2026 Best Software Awards are here!See the list

Compare F5 Distributed Cloud App Infrastructure Protection (AIP) and Orca Security

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
F5 Distributed Cloud App Infrastructure Protection (AIP)
F5 Distributed Cloud App Infrastructure Protection (AIP)
Star Rating
(44)4.4 out of 5
Market Segments
Mid-Market (70.5% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about F5 Distributed Cloud App Infrastructure Protection (AIP)
Orca Security
Orca Security
Star Rating
(224)4.6 out of 5
Market Segments
Mid-Market (50.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Learn more about Orca Security

F5 Distributed Cloud App Infrastructure Protection (AIP) vs Orca Security

When assessing the two solutions, reviewers found Orca Security easier to use, set up, and administer. However, reviewers felt that both vendors make it equally easy to do business overall.

  • Reviewers felt that Orca Security meets the needs of their business better than F5 Distributed Cloud App Infrastructure Protection (AIP).
  • When comparing quality of ongoing product support, reviewers felt that F5 Distributed Cloud App Infrastructure Protection (AIP) is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Orca Security over F5 Distributed Cloud App Infrastructure Protection (AIP).
Pricing
Entry-Level Pricing
F5 Distributed Cloud App Infrastructure Protection (AIP)
No pricing available
Orca Security
By Compute Asset
Contact Us
Learn more about Orca Security
Free Trial
F5 Distributed Cloud App Infrastructure Protection (AIP)
No trial information available
Orca Security
Free Trial is available
Ratings
Meets Requirements
8.7
35
9.1
191
Ease of Use
8.0
35
9.0
196
Ease of Setup
8.2
24
9.3
172
Ease of Admin
8.8
24
9.0
151
Quality of Support
9.3
36
9.2
186
Has the product been a good partner in doing business?
9.4
24
9.4
150
Product Direction (% positive)
8.3
34
9.7
180
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
8.1
9
8.5
62
Management
8.8
7
8.5
56
Feature Not Available
8.0
51
7.9
8
9.0
55
Operations
Feature Not Available
8.5
51
8.1
9
8.5
55
8.3
6
8.7
55
Security Controls
8.3
9
8.7
56
Feature Not Available
7.7
53
8.1
8
8.8
60
7.5
8
8.7
57
Not enough data
8.2
60
Administration
Feature Not Available
8.6
59
Feature Not Available
8.0
51
Not enough data
8.9
58
Not enough data
8.6
56
Monitoring
Not enough data
8.4
50
Not enough data
7.8
48
Not enough data
8.5
52
Protection
Not enough data
8.1
52
Not enough data
7.5
48
Not enough data
7.8
51
Not enough data
7.7
47
8.4
19
8.4
118
Security
8.6
16
8.9
114
8.7
15
8.0
110
Feature Not Available
7.7
101
7.9
15
8.5
108
Compliance
Feature Not Available
8.8
106
Feature Not Available
8.3
100
8.5
14
8.5
105
Administration
Feature Not Available
8.3
105
8.5
16
8.6
109
Feature Not Available
7.9
102
Not enough data
7.9
122
Performance
Not enough data
8.6
109
Not enough data
8.8
116
Not enough data
7.5
117
Not enough data
9.2
119
Network
Not enough data
8.5
111
Not enough data
8.6
106
Not enough data
8.8
111
Application
Not enough data
6.2
87
Not enough data
6.5
84
Not enough data
6.3
83
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
8.3
19
Not enough data
Activity Monitoring
Feature Not Available
Not enough data
Feature Not Available
Not enough data
7.5
10
Not enough data
8.5
11
Not enough data
Security
8.8
12
Not enough data
9.2
13
Not enough data
8.3
11
Not enough data
Administration
7.9
14
Not enough data
7.7
14
Not enough data
8.3
9
Not enough data
Agentic AI - Cloud Security Monitoring and Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.1
33
API Management
Not enough data
8.6
33
Not enough data
8.5
31
Not enough data
8.4
33
Not enough data
8.1
30
Security Testing
Not enough data
8.8
30
Not enough data
7.9
29
Not enough data
7.5
29
Security Management
Not enough data
8.5
29
Not enough data
8.2
31
Not enough data
6.0
29
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
8.5
98
Configuration
Feature Not Available
6.8
81
Not enough data
8.5
92
Not enough data
8.1
81
Feature Not Available
7.6
83
Not enough data
8.4
87
Visibility
Feature Not Available
9.1
92
Feature Not Available
9.3
94
Vulnerability Management
Not enough data
8.3
89
Not enough data
9.1
96
Not enough data
8.9
94
Not enough data
8.9
95
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
Not enough data
8.4
31
Access control - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
8.9
31
Not enough data
8.4
30
Not enough data
8.3
30
Not enough data
7.6
30
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
8.4
31
Not enough data
7.5
30
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
9.2
31
Not enough data
8.8
31
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Agentic AI - Cloud Detection and Response (CDR)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Cloud Detection and Response (CDR)
Not enough data
Not enough data
Categories
Categories
Shared Categories
F5 Distributed Cloud App Infrastructure Protection (AIP)
F5 Distributed Cloud App Infrastructure Protection (AIP)
Orca Security
Orca Security
F5 Distributed Cloud App Infrastructure Protection (AIP) and Orca Security are categorized as Cloud Compliance, Container Security, Cloud Workload Protection Platforms, and Cloud Security Posture Management (CSPM)
Reviews
Reviewers' Company Size
F5 Distributed Cloud App Infrastructure Protection (AIP)
F5 Distributed Cloud App Infrastructure Protection (AIP)
Small-Business(50 or fewer emp.)
20.5%
Mid-Market(51-1000 emp.)
70.5%
Enterprise(> 1000 emp.)
9.1%
Orca Security
Orca Security
Small-Business(50 or fewer emp.)
11.7%
Mid-Market(51-1000 emp.)
50.7%
Enterprise(> 1000 emp.)
37.7%
Reviewers' Industry
F5 Distributed Cloud App Infrastructure Protection (AIP)
F5 Distributed Cloud App Infrastructure Protection (AIP)
Computer Software
34.1%
Information Technology and Services
13.6%
Hospital & Health Care
9.1%
Marketing and Advertising
6.8%
Internet
6.8%
Other
29.5%
Orca Security
Orca Security
Computer Software
14.8%
Information Technology and Services
13.5%
Financial Services
9.4%
Computer & Network Security
6.7%
Hospital & Health Care
5.4%
Other
50.2%
Alternatives
F5 Distributed Cloud App Infrastructure Protection (AIP)
F5 Distributed Cloud App Infrastructure Protection (AIP) Alternatives
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Wiz
Wiz
Add Wiz
Vanta
Vanta
Add Vanta
Sumo Logic
Sumo Logic
Add Sumo Logic
Orca Security
Orca Security Alternatives
Wiz
Wiz
Add Wiz
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Cortex Cloud
Cortex Cloud
Add Cortex Cloud
Discussions
F5 Distributed Cloud App Infrastructure Protection (AIP)
F5 Distributed Cloud App Infrastructure Protection (AIP) Discussions
Monty the Mongoose crying
F5 Distributed Cloud App Infrastructure Protection (AIP) has no discussions with answers
Orca Security
Orca Security Discussions
What does Orca Security do?
1 Comment
Official Response from Orca Security
Orca Security is a leader in CNAPP innovation (Cloud Native Application Protection Platform) for workload and data protection, cloud security posture...Read more
What is ORCA platform?
1 Comment
Yevhen R.
YR
SIEM tool for hunting threats, outdated oackages, overpowerful permissions, expired certificates. Mainly for AWS servicesRead more
How much does Orca security cost?
1 Comment
MS
$6500 per 50 workloads per yearRead more