# Orca Security vs Tenable Nessus Comparison
---
## AI Generated Summary
- **G2 reviewers report** that Tenable Nessus excels in providing a comprehensive and accurate vulnerability detection solution, with users highlighting its ability to identify system flaws and inefficiencies effectively. This capability is enhanced by actionable results that help users address critical issues promptly.
- **Users say** that Orca Security stands out for its user-friendly dashboards and seamless integration with tools like Jira. Reviewers appreciate the ability to gain a full overview of their cloud environment&#39;s security using a single tool, which simplifies management and enhances visibility.
- **According to verified reviews** , Tenable Nessus is praised for its intuitive usability, allowing users to learn and operate the tool quickly without extensive training. This ease of use is a significant advantage for teams looking to implement a vulnerability management solution with minimal disruption.
- **Reviewers mention** that Orca Security&#39;s implementation process is notably quick, with some users reporting that they were able to set it up in less than an hour. This rapid deployment is a key benefit for organizations needing to enhance their security posture swiftly.
- **G2 reviewers highlight** that while Tenable Nessus has a strong overall satisfaction score, it faces challenges in API security, where it received lower ratings compared to Orca Security. This indicates that users may find Orca more effective for specific API security needs.
- **Users report** that Orca Security provides excellent customer support, with many noting the responsiveness even at standard support levels. This level of service can be crucial for organizations that require timely assistance to address security concerns.



| | Orca Security | Tenable Nessus | 
|---|---|---|
| **Star Rating** | 4.6 out of 5 | 4.5 out of 5 | 
| **Total Reviews** | 254 | 301 | 
| **Largest Market Segment** | Mid-Market (44.7% of reviews) | Mid-Market (39.4% of reviews) | 
| **Entry Level Price** | Contact Us | $3,390.00 1 License With One-Time Purchase | 

---
## Top Pros & Cons

### Orca Security

Pros:
- Ease of Use (37 reviews)
- Features (33 reviews)

Cons:
- Improvement Needed (15 reviews)
- Feature Limitations (12 reviews)

### Tenable Nessus

Pros:
- Vulnerability Identification (21 reviews)
- Vulnerability Detection (19 reviews)

Cons:
- Slow Scanning (8 reviews)
- Expensive (6 reviews)

---
## Ratings Comparison
| Rating | Orca Security | Tenable Nessus | 
|---|---|---|
  | **Meets Requirements** | 9.0 (199 reviews) | 9.0 (248 reviews) | 
  | **Ease of Use** | 9.1 (226 reviews) | 8.9 (250 reviews) | 
  | **Ease of Setup** | 9.3 (202 reviews) | 8.8 (172 reviews) | 
  | **Ease of Admin** | 9.0 (151 reviews) | 8.9 (161 reviews) | 
  | **Quality of Support** | 9.1 (194 reviews) | 8.4 (229 reviews) | 
  | **Has the product been a good partner in doing business?** | 9.4 (150 reviews) | 8.7 (149 reviews) | 
  | **Product Direction (% positive)** | 9.8 (188 reviews) | 8.9 (238 reviews) | 

---
## Pricing

### Orca Security

#### Entry-Level Pricing

Plan: By Compute Asset

Price: Contact Us

Description: An annual Orca subscription license is priced by compute asset. This lets you embrace new technologies (such as Orca) without concern of being charged for such assets as cloud storage or databases.

Key Features:
- visit website for all features

[Learn more about Orca Security](https://www.g2.com/products/orca-security/reviews)

#### Free Trial

Yes

### Tenable Nessus

#### Entry-Level Pricing

Plan: Pro - 1 Year

Price: $3,390.00 1 License With One-Time Purchase

Description: 1-year license of the industry-leading vulnerability assessment solution.

Key Features:
- Automate your vulnerability scanning process

[Browse all 4 editions](https://www.g2.com/products/tenable-nessus/pricing)

#### Free Trial

Yes

---
## Features Comparison By Category

### Cloud Workload Protection Platforms

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.5/10 | 88 |
| **Tenable Nessus** | N/A | N/A |

#### Management

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Dashboards and Reports** | 8.1 (71 reviews) | Not enough data | 
| **Workflow Management** | 7.9 (52 reviews) | Not enough data | 
| **Administration Console** | 8.5 (65 reviews) | Not enough data | 

#### Operations

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Governance** | 8.5 (51 reviews) | Not enough data | 
| **Logging and Reporting** | 8.5 (59 reviews) | Not enough data | 
| **API / Integrations** | 8.8 (62 reviews) | Not enough data | 

#### Security Controls 

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Anomaly Detection** | 8.7 (56 reviews) | Not enough data | 
| **Data Loss Prevention** | 7.7 (53 reviews) | Not enough data | 
| **Security Auditing** | 9.1 (74 reviews) | Not enough data | 
| **Cloud Gap Analytics** | 8.7 (57 reviews) | Not enough data | 

### Dynamic Application Security Testing (DAST)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Administration

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **API / Integrations** | Not enough data | Not enough data | 
| **Extensibility** | Not enough data | Not enough data | 

#### Analysis

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Reporting and Analytics** | Not enough data | Not enough data | 
| **Issue Tracking** | Not enough data | Not enough data | 
| **Static Code Analysis** | Not enough data | Not enough data | 
| **Vulnerability Scan** | Not enough data | Not enough data | 
| **Code Analysis** | Not enough data | Not enough data | 

#### Testing

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Manual Testing** | Not enough data | Not enough data | 
| **Test Automation** | Not enough data | Not enough data | 
| **Compliance Testing** | Not enough data | Not enough data | 
| **Black-Box Scanning** | Not enough data | Not enough data | 
| **Detection Rate** | Not enough data | Not enough data | 
| **False Positives** | Not enough data | Not enough data | 

### Container Security

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.2/10 | 60 |
| **Tenable Nessus** | N/A | N/A |

#### Administration

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Risk Scoring** | 8.6 (59 reviews) | Not enough data | 
| **Secrets Management** | 8.0 (51 reviews) | Not enough data | 
| **Security Auditing** | 8.9 (58 reviews) | Not enough data | 
| **Configuration Management** | 8.6 (56 reviews) | Not enough data | 

#### Monitoring

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Continuous Image Assurance** | 8.4 (50 reviews) | Not enough data | 
| **Behavior Monitoring** | 7.8 (48 reviews) | Not enough data | 
| **Observability** | 8.5 (52 reviews) | Not enough data | 

#### Protection

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Dynamic Image Scanning** | 8.1 (52 reviews) | Not enough data | 
| **Runtime Protection** | 7.5 (48 reviews) | Not enough data | 
| **Workload Protection** | 7.8 (51 reviews) | Not enough data | 
| **Network Segmentation** | 7.7 (47 reviews) | Not enough data | 

### Cloud Compliance

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.4/10 | 118 |
| **Tenable Nessus** | N/A | N/A |

#### Security

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Compliance Monitoring** | 8.9 (114 reviews) | Not enough data | 
| **Anomoly Detection** | 8.0 (110 reviews) | Not enough data | 
| **Data Loss Prevention** | 7.7 (101 reviews) | Not enough data | 
| **Cloud Gap Analytics** | 8.5 (108 reviews) | Not enough data | 

#### Compliance

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Governance** | 8.8 (106 reviews) | Not enough data | 
| **Data Governance** | 8.3 (100 reviews) | Not enough data | 
| **Sensitive Data Compliance** | 8.5 (105 reviews) | Not enough data | 

#### Administration

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Policy Enforcement** | 8.3 (105 reviews) | Not enough data | 
| **Auditing** | 8.6 (109 reviews) | Not enough data | 
| **Workflow Management** | 7.9 (102 reviews) | Not enough data | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 7.9/10 | 123 |
| **Tenable Nessus** | 8.2/10 | 158 |

#### Performance

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Issue Tracking** | 8.6 (110 reviews) | Feature Not Available | 
| **Detection Rate** | 8.8 (117 reviews) | 8.9 (139 reviews) ✓ Verified | 
| **False Positives** | 7.5 (118 reviews) | 6.7 (136 reviews) ✓ Verified | 
| **Automated Scans** | 9.2 (120 reviews) | 9.0 (135 reviews) ✓ Verified | 

#### Network

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Compliance Testing** | 8.6 (112 reviews) | 8.8 (134 reviews) ✓ Verified | 
| **Perimeter Scanning** | 8.6 (107 reviews) | 8.8 (127 reviews) ✓ Verified | 
| **Configuration Monitoring** | 8.7 (112 reviews) | 8.4 (110 reviews) ✓ Verified | 

#### Application

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Manual Application Testing** | 6.2 (88 reviews) | Feature Not Available | 
| **Static Code Analysis** | 6.5 (85 reviews) | 7.3 (83 reviews) | 
| **Black Box Testing** | 6.3 (84 reviews) | 7.8 (102 reviews) | 

#### Agentic AI - Vulnerability Scanner

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | 8.1 (9 reviews) | 
| **Proactive Assistance** | Not enough data | 7.9 (8 reviews) | 

### API Security

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.1/10 | 33 |
| **Tenable Nessus** | N/A | N/A |

#### API Management 

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **API Discovery** | 8.6 (33 reviews) | Not enough data | 
| **API Monitoring** | 8.5 (31 reviews) | Not enough data | 
| **Reporting** | 8.4 (33 reviews) | Not enough data | 
| **Change Management** | 8.1 (30 reviews) | Not enough data | 

#### Security Testing

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Compliance Monitoring** | 8.8 (30 reviews) | Not enough data | 
| **API Verification** | 7.9 (29 reviews) | Not enough data | 
| **API Testing** | 7.5 (29 reviews) | Not enough data | 

#### Security Management

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Security and Policy Enforcement** | 8.5 (29 reviews) | Not enough data | 
| **Anomoly Detection** | 8.2 (31 reviews) | Not enough data | 
| **Bot Detection** | 6.0 (29 reviews) | Not enough data | 

### Cloud Security Posture Management (CSPM)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.5/10 | 115 |
| **Tenable Nessus** | N/A | N/A |

#### Configuration

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **DLP Configuration** | 6.8 (82 reviews) | Not enough data | 
| **Configuration Monitoring** | 8.5 (95 reviews) | Not enough data | 
| **Unified Policy Management** | 8.1 (83 reviews) | Not enough data | 
| **Adaptive Access Control** | 7.6 (84 reviews) | Not enough data | 
| **API / Integrations** | 8.5 (92 reviews) | Not enough data | 

#### Visibility

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Multicloud Visibility** | 9.0 (101 reviews) | Not enough data | 
| **Asset Discovery** | 9.4 (104 reviews) | Not enough data | 

#### Vulnerability Management

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Threat Hunting** | 8.3 (90 reviews) | Not enough data | 
| **Vulnerability Scanning** | 9.1 (105 reviews) | Not enough data | 
| **Vulnerability Intelligence** | 8.9 (95 reviews) | Not enough data | 
| **Risk-Prioritization** | 8.9 (101 reviews) | Not enough data | 

### Attack Surface Management

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Tenable Nessus** | 8.3/10 | 6 |

#### Asset Management

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Asset Discovery** | Not enough data | 6.9 (6 reviews) | 
| **Shadow IT Detection** | Not enough data | 7.5 (6 reviews) | 
| **Change Management** | Not enough data | 4.7 (6 reviews) | 

#### Monitoring

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Gap Analysis** | Not enough data | 8.3 (6 reviews) | 
| **Vulnerability Intelligence** | Not enough data | 10.0 (6 reviews) | 
| **Compliance Monitoring** | Not enough data | 8.6 (6 reviews) | 
| **Continuous Monitoring** | Not enough data | 9.2 (6 reviews) | 

#### Risk Management

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Risk-Prioritization** | Not enough data | 9.2 (6 reviews) | 
| **Reconnaissance** | Not enough data | 9.2 (6 reviews) | 
| **At-Risk Analysis** | Not enough data | 8.6 (6 reviews) | 
| **Threat Intelligence** | Not enough data | 9.4 (6 reviews) | 

#### Generative AI

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **AI Text Summarization** | Not enough data | Not enough data | 

### Cloud Infrastructure Entitlement Management (CIEM)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.4/10 | 31 |
| **Tenable Nessus** | N/A | N/A |

#### Access control - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Policy Management** | 8.9 (31 reviews) | Not enough data | 
| **Fine-Grained Access Control** | 8.4 (30 reviews) | Not enough data | 
| **Role-Based Access Control (RBAC)** | 8.3 (30 reviews) | Not enough data | 
| **AI-driven access control** | 7.6 (30 reviews) | Not enough data | 

#### Monitoring - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Monitoring** | 8.4 (31 reviews) | Not enough data | 
| **AI-based detection** | 7.5 (30 reviews) | Not enough data | 

#### Auditing - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Visibility** | 9.2 (31 reviews) | Not enough data | 
| **Compliance Reporting** | 8.8 (31 reviews) | Not enough data | 

### Cloud-Native Application Protection Platform (CNAPP)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Security - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Workload and container security** | Not enough data | Not enough data | 
| **Threat detection and response** | Not enough data | Not enough data | 
| **DevSecOps Integrations** | Not enough data | Not enough data | 
| **Unified Visibility** | Not enough data | Not enough data | 

#### Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Intelligent remediations and suggestions** | Not enough data | Not enough data | 
| **Risk prioritization** | Not enough data | Not enough data | 
| **Anomaly detection using machine learning** | Not enough data | Not enough data | 

#### Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Multi-cloud visibility** | Not enough data | Not enough data | 
| **Cloud Security Posture Management (CSPM)** | Not enough data | Not enough data | 

#### Agentic AI - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | 

### AI Security Posture Management (AI-SPM) Tools

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Functionality - AI Security Posture Management (AI-SPM) Tools

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Security Ecosystem Integration** | Not enough data | Not enough data | 
| **AI Asset Discovery** | Not enough data | Not enough data | 
| **Adaptive Policy Updates** | Not enough data | Not enough data | 
| **Access and Permissions Monitoring** | Not enough data | Not enough data | 
| **Policy Enforcement** | Not enough data | Not enough data | 

#### Risk Assessment - AI Security Posture Management (AI-SPM) Tools

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **AI Risk Assessment** | Not enough data | Not enough data | 
| **AI Asset Posture Scoring** | Not enough data | Not enough data | 

#### Governance &amp; Compliance - AI Security Posture Management (AI-SPM) Tools

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **AI‑Generated Content Controls** | Not enough data | Not enough data | 
| **Audit Trails** | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Cloud Visibility

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | 

#### Security

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Data Security** | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | 

#### Identity

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **SSO** | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | 

### Cloud Detection and Response (CDR)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Tenable Nessus** | N/A | N/A |

#### Agentic AI - Cloud Detection and Response (CDR)

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | 

#### Services - Cloud Detection and Response (CDR) 

| Feature | Orca Security | Tenable Nessus | 
|---|---|---|
| **Managed Services** | Not enough data | Not enough data | 

---
## Categories
**Shared Categories (2):** [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner), [API Security Tools](https://www.g2.com/categories/api-security)

**Unique to Orca Security (8):** [Cloud-Native Application Protection Platform (CNAPP)](https://www.g2.com/categories/cloud-native-application-protection-platform-cnapp), [Cloud Security Posture Management (CSPM) Software](https://www.g2.com/categories/cloud-security-posture-management-cspm), [Cloud Compliance Software](https://www.g2.com/categories/cloud-compliance), [Container Security Tools](https://www.g2.com/categories/container-security-tools), [Cloud Workload Protection Platforms](https://www.g2.com/categories/cloud-workload-protection-platforms), [Cloud Infrastructure Entitlement Management (CIEM) Software](https://www.g2.com/categories/cloud-infrastructure-entitlement-management-ciem), [Cloud Detection and Response (CDR) Software](https://www.g2.com/categories/cloud-detection-and-response-cdr), [AI Security Posture Management (AI-SPM) Tools Software](https://www.g2.com/categories/ai-security-posture-management-ai-spm-tools)

**Unique to Tenable Nessus (2):** [ Attack Surface Management Software](https://www.g2.com/categories/attack-surface-management), [Dynamic Application Security Testing (DAST) Software](https://www.g2.com/categories/dynamic-application-security-testing-dast)


---
## Reviewer Demographics

### By Company Size

| Segment | Orca Security | Tenable Nessus | 
|---|---|---|
| **Small-Business** | 11.1% | 26.1% | 
| **Mid-Market** | 44.7% | 39.4% | 
| **Enterprise** | 44.3% | 34.5% | 

### By Industry

#### Orca Security

- **Information Technology and Services:** 15.4%
- **Computer Software:** 13.0%
- **Financial Services:** 8.7%
- **Computer &amp; Network Security:** 5.9%
- **Marketing and Advertising:** 5.1%
- **Hospital &amp; Health Care:** 4.7%
- **Insurance:** 4.3%
- **Retail:** 3.2%
- **Education Management:** 3.2%
- **Automotive:** 2.8%
- **Other:** 33.6%

#### Tenable Nessus

- **Information Technology and Services:** 25.7%
- **Computer &amp; Network Security:** 16.5%
- **Financial Services:** 7.4%
- **Computer Software:** 6.0%
- **Banking:** 4.6%
- **Government Administration:** 3.9%
- **Higher Education:** 3.2%
- **Hospital &amp; Health Care:** 2.5%
- **Education Management:** 2.1%
- **Telecommunications:** 2.1%
- **Other:** 26.1%

---
## Alternatives

### Alternatives to Orca Security

- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (784 reviews)
- [Microsoft Defender for Cloud](https://www.g2.com/products/microsoft-defender-for-cloud/reviews) — 4.4/5 stars (308 reviews)
- [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews) — 4.4/5 stars (386 reviews)
- [Cortex Cloud](https://www.g2.com/products/cortex-cloud/reviews) — 4.1/5 stars (112 reviews)
- [Sysdig Secure](https://www.g2.com/products/sysdig-sysdig-secure/reviews) — 4.8/5 stars (112 reviews)
- [CrowdStrike Falcon Cloud Security](https://www.g2.com/products/crowdstrike-falcon-cloud-security/reviews) — 4.6/5 stars (85 reviews)
- [Vanta](https://www.g2.com/products/vanta/reviews) — 4.6/5 stars (2431 reviews)
- [Scrut Automation](https://www.g2.com/products/scrut-automation/reviews) — 4.9/5 stars (1300 reviews)
- [Drata](https://www.g2.com/products/drata/reviews) — 4.7/5 stars (1158 reviews)
- [Secureframe](https://www.g2.com/products/secureframe/reviews) — 4.7/5 stars (796 reviews)

### Alternatives to Tenable Nessus

- [Intruder](https://www.g2.com/products/intruder/reviews) — 4.8/5 stars (206 reviews)
- [Invicti (formerly Netsparker)](https://www.g2.com/products/invicti-formerly-netsparker/reviews) — 4.6/5 stars (69 reviews)
- [Detectify](https://www.g2.com/products/detectify/reviews) — 4.5/5 stars (51 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (784 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)
- [Acunetix by Invicti](https://www.g2.com/products/acunetix-by-invicti/reviews) — 4.1/5 stars (105 reviews)
- [Pentest-Tools.com](https://www.g2.com/products/pentest-tools-com/reviews) — 4.8/5 stars (100 reviews)
- [Veracode Application Security Platform](https://www.g2.com/products/veracode-application-security-platform/reviews) — 3.8/5 stars (25 reviews)
- [APPCHECK](https://www.g2.com/products/appcheck/reviews) — 4.6/5 stars (67 reviews)
- [Astra Pentest](https://www.g2.com/products/astra-pentest/reviews) — 4.6/5 stars (185 reviews)

---
## Top Discussions

### Orca Security

- Title: [Where is Orca security based?](https://www.g2.com/discussions/where-is-orca-security-based) — 2 comments
  > **Top comment:** "Orca Security is based in Los Angeles, California, United States."
- Title: [How much does Orca security cost?](https://www.g2.com/discussions/how-much-does-orca-security-cost) — 1 comment
  > **Top comment:** "$6500 per 50 workloads per year"
- Title: [What is ORCA platform?](https://www.g2.com/discussions/what-is-orca-platform) — 1 comment
  > **Top comment:** "SIEM tool for hunting threats, outdated oackages, overpowerful permissions, expired certificates. Mainly for AWS services"
- Title: [What does Orca Security do?](https://www.g2.com/discussions/what-does-orca-security-do) — 1 comment *(includes official response)*
  > **Top comment:** "Orca Security is a leader in CNAPP innovation (Cloud Native Application Protection Platform) for workload and data protection, cloud security posture..."

### Tenable Nessus

- Title: [Is there a free version of Nessus?](https://www.g2.com/discussions/is-there-a-free-version-of-nessus) — 2 comments
  > **Top comment:** "30 /15 days trail is available "
- Title: [What does Nessus Professional scan for?](https://www.g2.com/discussions/about-nessus-2b3f6c8f-4cde-460a-bd61-f2527f0cdb45) — 2 comments, 1 upvote
  > **Top comment:** "It scans the system for  different vulnerabilities depending on what policy you want to scan the system with (like Internal PCI, Policy Compliance, SCAP,..."
- Title: [What types of devices can Nessus Professional scan?](https://www.g2.com/discussions/device-types-78d9c056-eb92-4435-aad4-32afa6a1a445) — 2 comments, 1 upvote
  > **Top comment:** "Windows PCs/servers , Linux systems/servers, Mobiles, IPMI devices like iLO, iDRAC, network switches, storage arrays, etc."
- Title: [How many IP Addresses can I scan?](https://www.g2.com/discussions/ip-addresses-b6ef755d-8e1e-4949-818a-ec228e8ac779) — 2 comments, 1 upvote
  > **Top comment:** "It depends on your license."
- Title: [What do I need to run Nessus professional?](https://www.g2.com/discussions/environment-c71784d4-2685-42a7-870f-56620a4bcb97) — 2 comments, 1 upvote
  > **Top comment:** "you don&#39;t need any special requirements you can run on any windows or Linux machine without any hazel."

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/orca-security-vs-tenable-nessus)

