# Orca Security vs Snyk Comparison
---
## AI Generated Summary
- **G2 reviewers report** that Snyk excels in integrating security into the developer workflow, with features like real-time vulnerability feedback through plugins for VS Code and JetBrains. This seamless integration helps developers address vulnerabilities quickly, significantly reducing remediation time.
- **Users say** that Orca Security stands out for its robust compliance management capabilities across cloud environments. The continuous built-in checks provide users with an up-to-date view of their compliance status, which is particularly beneficial for organizations operating in regulated industries.
- **According to verified reviews** , Snyk offers a free entry-level pricing model, making it accessible for smaller teams or startups looking to enhance their security posture without a significant financial commitment. This flexibility is a notable advantage for budget-conscious users.
- **Reviewers mention** that Orca Security&#39;s agentless side-scanning feature provides peace of mind for administrators, especially those managing sensitive data. This capability allows for thorough security assessments without the overhead of deploying agents, which can be a significant operational advantage.
- **Users highlight** that Snyk&#39;s integration with platforms like GitHub and AWS enhances the DevSecOps experience, allowing for quick vulnerability patching through pull requests. This feature is particularly praised for its ability to streamline the development process while maintaining security standards.
- **G2 reviewers note** that while both products have high satisfaction ratings, Orca Security generally receives higher scores for support quality and ease of use. Users appreciate the responsive support team and the intuitive interface, which simplifies the onboarding process and daily operations.



| | Orca Security | Snyk | 
|---|---|---|
| **Star Rating** | 4.6 out of 5 | 4.5 out of 5 | 
| **Total Reviews** | 257 | 132 | 
| **Largest Market Segment** | Enterprise (44.7% of reviews) | Mid-Market (45.4% of reviews) | 
| **Entry Level Price** | Contact Us | Free | 

---
## Top Pros & Cons

### Orca Security

Pros:
- Ease of Use (37 reviews)
- Features (33 reviews)

Cons:
- Improvement Needed (15 reviews)
- Feature Limitations (12 reviews)

### Snyk

Pros:
- Vulnerability Detection (3 reviews)
- Vulnerability Identification (3 reviews)

Cons:
- False Positives (2 reviews)
- Poor Interface Design (2 reviews)

---
## Ratings Comparison
| Rating | Orca Security | Snyk | 
|---|---|---|
  | **Meets Requirements** | 9.0 (200 reviews) | 8.7 (94 reviews) | 
  | **Ease of Use** | 9.1 (228 reviews) | 8.8 (95 reviews) | 
  | **Ease of Setup** | 9.3 (204 reviews) | 9.1 (58 reviews) | 
  | **Ease of Admin** | 9.0 (151 reviews) | 8.9 (51 reviews) | 
  | **Quality of Support** | 9.1 (195 reviews) | 8.7 (79 reviews) | 
  | **Has the product been a good partner in doing business?** | 9.4 (150 reviews) | 8.8 (48 reviews) | 
  | **Product Direction (% positive)** | 9.8 (189 reviews) | 8.8 (84 reviews) | 

---
## Pricing

### Orca Security

#### Entry-Level Pricing

Plan: By Compute Asset

Price: Contact Us

Description: An annual Orca subscription license is priced by compute asset. This lets you embrace new technologies (such as Orca) without concern of being charged for such assets as cloud storage or databases.

Key Features:
- visit website for all features

[Learn more about Orca Security](https://www.g2.com/products/orca-security/reviews)

#### Free Trial

Yes

### Snyk

#### Entry-Level Pricing

Plan: FREE - Limited Tests, Unlimited Developers

Price: Free

Description: For individual developers and small teams looking to secure while they build. Unlimited Developers.

Key Features:
- 200 Open Source tests per month
- 100 Container tests per month
- 300 IaC tests per month

[Browse all 3 editions](https://www.g2.com/products/snyk/pricing)

#### Free Trial

No

---
## Features Comparison By Category

### Cloud Workload Protection Platforms

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.4/10 | 90 |
| **Snyk** | N/A | N/A |

#### Management

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Dashboards and Reports** | 8.1 (71 reviews) | Not enough data | 
| **Workflow Management** | 7.9 (52 reviews) | Not enough data | 
| **Administration Console** | 8.4 (66 reviews) | Not enough data | 

#### Operations

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Governance** | 8.5 (51 reviews) | Not enough data | 
| **Logging and Reporting** | 8.5 (59 reviews) | Not enough data | 
| **API / Integrations** | 8.8 (63 reviews) | Not enough data | 

#### Security Controls 

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Anomaly Detection** | 8.7 (56 reviews) | Not enough data | 
| **Data Loss Prevention** | 7.7 (53 reviews) | Not enough data | 
| **Security Auditing** | 9.1 (76 reviews) | Not enough data | 
| **Cloud Gap Analytics** | 8.7 (57 reviews) | Not enough data | 

### Static Application Security Testing (SAST)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Snyk** | 7.8/10 | 25 |

#### Administration

| Feature | Orca Security | Snyk | 
|---|---|---|
| **API / Integrations** | Not enough data | 8.6 (22 reviews) | 
| **Extensibility** | Not enough data | 8.1 (18 reviews) | 

#### Analysis

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Reporting and Analytics** | Not enough data | 8.5 (23 reviews) | 
| **Issue Tracking** | Not enough data | 8.3 (22 reviews) | 
| **Static Code Analysis** | Not enough data | 8.7 (24 reviews) | 
| **Code Analysis** | Not enough data | 8.9 (21 reviews) | 

#### Testing

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Command-Line Tools** | Not enough data | 7.8 (18 reviews) | 
| **Manual Testing** | Not enough data | 6.5 (14 reviews) | 
| **Test Automation** | Not enough data | 7.8 (19 reviews) | 
| **Compliance Testing** | Not enough data | 8.1 (15 reviews) | 
| **Black-Box Scanning** | Not enough data | 6.2 (13 reviews) | 
| **Detection Rate** | Not enough data | 7.5 (19 reviews) | 
| **False Positives** | Not enough data | 6.4 (17 reviews) | 

#### Agentic AI - Static Application Security Testing (SAST)

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 

### Container Security

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.2/10 | 60 |
| **Snyk** | 7.5/10 | 32 |

#### Administration

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Risk Scoring** | 8.6 (59 reviews) | 8.4 (29 reviews) | 
| **Secrets Management** | 8.0 (51 reviews) | Feature Not Available | 
| **Security Auditing** | 8.9 (58 reviews) | 7.9 (26 reviews) | 
| **Configuration Management** | 8.6 (56 reviews) | 7.5 (19 reviews) | 

#### Monitoring

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Continuous Image Assurance** | 8.4 (50 reviews) | 8.0 (17 reviews) | 
| **Behavior Monitoring** | 7.8 (48 reviews) | 6.5 (13 reviews) | 
| **Observability** | 8.5 (52 reviews) | 7.1 (15 reviews) | 

#### Protection

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Dynamic Image Scanning** | 8.1 (52 reviews) | 7.4 (16 reviews) | 
| **Runtime Protection** | 7.5 (48 reviews) | 7.5 (17 reviews) | 
| **Workload Protection** | 7.8 (51 reviews) | 7.4 (14 reviews) | 
| **Network Segmentation** | 7.7 (47 reviews) | 6.9 (12 reviews) | 

### Cloud Compliance

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.4/10 | 118 |
| **Snyk** | N/A | N/A |

#### Security

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Compliance Monitoring** | 8.9 (114 reviews) | Not enough data | 
| **Anomoly Detection** | 8.0 (110 reviews) | Not enough data | 
| **Data Loss Prevention** | 7.7 (101 reviews) | Not enough data | 
| **Cloud Gap Analytics** | 8.5 (108 reviews) | Not enough data | 

#### Compliance

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Governance** | 8.8 (106 reviews) | Not enough data | 
| **Data Governance** | 8.3 (100 reviews) | Not enough data | 
| **Sensitive Data Compliance** | 8.5 (105 reviews) | Not enough data | 

#### Administration

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Policy Enforcement** | 8.3 (105 reviews) | Not enough data | 
| **Auditing** | 8.6 (109 reviews) | Not enough data | 
| **Workflow Management** | 7.9 (102 reviews) | Not enough data | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 7.9/10 | 123 |
| **Snyk** | 8.1/10 | 43 |

#### Performance

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Issue Tracking** | 8.6 (110 reviews) | 8.5 (36 reviews) | 
| **Detection Rate** | 8.8 (117 reviews) | 8.5 (40 reviews) | 
| **False Positives** | 7.5 (118 reviews) | 6.7 (32 reviews) | 
| **Automated Scans** | 9.2 (120 reviews) | 9.1 (41 reviews) | 

#### Network

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Compliance Testing** | 8.6 (112 reviews) | 8.1 (25 reviews) | 
| **Perimeter Scanning** | 8.6 (107 reviews) | 7.9 (19 reviews) | 
| **Configuration Monitoring** | 8.7 (112 reviews) | 8.2 (20 reviews) | 

#### Application

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Manual Application Testing** | 6.2 (88 reviews) | 7.8 (17 reviews) | 
| **Static Code Analysis** | 6.5 (85 reviews) | 8.5 (34 reviews) | 
| **Black Box Testing** | 6.3 (84 reviews) | 7.4 (13 reviews) | 

#### Agentic AI - Vulnerability Scanner

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | 

### Software Composition Analysis

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Snyk** | 8.4/10 | 37 |

#### Functionality - Software Composition Analysis 

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Language Support** | Not enough data | 8.1 (24 reviews) | 
| **Integration** | Not enough data | 8.7 (30 reviews) | 
| **Transparency** | Not enough data | 8.3 (31 reviews) | 

#### Effectiveness - Software Composition Analysis

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Remediation Suggestions** | Not enough data | 8.3 (32 reviews) | 
| **Continuous Monitoring** | Not enough data | 8.7 (30 reviews) | 
| **Thorough Detection** | Not enough data | 8.2 (32 reviews) | 

### API Security

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.1/10 | 33 |
| **Snyk** | N/A | N/A |

#### API Management 

| Feature | Orca Security | Snyk | 
|---|---|---|
| **API Discovery** | 8.6 (33 reviews) | Not enough data | 
| **API Monitoring** | 8.5 (31 reviews) | Not enough data | 
| **Reporting** | 8.4 (33 reviews) | Not enough data | 
| **Change Management** | 8.1 (30 reviews) | Not enough data | 

#### Security Testing

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Compliance Monitoring** | 8.8 (30 reviews) | Not enough data | 
| **API Verification** | 7.9 (29 reviews) | Not enough data | 
| **API Testing** | 7.5 (29 reviews) | Not enough data | 

#### Security Management

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Security and Policy Enforcement** | 8.5 (29 reviews) | Not enough data | 
| **Anomoly Detection** | 8.2 (31 reviews) | Not enough data | 
| **Bot Detection** | 6.0 (29 reviews) | Not enough data | 

### Cloud Security Posture Management (CSPM)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.5/10 | 116 |
| **Snyk** | N/A | N/A |

#### Configuration

| Feature | Orca Security | Snyk | 
|---|---|---|
| **DLP Configuration** | 6.8 (82 reviews) | Not enough data | 
| **Configuration Monitoring** | 8.5 (96 reviews) | Not enough data | 
| **Unified Policy Management** | 8.1 (83 reviews) | Not enough data | 
| **Adaptive Access Control** | 7.6 (84 reviews) | Not enough data | 
| **API / Integrations** | 8.5 (93 reviews) | Not enough data | 

#### Visibility

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Multicloud Visibility** | 9.0 (101 reviews) | Not enough data | 
| **Asset Discovery** | 9.4 (104 reviews) | Not enough data | 

#### Vulnerability Management

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Threat Hunting** | 8.3 (90 reviews) | Not enough data | 
| **Vulnerability Scanning** | 9.1 (106 reviews) | Not enough data | 
| **Vulnerability Intelligence** | 8.9 (95 reviews) | Not enough data | 
| **Risk-Prioritization** | 8.9 (101 reviews) | Not enough data | 

### Software Supply Chain Security Tools

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Snyk** | N/A | N/A |

#### Security

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Tampering** | Not enough data | Not enough data | 
| **Malicious Code** | Not enough data | Not enough data | 
| **Verification** | Not enough data | Not enough data | 
| **Security Risks** | Not enough data | Not enough data | 

#### Tracking

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Bill of Materials** | Not enough data | Not enough data | 
| **Audit Trails** | Not enough data | Not enough data | 
| **Monitoring** | Not enough data | Not enough data | 

### Cloud Infrastructure Entitlement Management (CIEM)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.4/10 | 31 |
| **Snyk** | N/A | N/A |

#### Access control - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Policy Management** | 8.9 (31 reviews) | Not enough data | 
| **Fine-Grained Access Control** | 8.4 (30 reviews) | Not enough data | 
| **Role-Based Access Control (RBAC)** | 8.3 (30 reviews) | Not enough data | 
| **AI-driven access control** | 7.6 (30 reviews) | Not enough data | 

#### Monitoring - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Monitoring** | 8.4 (31 reviews) | Not enough data | 
| **AI-based detection** | 7.5 (30 reviews) | Not enough data | 

#### Auditing - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Visibility** | 9.2 (31 reviews) | Not enough data | 
| **Compliance Reporting** | 8.8 (31 reviews) | Not enough data | 

### Software Bill of Materials (SBOM)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Snyk** | N/A | N/A |

#### Functionality - Software Bill of Materials (SBOM)

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Format Support** | Not enough data | Not enough data | 
| **Annotations** | Not enough data | Not enough data | 
| **Attestation** | Not enough data | Not enough data | 

#### Management - Software Bill of Materials (SBOM)

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Monitoring** | Not enough data | Not enough data | 
| **Dashboards** | Not enough data | Not enough data | 
| **User Provisioning** | Not enough data | Not enough data | 

### Cloud-Native Application Protection Platform (CNAPP)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Snyk** | N/A | N/A |

#### Security - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Workload and container security** | Not enough data | Not enough data | 
| **Threat detection and response** | Not enough data | Not enough data | 
| **DevSecOps Integrations** | Not enough data | Not enough data | 
| **Unified Visibility** | Not enough data | Not enough data | 

#### Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Intelligent remediations and suggestions** | Not enough data | Not enough data | 
| **Risk prioritization** | Not enough data | Not enough data | 
| **Anomaly detection using machine learning** | Not enough data | Not enough data | 

#### Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Multi-cloud visibility** | Not enough data | Not enough data | 
| **Cloud Security Posture Management (CSPM)** | Not enough data | Not enough data | 

#### Agentic AI - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | 

### AI Security Posture Management (AI-SPM) Tools

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Snyk** | N/A | N/A |

#### Functionality - AI Security Posture Management (AI-SPM) Tools

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Security Ecosystem Integration** | Not enough data | Not enough data | 
| **AI Asset Discovery** | Not enough data | Not enough data | 
| **Adaptive Policy Updates** | Not enough data | Not enough data | 
| **Access and Permissions Monitoring** | Not enough data | Not enough data | 
| **Policy Enforcement** | Not enough data | Not enough data | 

#### Risk Assessment - AI Security Posture Management (AI-SPM) Tools

| Feature | Orca Security | Snyk | 
|---|---|---|
| **AI Risk Assessment** | Not enough data | Not enough data | 
| **AI Asset Posture Scoring** | Not enough data | Not enough data | 

#### Governance &amp; Compliance - AI Security Posture Management (AI-SPM) Tools

| Feature | Orca Security | Snyk | 
|---|---|---|
| **AI‑Generated Content Controls** | Not enough data | Not enough data | 
| **Audit Trails** | Not enough data | Not enough data | 

### AI AppSec Assistants

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Snyk** | N/A | N/A |

#### Performance - AI AppSec Assistants

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Remediation** | Not enough data | Not enough data | 
| **Real-time Vulnerability Detection** | Not enough data | Not enough data | 
| **Accuracy** | Not enough data | Not enough data | 

#### Integration - AI AppSec Assistants

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Stack Integration** | Not enough data | Not enough data | 
| **Workflow Integration** | Not enough data | Not enough data | 
| **Codebase Contextual Awareness** | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Snyk** | N/A | N/A |

#### Cloud Visibility

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | 

#### Security

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Data Security** | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | 

#### Identity

| Feature | Orca Security | Snyk | 
|---|---|---|
| **SSO** | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | 

### Cloud Detection and Response (CDR)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Snyk** | N/A | N/A |

#### Agentic AI - Cloud Detection and Response (CDR)

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | 

#### Services - Cloud Detection and Response (CDR) 

| Feature | Orca Security | Snyk | 
|---|---|---|
| **Managed Services** | Not enough data | Not enough data | 

---
## Categories
**Shared Categories (2):** [Container Security Tools](https://www.g2.com/categories/container-security-tools), [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner)

**Unique to Orca Security (8):** [Cloud-Native Application Protection Platform (CNAPP)](https://www.g2.com/categories/cloud-native-application-protection-platform-cnapp), [Cloud Security Posture Management (CSPM) Software](https://www.g2.com/categories/cloud-security-posture-management-cspm), [Cloud Compliance Software](https://www.g2.com/categories/cloud-compliance), [Cloud Workload Protection Platforms](https://www.g2.com/categories/cloud-workload-protection-platforms), [API Security Tools](https://www.g2.com/categories/api-security), [Cloud Infrastructure Entitlement Management (CIEM) Software](https://www.g2.com/categories/cloud-infrastructure-entitlement-management-ciem), [Cloud Detection and Response (CDR) Software](https://www.g2.com/categories/cloud-detection-and-response-cdr), [AI Security Posture Management (AI-SPM) Tools Software](https://www.g2.com/categories/ai-security-posture-management-ai-spm-tools)

**Unique to Snyk (5):** [Software Composition Analysis Tools](https://www.g2.com/categories/software-composition-analysis), [Software Supply Chain Security Solutions](https://www.g2.com/categories/software-supply-chain-security-tools), [AI AppSec Assistants](https://www.g2.com/categories/ai-appsec-assistants), [Static Application Security Testing (SAST) Software](https://www.g2.com/categories/static-application-security-testing-sast), [Software Bill of Materials (SBOM) Software](https://www.g2.com/categories/software-bill-of-materials-sbom)


---
## Reviewer Demographics

### By Company Size

| Segment | Orca Security | Snyk | 
|---|---|---|
| **Small-Business** | 11.0% | 35.4% | 
| **Mid-Market** | 44.3% | 45.4% | 
| **Enterprise** | 44.7% | 19.2% | 

### By Industry

#### Orca Security

- **Information Technology and Services:** 15.7%
- **Computer Software:** 12.9%
- **Financial Services:** 8.6%
- **Computer &amp; Network Security:** 5.9%
- **Marketing and Advertising:** 5.1%
- **Hospital &amp; Health Care:** 4.7%
- **Insurance:** 4.3%
- **Education Management:** 3.1%
- **Retail:** 3.1%
- **Automotive:** 2.7%
- **Other:** 33.7%

#### Snyk

- **Computer Software:** 22.3%
- **Information Technology and Services:** 20.8%
- **Computer &amp; Network Security:** 9.2%
- **Hospital &amp; Health Care:** 5.4%
- **Financial Services:** 5.4%
- **Telecommunications:** 3.1%
- **Banking:** 3.1%
- **Education Management:** 2.3%
- **Internet:** 2.3%
- **Retail:** 1.5%
- **Other:** 24.6%

---
## Alternatives

### Alternatives to Orca Security

- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (790 reviews)
- [Microsoft Defender for Cloud](https://www.g2.com/products/microsoft-defender-for-cloud/reviews) — 4.4/5 stars (309 reviews)
- [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews) — 4.4/5 stars (386 reviews)
- [Cortex Cloud](https://www.g2.com/products/cortex-cloud/reviews) — 4.1/5 stars (112 reviews)
- [Sysdig Secure](https://www.g2.com/products/sysdig-sysdig-secure/reviews) — 4.8/5 stars (112 reviews)
- [CrowdStrike Falcon Cloud Security](https://www.g2.com/products/crowdstrike-falcon-cloud-security/reviews) — 4.6/5 stars (86 reviews)
- [Tenable Nessus](https://www.g2.com/products/tenable-nessus/reviews) — 4.5/5 stars (301 reviews)
- [Vanta](https://www.g2.com/products/vanta/reviews) — 4.6/5 stars (2432 reviews)
- [Scrut Automation](https://www.g2.com/products/scrut-automation/reviews) — 4.9/5 stars (1300 reviews)
- [Drata](https://www.g2.com/products/drata/reviews) — 4.7/5 stars (1160 reviews)

### Alternatives to Snyk

- [Aikido Security](https://www.g2.com/products/aikido-security/reviews) — 4.6/5 stars (141 reviews)
- [Mend.io](https://www.g2.com/products/mend-io/reviews) — 4.3/5 stars (112 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (790 reviews)
- [SonarQube](https://www.g2.com/products/sonarqube/reviews) — 4.4/5 stars (141 reviews)
- [Semgrep](https://www.g2.com/products/semgrep/reviews) — 4.6/5 stars (55 reviews)
- [Veracode Application Security Platform](https://www.g2.com/products/veracode-application-security-platform/reviews) — 3.8/5 stars (25 reviews)
- [GitLab](https://www.g2.com/products/gitlab/reviews) — 4.5/5 stars (890 reviews)
- [GitHub](https://www.g2.com/products/github/reviews) — 4.7/5 stars (2347 reviews)
- [SOOS](https://www.g2.com/products/soos/reviews) — 4.6/5 stars (42 reviews)
- [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews) — 4.4/5 stars (386 reviews)

---
## Top Discussions

### Orca Security

- Title: [Where is Orca security based?](https://www.g2.com/discussions/where-is-orca-security-based) — 2 comments
  > **Top comment:** "Orca Security is based in Los Angeles, California, United States."
- Title: [How much does Orca security cost?](https://www.g2.com/discussions/how-much-does-orca-security-cost) — 1 comment
  > **Top comment:** "$6500 per 50 workloads per year"
- Title: [What is ORCA platform?](https://www.g2.com/discussions/what-is-orca-platform) — 1 comment
  > **Top comment:** "SIEM tool for hunting threats, outdated oackages, overpowerful permissions, expired certificates. Mainly for AWS services"
- Title: [What does Orca Security do?](https://www.g2.com/discussions/what-does-orca-security-do) — 1 comment *(includes official response)*
  > **Top comment:** "Orca Security is a leader in CNAPP innovation (Cloud Native Application Protection Platform) for workload and data protection, cloud security posture..."

### Snyk

- Title: [What is Snyk scanning?](https://www.g2.com/discussions/what-is-snyk-scanning) — 2 comments, 2 upvotes
  > **Top comment:** "Codebase and open source libraries"
- Title: [Is Snyk a SaaS?](https://www.g2.com/discussions/is-snyk-a-saas) — 2 comments
  > **Top comment:** "No"
- Title: [How good is Snyk?](https://www.g2.com/discussions/how-good-is-snyk) — 2 comments
  > **Top comment:** "very.

it&#39;s basically like dependabot, but more fleshed out"

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/orca-security-vs-snyk)

