# DefectDojo, Orca Security vs Red Hat Ansible Automation Platform Comparison

| | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Star Rating** | 4.6 out of 5 | 4.6 out of 5 | 4.6 out of 5 | 
| **Total Reviews** | 11 | 254 | 376 | 
| **Largest Market Segment** | Mid-Market (63.6% of reviews) | Mid-Market (44.7% of reviews) | Enterprise (48.4% of reviews) | 
| **Entry Level Price** | No pricing available | Contact Us | $5,000 per year | 

---
## Top Pros & Cons

### DefectDojo

**Not enough data**

### Orca Security

Pros:
- Ease of Use (37 reviews)
- Features (33 reviews)

Cons:
- Improvement Needed (15 reviews)
- Feature Limitations (12 reviews)

### Red Hat Ansible Automation Platform

Pros:
- Automation (56 reviews)
- Automation Efficiency (47 reviews)

Cons:
- Learning Curve (16 reviews)
- Learning Difficulty (16 reviews)

---
## Ratings Comparison
| Rating | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
  | **Meets Requirements** | 9.1 (11 reviews) | 9.0 (199 reviews) | 8.9 (155 reviews) | 
  | **Ease of Use** | 8.8 (11 reviews) | 9.1 (226 reviews) | 8.7 (319 reviews) | 
  | **Ease of Setup** | 9.2 (8 reviews) | 9.3 (202 reviews) | 8.2 (247 reviews) | 
  | **Ease of Admin** | 9.8 (8 reviews) | 9.0 (151 reviews) | 8.8 (91 reviews) | 
  | **Quality of Support** | 8.5 (10 reviews) | 9.1 (194 reviews) | 8.3 (127 reviews) | 
  | **Has the product been a good partner in doing business?** | 9.3 (7 reviews) | 9.4 (150 reviews) | 8.8 (75 reviews) | 
  | **Product Direction (% positive)** | 6.8 (11 reviews) | 9.8 (188 reviews) | 9.4 (157 reviews) | 

---
## Pricing

### DefectDojo

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### Orca Security

#### Entry-Level Pricing

Plan: By Compute Asset

Price: Contact Us

Description: An annual Orca subscription license is priced by compute asset. This lets you embrace new technologies (such as Orca) without concern of being charged for such assets as cloud storage or databases.

Key Features:
- visit website for all features

[Learn more about Orca Security](https://www.g2.com/products/orca-security/reviews)

#### Free Trial

Yes

### Red Hat Ansible Automation Platform

#### Entry-Level Pricing

Plan:  Basic Tower

Price: $5,000 per year

Description: Up to 100 nodes

Key Features:
- 30 Days of Support only
- No response time SLA
- Maintenance &amp; Upgrades

[Browse all 3 editions](https://www.g2.com/products/red-hat-ansible-automation-platform/pricing)

#### Free Trial

Yes

---
## Features Comparison By Category

### Cloud Workload Protection Platforms

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | 8.5/10 | 88 |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### Management

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Dashboards and Reports** | Not enough data | 8.1 (71 reviews) | Not enough data | 
| **Workflow Management** | Not enough data | 7.9 (52 reviews) | Not enough data | 
| **Administration Console** | Not enough data | 8.5 (65 reviews) | Not enough data | 

#### Operations

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Governance** | Not enough data | 8.5 (51 reviews) | Not enough data | 
| **Logging and Reporting** | Not enough data | 8.5 (59 reviews) | Not enough data | 
| **API / Integrations** | Not enough data | 8.8 (62 reviews) | Not enough data | 

#### Security Controls 

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Anomaly Detection** | Not enough data | 8.7 (56 reviews) | Not enough data | 
| **Data Loss Prevention** | Not enough data | 7.7 (53 reviews) | Not enough data | 
| **Security Auditing** | Not enough data | 9.1 (74 reviews) | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | 8.7 (57 reviews) | Not enough data | 

### Application Release Orchestration

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | 8.7/10 | 27 |

#### Administration

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Configuration Management** | Not enough data | Not enough data | 9.0 (23 reviews) | 
| **Access Control** | Not enough data | Not enough data | 8.5 (23 reviews) | 
| **Dashboards** | Not enough data | Not enough data | 8.4 (21 reviews) | 

#### Functionality

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Deployment Automation** | Not enough data | Not enough data | 9.3 (25 reviews) | 
| **Process Analytics** | Not enough data | Not enough data | 8.6 (20 reviews) | 
| **Plugins** | Not enough data | Not enough data | 8.3 (21 reviews) | 
| **APIs / Integrations** | Not enough data | Not enough data | 8.6 (24 reviews) | 
| **Feature Flags** | Not enough data | Not enough data | 8.2 (19 reviews) | 

#### Processes

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Pipelines** | Not enough data | Not enough data | 8.6 (22 reviews) | 
| **Orchestration** | Not enough data | Not enough data | 8.7 (22 reviews) | 
| **Workflow Visualization** | Not enough data | Not enough data | 8.3 (20 reviews) | 

### Network Automation Tools

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | 9.1/10 | 6 |

#### Configuration

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Compliance** | Not enough data | Not enough data | 9.0 (5 reviews) | 
| **Scheduling** | Not enough data | Not enough data | 8.0 (5 reviews) | 
| **Maintenance** | Not enough data | Not enough data | 8.9 (6 reviews) | 

#### Agentic AI - Network Automation Tools

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | Not enough data | 

#### Network

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Scalability** | Not enough data | Not enough data | 8.0 (5 reviews) | 
| **Inventory** | Not enough data | Not enough data | 9.0 (5 reviews) | 
| **Infrastructure** | Not enough data | Not enough data | 8.6 (6 reviews) | 
| **Remote Access** | Not enough data | Not enough data | 9.0 (5 reviews) | 

#### Logistics

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Communication** | Not enough data | Not enough data | 8.7 (5 reviews) | 
| **Scripting** | Not enough data | Not enough data | 8.3 (5 reviews) | 
| **Workflows** | Not enough data | Not enough data | 8.7 (5 reviews) | 

#### Security - Network Automation

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Change Management** | Not enough data | Not enough data | Not enough data | 
| **Security Automation** | Not enough data | Not enough data | 8.6 (6 reviews) | 
| **User Authentication and Authorization** | Not enough data | Not enough data | 6.3 (5 reviews) | 
| **Monitoring and Alerts** | Not enough data | Not enough data | 6.7 (5 reviews) | 

### Container Security

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | 8.2/10 | 60 |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### Administration

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Risk Scoring** | Not enough data | 8.6 (59 reviews) | Not enough data | 
| **Secrets Management** | Not enough data | 8.0 (51 reviews) | Not enough data | 
| **Security Auditing** | Not enough data | 8.9 (58 reviews) | Not enough data | 
| **Configuration Management** | Not enough data | 8.6 (56 reviews) | Not enough data | 

#### Monitoring

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Continuous Image Assurance** | Not enough data | 8.4 (50 reviews) | Not enough data | 
| **Behavior Monitoring** | Not enough data | 7.8 (48 reviews) | Not enough data | 
| **Observability** | Not enough data | 8.5 (52 reviews) | Not enough data | 

#### Protection

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Dynamic Image Scanning** | Not enough data | 8.1 (52 reviews) | Not enough data | 
| **Runtime Protection** | Not enough data | 7.5 (48 reviews) | Not enough data | 
| **Workload Protection** | Not enough data | 7.8 (51 reviews) | Not enough data | 
| **Network Segmentation** | Not enough data | 7.7 (47 reviews) | Not enough data | 

### Cloud Infrastructure Automation

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | 9.0/10 | 36 |

#### Administration 

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Administration Console** | Not enough data | Not enough data | 8.7 (30 reviews) | 
| **Task Management** | Not enough data | Not enough data | Feature Not Available | 
| **Dashboards and Visualizations** | Not enough data | Not enough data | 8.6 (30 reviews) | 
| **Access Control** | Not enough data | Not enough data | 8.9 (29 reviews) | 

#### Automation

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Test Automation** | Not enough data | Not enough data | 9.2 (30 reviews) | 
| **Intelligent Automation** | Not enough data | Not enough data | 9.0 (29 reviews) | 
| **Release Automation** | Not enough data | Not enough data | 9.3 (27 reviews) | 
| **Automated Provisioning** | Not enough data | Not enough data | 9.1 (32 reviews) | 

#### IT Management

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Workflow Management** | Not enough data | Not enough data | 9.0 (33 reviews) | 
| **Infrastructure Management** | Not enough data | Not enough data | 9.1 (31 reviews) | 
| **IT Discovery** | Not enough data | Not enough data | 8.5 (28 reviews) | 

### Cloud Compliance

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | 8.4/10 | 118 |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### Security

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Compliance Monitoring** | Not enough data | 8.9 (114 reviews) | Not enough data | 
| **Anomoly Detection** | Not enough data | 8.0 (110 reviews) | Not enough data | 
| **Data Loss Prevention** | Not enough data | 7.7 (101 reviews) | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | 8.5 (108 reviews) | Not enough data | 

#### Compliance

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Governance** | Not enough data | 8.8 (106 reviews) | Not enough data | 
| **Data Governance** | Not enough data | 8.3 (100 reviews) | Not enough data | 
| **Sensitive Data Compliance** | Not enough data | 8.5 (105 reviews) | Not enough data | 

#### Administration

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Policy Enforcement** | Not enough data | 8.3 (105 reviews) | Not enough data | 
| **Auditing** | Not enough data | 8.6 (109 reviews) | Not enough data | 
| **Workflow Management** | Not enough data | 7.9 (102 reviews) | Not enough data | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | 8.0/10 | 8 |
| **Orca Security** | 7.9/10 | 123 |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### Performance

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Issue Tracking** | 9.2 (8 reviews) | 8.6 (110 reviews) | Not enough data | 
| **Detection Rate** | 8.5 (8 reviews) | 8.8 (117 reviews) | Not enough data | 
| **False Positives** | 7.7 (5 reviews) | 7.5 (118 reviews) | Not enough data | 
| **Automated Scans** | 6.9 (6 reviews) | 9.2 (120 reviews) | Not enough data | 

#### Network

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Compliance Testing** | 7.6 (7 reviews) | 8.6 (112 reviews) | Not enough data | 
| **Perimeter Scanning** | 7.8 (6 reviews) | 8.6 (107 reviews) | Not enough data | 
| **Configuration Monitoring** | 8.3 (6 reviews) | 8.7 (112 reviews) | Not enough data | 

#### Application

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Manual Application Testing** | 8.6 (6 reviews) | 6.2 (88 reviews) | Not enough data | 
| **Static Code Analysis** | 7.8 (6 reviews) | 6.5 (85 reviews) | Not enough data | 
| **Black Box Testing** | 7.5 (6 reviews) | 6.3 (84 reviews) | Not enough data | 

#### Agentic AI - Vulnerability Scanner

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 

### Continuous Delivery

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | 9.0/10 | 18 |

#### Functionality

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Deployment-Ready Staging** | Not enough data | Not enough data | 9.1 (16 reviews) | 
| **Integration** | Not enough data | Not enough data | 8.9 (17 reviews) | 
| **Extensible** | Not enough data | Not enough data | 8.9 (16 reviews) | 

#### Management

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Processes and Workflow** | Not enough data | Not enough data | 9.1 (15 reviews) | 
| **Reporting** | Not enough data | Not enough data | 8.2 (16 reviews) | 
| **Automation** | Not enough data | Not enough data | 9.6 (16 reviews) | 

#### Agentic AI - Continuous Delivery

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | Not enough data | 
| **Natural Language Interaction** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 

### API Security

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | 8.1/10 | 33 |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### API Management 

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **API Discovery** | Not enough data | 8.6 (33 reviews) | Not enough data | 
| **API Monitoring** | Not enough data | 8.5 (31 reviews) | Not enough data | 
| **Reporting** | Not enough data | 8.4 (33 reviews) | Not enough data | 
| **Change Management** | Not enough data | 8.1 (30 reviews) | Not enough data | 

#### Security Testing

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Compliance Monitoring** | Not enough data | 8.8 (30 reviews) | Not enough data | 
| **API Verification** | Not enough data | 7.9 (29 reviews) | Not enough data | 
| **API Testing** | Not enough data | 7.5 (29 reviews) | Not enough data | 

#### Security Management

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Security and Policy Enforcement** | Not enough data | 8.5 (29 reviews) | Not enough data | 
| **Anomoly Detection** | Not enough data | 8.2 (31 reviews) | Not enough data | 
| **Bot Detection** | Not enough data | 6.0 (29 reviews) | Not enough data | 

### Log Analysis

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### Data Preparation

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Data Sources** | Not enough data | Not enough data | Feature Not Available | 
| **Indexing** | Not enough data | Not enough data | Feature Not Available | 
| **Automated Tagging** | Not enough data | Not enough data | Feature Not Available | 
| **Data Blending** | Not enough data | Not enough data | Feature Not Available | 

#### Analysis

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Track Trends** | Not enough data | Not enough data | Feature Not Available | 
| **Detect Anomalies** | Not enough data | Not enough data | Feature Not Available | 
| **Metric and Event Data** | Not enough data | Not enough data | Feature Not Available | 
| **Search** | Not enough data | Not enough data | Feature Not Available | 
| **Alerts** | Not enough data | Not enough data | Feature Not Available | 
| **Live Tail** | Not enough data | Not enough data | Not enough data | 

#### Visualization

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Dashboards** | Not enough data | Not enough data | Feature Not Available | 
| **Data Discovery** | Not enough data | Not enough data | Feature Not Available | 

#### Agentic AI - Log Analysis

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Multi-step Planning** | Not enough data | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | Not enough data | 
| **Natural Language Interaction** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | Not enough data | 

### DevOps Platforms

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | 8.4/10 | 14 |

#### Management

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Configuration Management** | Not enough data | Not enough data | 9.0 (12 reviews) | 
| **Access Control** | Not enough data | Not enough data | 8.0 (11 reviews) | 
| **Orchestration** | Not enough data | Not enough data | 7.9 (11 reviews) | 

#### Functionality

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Automation** | Not enough data | Not enough data | 9.0 (12 reviews) | 
| **Integrations** | Not enough data | Not enough data | 8.2 (10 reviews) | 
| **Extensibility** | Not enough data | Not enough data | 8.7 (10 reviews) | 

#### Processes

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Pipeline Control** | Not enough data | Not enough data | 8.3 (11 reviews) | 
| **Workflow Visualization** | Not enough data | Not enough data | 7.5 (10 reviews) | 
| **Continuous Deployment** | Not enough data | Not enough data | 8.3 (11 reviews) | 

### Continuous Integration

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | 8.3/10 | 5 |

#### Functionality

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Integrations** | Not enough data | Not enough data | 8.3 (5 reviews) | 
| **Extensibility** | Not enough data | Not enough data | 8.3 (5 reviews) | 
| **Test Customization** | Not enough data | Not enough data | 8.3 (5 reviews) | 

#### Management

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Automation** | Not enough data | Not enough data | 8.3 (5 reviews) | 
| **Processes and Workflow** | Not enough data | Not enough data | 8.0 (5 reviews) | 
| **Reporting** | Not enough data | Not enough data | 8.7 (5 reviews) | 

#### Agentic AI - Continuous Integration

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | Not enough data | 
| **Natural Language Interaction** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 

### Cloud Security Posture Management (CSPM)

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | 8.5/10 | 115 |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### Configuration

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **DLP Configuration** | Not enough data | 6.8 (82 reviews) | Not enough data | 
| **Configuration Monitoring** | Not enough data | 8.5 (95 reviews) | Not enough data | 
| **Unified Policy Management** | Not enough data | 8.1 (83 reviews) | Not enough data | 
| **Adaptive Access Control** | Not enough data | 7.6 (84 reviews) | Not enough data | 
| **API / Integrations** | Not enough data | 8.5 (92 reviews) | Not enough data | 

#### Visibility

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Multicloud Visibility** | Not enough data | 9.0 (101 reviews) | Not enough data | 
| **Asset Discovery** | Not enough data | 9.4 (104 reviews) | Not enough data | 

#### Vulnerability Management

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Threat Hunting** | Not enough data | 8.3 (90 reviews) | Not enough data | 
| **Vulnerability Scanning** | Not enough data | 9.1 (105 reviews) | Not enough data | 
| **Vulnerability Intelligence** | Not enough data | 8.9 (95 reviews) | Not enough data | 
| **Risk-Prioritization** | Not enough data | 8.9 (101 reviews) | Not enough data | 

### Cloud Infrastructure Entitlement Management (CIEM)

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | 8.4/10 | 31 |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### Access control - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Policy Management** | Not enough data | 8.9 (31 reviews) | Not enough data | 
| **Fine-Grained Access Control** | Not enough data | 8.4 (30 reviews) | Not enough data | 
| **Role-Based Access Control (RBAC)** | Not enough data | 8.3 (30 reviews) | Not enough data | 
| **AI-driven access control** | Not enough data | 7.6 (30 reviews) | Not enough data | 

#### Monitoring - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Monitoring** | Not enough data | 8.4 (31 reviews) | Not enough data | 
| **AI-based detection** | Not enough data | 7.5 (30 reviews) | Not enough data | 

#### Auditing - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Visibility** | Not enough data | 9.2 (31 reviews) | Not enough data | 
| **Compliance Reporting** | Not enough data | 8.8 (31 reviews) | Not enough data | 

### Runbook Automation

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### Automation Support - Runbook Automation

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Common Tool Integration** | Not enough data | Not enough data | Not enough data | 
| **Scripting Language Support** | Not enough data | Not enough data | Not enough data | 
| **Routine Task Automation** | Not enough data | Not enough data | Not enough data | 
| **Automated Task Notifications** | Not enough data | Not enough data | Not enough data | 

#### Error Management - Runbook Automation

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Runbook Procedure Updates** | Not enough data | Not enough data | Not enough data | 
| **Recovery Options** | Not enough data | Not enough data | Not enough data | 
| **Error Management in Automation** | Not enough data | Not enough data | Not enough data | 

#### Customization - Runbook Automation

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Runbook Customization** | Not enough data | Not enough data | Not enough data | 
| **Workflow Customization** | Not enough data | Not enough data | Not enough data | 
| **Incident Response Customization** | Not enough data | Not enough data | Not enough data | 

#### Compliance and Reporting - Runbook Automation

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Security Management** | Not enough data | Not enough data | Not enough data | 
| **Compliance Standards Adherence** | Not enough data | Not enough data | Not enough data | 
| **Reporting and Auditing** | Not enough data | Not enough data | Not enough data | 

#### Performance - Runbook Automation

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Self-Service for Non-IT Staff** | Not enough data | Not enough data | Not enough data | 
| **Team Collaboration Enhancement** | Not enough data | Not enough data | Not enough data | 
| **Load Handling Performance** | Not enough data | Not enough data | Not enough data | 

#### Agentic AI - Runbook Automation

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Multi-step Planning** | Not enough data | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | Not enough data | 
| **Natural Language Interaction** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | Not enough data | 

### Cloud-Native Application Protection Platform (CNAPP)

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### Security - Cloud-Native Application Protection Platform (CNAPP)

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Workload and container security** | Not enough data | Not enough data | Not enough data | 
| **Threat detection and response** | Not enough data | Not enough data | Not enough data | 
| **DevSecOps Integrations** | Not enough data | Not enough data | Not enough data | 
| **Unified Visibility** | Not enough data | Not enough data | Not enough data | 

#### Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Intelligent remediations and suggestions** | Not enough data | Not enough data | Not enough data | 
| **Risk prioritization** | Not enough data | Not enough data | Not enough data | 
| **Anomaly detection using machine learning** | Not enough data | Not enough data | Not enough data | 

#### Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Multi-cloud visibility** | Not enough data | Not enough data | Not enough data | 
| **Cloud Security Posture Management (CSPM)** | Not enough data | Not enough data | Not enough data | 

#### Agentic AI - Cloud-Native Application Protection Platform (CNAPP)

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | Not enough data | 

### AI Security Posture Management (AI-SPM) Tools

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### Functionality - AI Security Posture Management (AI-SPM) Tools

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Security Ecosystem Integration** | Not enough data | Not enough data | Not enough data | 
| **AI Asset Discovery** | Not enough data | Not enough data | Not enough data | 
| **Adaptive Policy Updates** | Not enough data | Not enough data | Not enough data | 
| **Access and Permissions Monitoring** | Not enough data | Not enough data | Not enough data | 
| **Policy Enforcement** | Not enough data | Not enough data | Not enough data | 

#### Risk Assessment - AI Security Posture Management (AI-SPM) Tools

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **AI Risk Assessment** | Not enough data | Not enough data | Not enough data | 
| **AI Asset Posture Scoring** | Not enough data | Not enough data | Not enough data | 

#### Governance &amp; Compliance - AI Security Posture Management (AI-SPM) Tools

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **AI‑Generated Content Controls** | Not enough data | Not enough data | Not enough data | 
| **Audit Trails** | Not enough data | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### Cloud Visibility

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | Not enough data | 

#### Security

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Data Security** | Not enough data | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | Not enough data | 

#### Identity

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **SSO** | Not enough data | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | Not enough data | 

### Enterprise IT Management

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | 7.0/10 | 15 |

#### Analysis

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Threat Detection** | Not enough data | Not enough data | 5.6 (13 reviews) | 

#### Platform

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Unified Communications Platform** | Not enough data | Not enough data | Feature Not Available | 
| **Remote Access** | Not enough data | Not enough data | 7.1 (12 reviews) | 
| **ITIL Policy Compliance** | Not enough data | Not enough data | 6.3 (13 reviews) | 
| **Asset Tracking** | Not enough data | Not enough data | 6.5 (12 reviews) | 
| **IT Knowledge Management** | Not enough data | Not enough data | 6.9 (12 reviews) | 

#### Security

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Endpoint Protection** | Not enough data | Not enough data | 6.0 (12 reviews) | 
| **Patch Management** | Not enough data | Not enough data | 8.5 (14 reviews) | 
| **Disaster Recovery** | Not enough data | Not enough data | 6.8 (12 reviews) | 
| **Service Management** | Not enough data | Not enough data | 8.6 (12 reviews) | 
| **Workflow Management** | Not enough data | Not enough data | 8.3 (12 reviews) | 

#### Agentic AI - Enterprise IT Management

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Multi-step Planning** | Not enough data | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | Not enough data | 
| **Natural Language Interaction** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | Not enough data | 

### Cloud Detection and Response (CDR)

| Product | Score | Reviews |
|---|---|---|
| **DefectDojo** | N/A | N/A |
| **Orca Security** | N/A | N/A |
| **Red Hat Ansible Automation Platform** | N/A | N/A |

#### Agentic AI - Cloud Detection and Response (CDR)

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | Not enough data | 

#### Services - Cloud Detection and Response (CDR) 

| Feature | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Managed Services** | Not enough data | Not enough data | Not enough data | 

---
## Categories
**Shared Categories (1):** [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner)


**Unique to Orca Security (9):** [Cloud-Native Application Protection Platform (CNAPP)](https://www.g2.com/categories/cloud-native-application-protection-platform-cnapp), [Cloud Security Posture Management (CSPM) Software](https://www.g2.com/categories/cloud-security-posture-management-cspm), [Cloud Compliance Software](https://www.g2.com/categories/cloud-compliance), [Container Security Tools](https://www.g2.com/categories/container-security-tools), [Cloud Workload Protection Platforms](https://www.g2.com/categories/cloud-workload-protection-platforms), [API Security Tools](https://www.g2.com/categories/api-security), [Cloud Infrastructure Entitlement Management (CIEM) Software](https://www.g2.com/categories/cloud-infrastructure-entitlement-management-ciem), [Cloud Detection and Response (CDR) Software](https://www.g2.com/categories/cloud-detection-and-response-cdr), [AI Security Posture Management (AI-SPM) Tools Software](https://www.g2.com/categories/ai-security-posture-management-ai-spm-tools)

**Unique to Red Hat Ansible Automation Platform (12):** [DevOps Platforms](https://www.g2.com/categories/devops-platforms), [Cloud Infrastructure Automation Software](https://www.g2.com/categories/cloud-infrastructure-automation), [Network Automation Tools](https://www.g2.com/categories/network-automation-tools), [Application Release Orchestration (ARO) Tools](https://www.g2.com/categories/application-release-orchestration), [Patch Management Software](https://www.g2.com/categories/patch-management), [Log Analysis Software](https://www.g2.com/categories/log-analysis), [Enterprise IT Management Software](https://www.g2.com/categories/enterprise-it-management), [Continuous Delivery Tools](https://www.g2.com/categories/continuous-delivery-tools), [Configuration Management Tools](https://www.g2.com/categories/configuration-management), [Continuous Integration Tools](https://www.g2.com/categories/continuous-integration), [Build Automation Software](https://www.g2.com/categories/build-automation), [Runbook Automation Software](https://www.g2.com/categories/runbook-automation)


---
## Reviewer Demographics

### By Company Size

| Segment | DefectDojo | Orca Security | Red Hat Ansible Automation Platform | 
|---|---|---|---|
| **Small-Business** | 36.4% | 11.1% | 16.3% | 
| **Mid-Market** | 63.6% | 44.7% | 35.3% | 
| **Enterprise** | 0% | 44.3% | 48.4% | 

### By Industry

#### DefectDojo

- **Computer &amp; Network Security:** 63.6%
- **Information Technology and Services:** 27.3%
- **Staffing and Recruiting:** 9.1%

#### Orca Security

- **Information Technology and Services:** 15.4%
- **Computer Software:** 13.0%
- **Financial Services:** 8.7%
- **Computer &amp; Network Security:** 5.9%
- **Marketing and Advertising:** 5.1%
- **Hospital &amp; Health Care:** 4.7%
- **Insurance:** 4.3%
- **Retail:** 3.2%
- **Education Management:** 3.2%
- **Automotive:** 2.8%
- **Other:** 33.6%

#### Red Hat Ansible Automation Platform

- **Information Technology and Services:** 16.1%
- **Financial Services:** 10.6%
- **Computer Software:** 9.0%
- **Telecommunications:** 8.2%
- **Banking:** 6.3%
- **Computer &amp; Network Security:** 3.5%
- **Government Administration:** 3.5%
- **Higher Education:** 3.5%
- **Insurance:** 3.5%
- **Internet:** 3.0%
- **Other:** 32.7%

---
## Alternatives

### Alternatives to DefectDojo

- [Tenable Nessus](https://www.g2.com/products/tenable-nessus/reviews) — 4.5/5 stars (301 reviews)
- [Snyk](https://www.g2.com/products/snyk/reviews) — 4.5/5 stars (132 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (784 reviews)
- [Gearset DevOps](https://www.g2.com/products/gearset-devops/reviews) — 4.7/5 stars (292 reviews)
- [Harness Platform](https://www.g2.com/products/harness-platform/reviews) — 4.6/5 stars (281 reviews)
- [Qualys VMDR](https://www.g2.com/products/qualys-vmdr/reviews) — 4.4/5 stars (167 reviews)
- [Tenable Security Center](https://www.g2.com/products/tenable-security-center/reviews) — 4.6/5 stars (83 reviews)
- [Intruder](https://www.g2.com/products/intruder/reviews) — 4.8/5 stars (206 reviews)
- [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews) — 4.7/5 stars (201 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)

### Alternatives to Orca Security

- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (784 reviews)
- [Microsoft Defender for Cloud](https://www.g2.com/products/microsoft-defender-for-cloud/reviews) — 4.4/5 stars (308 reviews)
- [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews) — 4.4/5 stars (386 reviews)
- [Cortex Cloud](https://www.g2.com/products/cortex-cloud/reviews) — 4.1/5 stars (112 reviews)
- [Sysdig Secure](https://www.g2.com/products/sysdig-sysdig-secure/reviews) — 4.8/5 stars (112 reviews)
- [CrowdStrike Falcon Cloud Security](https://www.g2.com/products/crowdstrike-falcon-cloud-security/reviews) — 4.6/5 stars (85 reviews)
- [Tenable Nessus](https://www.g2.com/products/tenable-nessus/reviews) — 4.5/5 stars (301 reviews)
- [Vanta](https://www.g2.com/products/vanta/reviews) — 4.6/5 stars (2432 reviews)
- [Scrut Automation](https://www.g2.com/products/scrut-automation/reviews) — 4.9/5 stars (1300 reviews)
- [Drata](https://www.g2.com/products/drata/reviews) — 4.7/5 stars (1158 reviews)

### Alternatives to Red Hat Ansible Automation Platform

- [GitHub](https://www.g2.com/products/github/reviews) — 4.7/5 stars (2345 reviews)
- [GitLab](https://www.g2.com/products/gitlab/reviews) — 4.5/5 stars (890 reviews)
- [Jenkins](https://www.g2.com/products/jenkins/reviews) — 4.4/5 stars (561 reviews)
- [CircleCI](https://www.g2.com/products/circleci/reviews) — 4.4/5 stars (509 reviews)
- [Harness Platform](https://www.g2.com/products/harness-platform/reviews) — 4.6/5 stars (281 reviews)
- [Azure Pipelines](https://www.g2.com/products/azure-pipelines/reviews) — 4.3/5 stars (373 reviews)
- [Octopus Deploy](https://www.g2.com/products/octopus-deploy/reviews) — 4.4/5 stars (58 reviews)
- [CloudBees](https://www.g2.com/products/cloudbees/reviews) — 4.4/5 stars (622 reviews)
- [Progress Chef](https://www.g2.com/products/progress-chef/reviews) — 4.2/5 stars (102 reviews)
- [Azure DevOps Server](https://www.g2.com/products/azure-devops-server/reviews) — 4.2/5 stars (198 reviews)

---
## Top Discussions

### DefectDojo

No discussions available for this product.

### Orca Security

- Title: [Where is Orca security based?](https://www.g2.com/discussions/where-is-orca-security-based) — 2 comments
  > **Top comment:** "Orca Security is based in Los Angeles, California, United States."
- Title: [How much does Orca security cost?](https://www.g2.com/discussions/how-much-does-orca-security-cost) — 1 comment
  > **Top comment:** "$6500 per 50 workloads per year"
- Title: [What is ORCA platform?](https://www.g2.com/discussions/what-is-orca-platform) — 1 comment
  > **Top comment:** "SIEM tool for hunting threats, outdated oackages, overpowerful permissions, expired certificates. Mainly for AWS services"
- Title: [What does Orca Security do?](https://www.g2.com/discussions/what-does-orca-security-do) — 1 comment *(includes official response)*
  > **Top comment:** "Orca Security is a leader in CNAPP innovation (Cloud Native Application Protection Platform) for workload and data protection, cloud security posture..."

### Red Hat Ansible Automation Platform

- Title: [What is Red Hat Ansible Automation Platform used for?](https://www.g2.com/discussions/what-is-red-hat-ansible-automation-platform-used-for) — 1 comment
  > **Top comment:** "Red Hat Ansible Automation Platform streamlines IT operations by automating configuration management, application deployment, and task automation. It excels..."

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/defectdojo-vs-orca-security-vs-red-hat-ansible-automation-platform)

