 
| **AI Asset Posture Scoring** | Not enough data | Not enough data | 

#### Governance &amp; Compliance - AI Security Posture Management (AI-SPM) Tools

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **AI‑Generated Content Controls** | Not enough data | Not enough data | 
| **Audit Trails** | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | N/A | N/A |
| **Orca Security** | N/A | N/A |

#### Cloud Visibility

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | 

#### Security

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Data Security** | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | 

#### Identity

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **SSO** | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | 

### Data Security

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | N/A | N/A |
| **Orca Security** | N/A | N/A |

#### Compliance

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Access Management** | Not enough data | Not enough data | 
| **At-Risk Analysis** | Not enough data | Not enough data | 
| **DLP Configuration** | Not enough data | Not enough data | 
| **Sensitive Data Compliance** | Not enough data | Not enough data | 

#### Administration

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Database Management** | Not enough data | Not enough data | 
| **Deduplication ** | Not enough data | Not enough data | 
| **Backup** | Not enough data | Not enough data | 
| **API / integrations** | Not enough data | Not enough data | 

#### Security 

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Multi-Factor Authentication** | Not enough data | Not enough data | 
| **Data Transport** | Not enough data | Not enough data | 
| **Data Types** | Not enough data | Not enough data | 
| **Security Tools** | Not enough data | Not enough data | 

### Cloud Detection and Response (CDR)

| Product | Score | Reviews |
|---|---|---|
| **Cortex Cloud** | 7.7/10 | 9 |
| **Orca Security** | N/A | N/A |

#### Agentic AI - Cloud Detection and Response (CDR)

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Autonomous Task Execution** | 7.8 (9 reviews) | Not enough data | 
| **Proactive Assistance** | 7.0 (9 reviews) | Not enough data | 
| **Decision Making** | 8.3 (8 reviews) | Not enough data | 

#### Services - Cloud Detection and Response (CDR) 

| Feature | Cortex Cloud | Orca Security | 
|---|---|---|
| **Managed Services** | 7.5 (8 reviews) | Not enough data | 

---
## Categories
**Shared Categories (8):** [AI Security Posture Management (AI-SPM) Tools Software](https://www.g2.com/categories/ai-security-posture-management-ai-spm-tools), [Cloud Infrastructure Entitlement Management (CIEM) Software](https://www.g2.com/categories/cloud-infrastructure-entitlement-management-ciem), [Cloud Detection and Response (CDR) Software](https://www.g2.com/categories/cloud-detection-and-response-cdr), [Cloud-Native Application Protection Platform (CNAPP)](https://www.g2.com/categories/cloud-native-application-protection-platform-cnapp), [Cloud Security Posture Management (CSPM) Software](https://www.g2.com/categories/cloud-security-posture-management-cspm), [Cloud Compliance Software](https://www.g2.com/categories/cloud-compliance), [Container Security Tools](https://www.g2.com/categories/container-security-tools), [Cloud Workload Protection Platforms](https://www.g2.com/categories/cloud-workload-protection-platforms)

**Unique to Cortex Cloud (4):** [ Data Security Posture Management (DSPM)](https://www.g2.com/categories/data-security-posture-management-dspm), [ AI Governance Tools](https://www.g2.com/categories/ai-governance-tools), [Risk-Based Vulnerability Management Software](https://www.g2.com/categories/risk-based-vulnerability-management), [Software Composition Analysis Tools](https://www.g2.com/categories/software-composition-analysis)

**Unique to Orca Security (2):** [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner), [API Security Tools](https://www.g2.com/categories/api-security)


---
## Reviewer Demographics

### By Company Size

| Segment | Cortex Cloud | Orca Security | 
|---|---|---|
| **Small-Business** | 30.9% | 11.1% | 
| **Mid-Market** | 30.9% | 44.7% | 
| **Enterprise** | 38.2% | 44.3% | 

### By Industry

#### Cortex Cloud

- **Information Technology and Services:** 18.2%
- **Computer &amp; Network Security:** 10.9%
- **Computer Software:** 9.1%
- **Consulting:** 7.3%
- **Financial Services:** 4.5%
- **Information Services:** 4.5%
- **Banking:** 4.5%
- **Retail:** 3.6%
- **Logistics and Supply Chain:** 2.7%
- **Telecommunications:** 2.7%
- **Other:** 31.8%

#### Orca Security

- **Information Technology and Services:** 15.4%
- **Computer Software:** 13.0%
- **Financial Services:** 8.7%
- **Computer &amp; Network Security:** 5.9%
- **Marketing and Advertising:** 5.1%
- **Hospital &amp; Health Care:** 4.7%
- **Insurance:** 4.3%
- **Retail:** 3.2%
- **Education Management:** 3.2%
- **Automotive:** 2.8%
- **Other:** 33.6%

---
## Alternatives

### Alternatives to Cortex Cloud

- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (784 reviews)
- [Microsoft Defender for Cloud](https://www.g2.com/products/microsoft-defender-for-cloud/reviews) — 4.4/5 stars (308 reviews)
- [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews) — 4.4/5 stars (386 reviews)
- [Sysdig Secure](https://www.g2.com/products/sysdig-sysdig-secure/reviews) — 4.8/5 stars (112 reviews)
- [Aqua Security](https://www.g2.com/products/aqua-security/reviews) — 4.2/5 stars (57 reviews)
- [CrowdStrike Falcon Cloud Security](https://www.g2.com/products/crowdstrike-falcon-cloud-security/reviews) — 4.6/5 stars (85 reviews)
- [Vanta](https://www.g2.com/products/vanta/reviews) — 4.6/5 stars (2431 reviews)
- [Drata](https://www.g2.com/products/drata/reviews) — 4.7/5 stars (1158 reviews)
- [GitLab](https://www.g2.com/products/gitlab/reviews) — 4.5/5 stars (890 reviews)
- [Scrut Automation](https://www.g2.com/products/scrut-automation/reviews) — 4.9/5 stars (1300 reviews)

### Alternatives to Orca Security

- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (784 reviews)
- [Microsoft Defender for Cloud](https://www.g2.com/products/microsoft-defender-for-cloud/reviews) — 4.4/5 stars (308 reviews)
- [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews) — 4.4/5 stars (386 reviews)
- [Sysdig Secure](https://www.g2.com/products/sysdig-sysdig-secure/reviews) — 4.8/5 stars (112 reviews)
- [CrowdStrike Falcon Cloud Security](https://www.g2.com/products/crowdstrike-falcon-cloud-security/reviews) — 4.6/5 stars (85 reviews)
- [Tenable Nessus](https://www.g2.com/products/tenable-nessus/reviews) — 4.5/5 stars (301 reviews)
- [Vanta](https://www.g2.com/products/vanta/reviews) — 4.6/5 stars (2431 reviews)
- [Scrut Automation](https://www.g2.com/products/scrut-automation/reviews) — 4.9/5 stars (1300 reviews)
- [Drata](https://www.g2.com/products/drata/reviews) — 4.7/5 stars (1158 reviews)
- [Secureframe](https://www.g2.com/products/secureframe/reviews) — 4.7/5 stars (796 reviews)

---
## Top Discussions

### Cortex Cloud

No discussions available for this product.

### Orca Security

- Title: [Where is Orca security based?](https://www.g2.com/discussions/where-is-orca-security-based) — 2 comments
  > **Top comment:** "Orca Security is based in Los Angeles, California, United States."
- Title: [How much does Orca security cost?](https://www.g2.com/discussions/how-much-does-orca-security-cost) — 1 comment
  > **Top comment:** "$6500 per 50 workloads per year"
- Title: [What is ORCA platform?](https://www.g2.com/discussions/what-is-orca-platform) — 1 comment
  > **Top comment:** "SIEM tool for hunting threats, outdated oackages, overpowerful permissions, expired certificates. Mainly for AWS services"
- Title: [What does Orca Security do?](https://www.g2.com/discussions/what-does-orca-security-do) — 1 comment *(includes official response)*
  > **Top comment:** "Orca Security is a leader in CNAPP innovation (Cloud Native Application Protection Platform) for workload and data protection, cloud security posture..."

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/cortex-cloud-vs-orca-security)

