# Orca Security vs Tenable Vulnerability Management Comparison
---
## AI Generated Summary
- **G2 reviewers report** that Orca Security excels in user experience, particularly highlighting its intuitive dashboards and seamless integration with tools like Jira. Users appreciate the ability to gain a comprehensive overview of their cloud security in a single tool, which they found easy to implement in under an hour.
- **Users say** Tenable Vulnerability Management offers robust scanning capabilities, allowing for the assessment of both internal and external resources, as well as web applications. Reviewers commend its filtering and tagging features, which help in organizing and compartmentalizing assets for more effective scanning and reporting.
- **According to verified reviews** , Orca Security stands out for its responsive customer support, with many users noting quick turnaround times even at standard support levels. This level of service contributes to a more satisfying overall experience for users who may need assistance.
- **Reviewers mention** that Tenable Vulnerability Management provides deep visibility and clear remediation guidance, making it a strong choice for organizations that require detailed insights into their security posture. Users appreciate the user-friendly interface that enhances their overall experience.
- **G2 reviewers highlight** that while both products have strong detection capabilities, Tenable Vulnerability Management has a slight edge in detection rates, which is crucial for organizations focused on identifying vulnerabilities effectively.
- **Users express concerns** about the implementation process for Tenable Vulnerability Management, with some noting that it can be more complex compared to Orca Security&#39;s straightforward setup. This difference may impact teams looking for a quick and hassle-free deployment.



| | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Star Rating** | 4.6 out of 5 | 4.5 out of 5 | 
| **Total Reviews** | 254 | 122 | 
| **Largest Market Segment** | Mid-Market (44.7% of reviews) | Enterprise (58.0% of reviews) | 
| **Entry Level Price** | Contact Us | No pricing available | 

---
## Top Pros & Cons

### Orca Security

Pros:
- Ease of Use (37 reviews)
- Features (33 reviews)

Cons:
- Improvement Needed (15 reviews)
- Feature Limitations (12 reviews)

### Tenable Vulnerability Management

Pros:
- Ease of Use (12 reviews)
- Scanning Efficiency (10 reviews)

Cons:
- Expensive (6 reviews)
- Pricing Issues (6 reviews)

---
## Ratings Comparison
| Rating | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
  | **Meets Requirements** | 9.0 (199 reviews) | 8.9 (83 reviews) | 
  | **Ease of Use** | 9.1 (226 reviews) | 8.9 (85 reviews) | 
  | **Ease of Setup** | 9.3 (202 reviews) | 8.7 (69 reviews) | 
  | **Ease of Admin** | 9.0 (151 reviews) | 8.7 (66 reviews) | 
  | **Quality of Support** | 9.1 (194 reviews) | 8.1 (80 reviews) | 
  | **Has the product been a good partner in doing business?** | 9.4 (150 reviews) | 8.6 (66 reviews) | 
  | **Product Direction (% positive)** | 9.8 (188 reviews) | 8.9 (86 reviews) | 

---
## Pricing

### Orca Security

#### Entry-Level Pricing

Plan: By Compute Asset

Price: Contact Us

Description: An annual Orca subscription license is priced by compute asset. This lets you embrace new technologies (such as Orca) without concern of being charged for such assets as cloud storage or databases.

Key Features:
- visit website for all features

[Learn more about Orca Security](https://www.g2.com/products/orca-security/reviews)

#### Free Trial

Yes

### Tenable Vulnerability Management

#### Entry-Level Pricing

No pricing available

#### Free Trial

Yes

---
## Features Comparison By Category

### Cloud Workload Protection Platforms

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.5/10 | 88 |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Management

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Dashboards and Reports** | 8.1 (71 reviews) | Not enough data | 
| **Workflow Management** | 7.9 (52 reviews) | Not enough data | 
| **Administration Console** | 8.5 (65 reviews) | Not enough data | 

#### Operations

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Governance** | 8.5 (51 reviews) | Not enough data | 
| **Logging and Reporting** | 8.5 (59 reviews) | Not enough data | 
| **API / Integrations** | 8.8 (62 reviews) | Not enough data | 

#### Security Controls 

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Anomaly Detection** | 8.7 (56 reviews) | Not enough data | 
| **Data Loss Prevention** | 7.7 (53 reviews) | Not enough data | 
| **Security Auditing** | 9.1 (74 reviews) | Not enough data | 
| **Cloud Gap Analytics** | 8.7 (57 reviews) | Not enough data | 

### Container Security

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.2/10 | 60 |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Administration

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Risk Scoring** | 8.6 (59 reviews) | Not enough data | 
| **Secrets Management** | 8.0 (51 reviews) | Not enough data | 
| **Security Auditing** | 8.9 (58 reviews) | Not enough data | 
| **Configuration Management** | 8.6 (56 reviews) | Not enough data | 

#### Monitoring

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Continuous Image Assurance** | 8.4 (50 reviews) | Not enough data | 
| **Behavior Monitoring** | 7.8 (48 reviews) | Not enough data | 
| **Observability** | 8.5 (52 reviews) | Not enough data | 

#### Protection

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Dynamic Image Scanning** | 8.1 (52 reviews) | Not enough data | 
| **Runtime Protection** | 7.5 (48 reviews) | Not enough data | 
| **Workload Protection** | 7.8 (51 reviews) | Not enough data | 
| **Network Segmentation** | 7.7 (47 reviews) | Not enough data | 

### Cloud Compliance

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.4/10 | 118 |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Security

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Compliance Monitoring** | 8.9 (114 reviews) | Not enough data | 
| **Anomoly Detection** | 8.0 (110 reviews) | Not enough data | 
| **Data Loss Prevention** | 7.7 (101 reviews) | Not enough data | 
| **Cloud Gap Analytics** | 8.5 (108 reviews) | Not enough data | 

#### Compliance

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Governance** | 8.8 (106 reviews) | Not enough data | 
| **Data Governance** | 8.3 (100 reviews) | Not enough data | 
| **Sensitive Data Compliance** | 8.5 (105 reviews) | Not enough data | 

#### Administration

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Policy Enforcement** | 8.3 (105 reviews) | Not enough data | 
| **Auditing** | 8.6 (109 reviews) | Not enough data | 
| **Workflow Management** | 7.9 (102 reviews) | Not enough data | 

### Vulnerability Scanner

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 7.9/10 | 123 |
| **Tenable Vulnerability Management** | 8.2/10 | 51 |

#### Performance

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Issue Tracking** | 8.6 (110 reviews) | 8.4 (46 reviews) ✓ Verified | 
| **Detection Rate** | 8.8 (117 reviews) | 9.0 (48 reviews) ✓ Verified | 
| **False Positives** | 7.5 (118 reviews) | 7.1 (48 reviews) ✓ Verified | 
| **Automated Scans** | 9.2 (120 reviews) | 9.3 (48 reviews) ✓ Verified | 

#### Network

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Compliance Testing** | 8.6 (112 reviews) | 8.5 (44 reviews) ✓ Verified | 
| **Perimeter Scanning** | 8.6 (107 reviews) | 8.7 (43 reviews) | 
| **Configuration Monitoring** | 8.7 (112 reviews) | 8.7 (40 reviews) ✓ Verified | 

#### Application

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Manual Application Testing** | 6.2 (88 reviews) | Feature Not Available | 
| **Static Code Analysis** | 6.5 (85 reviews) | 7.5 (33 reviews) | 
| **Black Box Testing** | 6.3 (84 reviews) | Feature Not Available | 

#### Agentic AI - Vulnerability Scanner

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | 7.3 (5 reviews) | 
| **Proactive Assistance** | Not enough data | 7.3 (5 reviews) | 

### Risk-Based Vulnerability Management

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Tenable Vulnerability Management** | 8.5/10 | 68 |

#### Risk Analysis

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Risk Scoring** | Not enough data | 8.9 (58 reviews) | 
| **Reporting** | Not enough data | 8.1 (59 reviews) | 
| **Risk-Prioritization** | Not enough data | 8.8 (58 reviews) | 

#### Vulnerability Assesment

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Vulnerability Scanning** | Not enough data | 9.4 (60 reviews) | 
| **Vulnerability Intelligence** | Not enough data | 9.2 (57 reviews) | 
| **Contextual Data** | Not enough data | 8.7 (54 reviews) | 
| **Dashboards** | Not enough data | 8.2 (57 reviews) | 

#### Automation

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Automated Remediation** | Not enough data | 7.7 (49 reviews) | 
| **Workflow Automation** | Not enough data | 7.8 (48 reviews) | 
| **Security Testing** | Not enough data | 8.1 (51 reviews) | 
| **Test Automation** | Not enough data | 8.1 (52 reviews) | 

### API Security

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.1/10 | 33 |
| **Tenable Vulnerability Management** | N/A | N/A |

#### API Management 

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **API Discovery** | 8.6 (33 reviews) | Not enough data | 
| **API Monitoring** | 8.5 (31 reviews) | Not enough data | 
| **Reporting** | 8.4 (33 reviews) | Not enough data | 
| **Change Management** | 8.1 (30 reviews) | Not enough data | 

#### Security Testing

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Compliance Monitoring** | 8.8 (30 reviews) | Not enough data | 
| **API Verification** | 7.9 (29 reviews) | Not enough data | 
| **API Testing** | 7.5 (29 reviews) | Not enough data | 

#### Security Management

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Security and Policy Enforcement** | 8.5 (29 reviews) | Not enough data | 
| **Anomoly Detection** | 8.2 (31 reviews) | Not enough data | 
| **Bot Detection** | 6.0 (29 reviews) | Not enough data | 

### ServiceNow Store Apps

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Tenable Vulnerability Management** | 8.5/10 | 8 |

#### ServiceNow Apps

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **ServiceNow Integration** | Not enough data | 8.3 (7 reviews) | 
| **Value** | Not enough data | 8.3 (7 reviews) | 

#### Agentic AI - ServiceNow Store Apps

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Multi-step Planning** | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | 

### Cloud Security Posture Management (CSPM)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.5/10 | 115 |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Configuration

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **DLP Configuration** | 6.8 (82 reviews) | Not enough data | 
| **Configuration Monitoring** | 8.5 (95 reviews) | Not enough data | 
| **Unified Policy Management** | 8.1 (83 reviews) | Not enough data | 
| **Adaptive Access Control** | 7.6 (84 reviews) | Not enough data | 
| **API / Integrations** | 8.5 (92 reviews) | Not enough data | 

#### Visibility

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Multicloud Visibility** | 9.0 (101 reviews) | Not enough data | 
| **Asset Discovery** | 9.4 (104 reviews) | Not enough data | 

#### Vulnerability Management

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Threat Hunting** | 8.3 (90 reviews) | Not enough data | 
| **Vulnerability Scanning** | 9.1 (105 reviews) | Not enough data | 
| **Vulnerability Intelligence** | 8.9 (95 reviews) | Not enough data | 
| **Risk-Prioritization** | 8.9 (101 reviews) | Not enough data | 

### Cloud Infrastructure Entitlement Management (CIEM)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | 8.4/10 | 31 |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Access control - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Policy Management** | 8.9 (31 reviews) | Not enough data | 
| **Fine-Grained Access Control** | 8.4 (30 reviews) | Not enough data | 
| **Role-Based Access Control (RBAC)** | 8.3 (30 reviews) | Not enough data | 
| **AI-driven access control** | 7.6 (30 reviews) | Not enough data | 

#### Monitoring - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Monitoring** | 8.4 (31 reviews) | Not enough data | 
| **AI-based detection** | 7.5 (30 reviews) | Not enough data | 

#### Auditing - Cloud Infrastructure Entitlement Management (CIEM)

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Visibility** | 9.2 (31 reviews) | Not enough data | 
| **Compliance Reporting** | 8.8 (31 reviews) | Not enough data | 

### Cloud-Native Application Protection Platform (CNAPP)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Security - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Workload and container security** | Not enough data | Not enough data | 
| **Threat detection and response** | Not enough data | Not enough data | 
| **DevSecOps Integrations** | Not enough data | Not enough data | 
| **Unified Visibility** | Not enough data | Not enough data | 

#### Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Intelligent remediations and suggestions** | Not enough data | Not enough data | 
| **Risk prioritization** | Not enough data | Not enough data | 
| **Anomaly detection using machine learning** | Not enough data | Not enough data | 

#### Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Multi-cloud visibility** | Not enough data | Not enough data | 
| **Cloud Security Posture Management (CSPM)** | Not enough data | Not enough data | 

#### Agentic AI - Cloud-Native Application Protection Platform (CNAPP)

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | 

### AI Security Posture Management (AI-SPM) Tools

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Functionality - AI Security Posture Management (AI-SPM) Tools

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Security Ecosystem Integration** | Not enough data | Not enough data | 
| **AI Asset Discovery** | Not enough data | Not enough data | 
| **Adaptive Policy Updates** | Not enough data | Not enough data | 
| **Access and Permissions Monitoring** | Not enough data | Not enough data | 
| **Policy Enforcement** | Not enough data | Not enough data | 

#### Risk Assessment - AI Security Posture Management (AI-SPM) Tools

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **AI Risk Assessment** | Not enough data | Not enough data | 
| **AI Asset Posture Scoring** | Not enough data | Not enough data | 

#### Governance &amp; Compliance - AI Security Posture Management (AI-SPM) Tools

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **AI‑Generated Content Controls** | Not enough data | Not enough data | 
| **Audit Trails** | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Cloud Visibility

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | 

#### Security

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Data Security** | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | 

#### Identity

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **SSO** | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | 

### Cloud Detection and Response (CDR)

| Product | Score | Reviews |
|---|---|---|
| **Orca Security** | N/A | N/A |
| **Tenable Vulnerability Management** | N/A | N/A |

#### Agentic AI - Cloud Detection and Response (CDR)

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | 

#### Services - Cloud Detection and Response (CDR) 

| Feature | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Managed Services** | Not enough data | Not enough data | 

---
## Categories
**Shared Categories (1):** [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner)

**Unique to Orca Security (9):** [Cloud-Native Application Protection Platform (CNAPP)](https://www.g2.com/categories/cloud-native-application-protection-platform-cnapp), [Cloud Security Posture Management (CSPM) Software](https://www.g2.com/categories/cloud-security-posture-management-cspm), [Cloud Compliance Software](https://www.g2.com/categories/cloud-compliance), [Container Security Tools](https://www.g2.com/categories/container-security-tools), [Cloud Workload Protection Platforms](https://www.g2.com/categories/cloud-workload-protection-platforms), [API Security Tools](https://www.g2.com/categories/api-security), [Cloud Infrastructure Entitlement Management (CIEM) Software](https://www.g2.com/categories/cloud-infrastructure-entitlement-management-ciem), [Cloud Detection and Response (CDR) Software](https://www.g2.com/categories/cloud-detection-and-response-cdr), [AI Security Posture Management (AI-SPM) Tools Software](https://www.g2.com/categories/ai-security-posture-management-ai-spm-tools)

**Unique to Tenable Vulnerability Management (2):** [Risk-Based Vulnerability Management Software](https://www.g2.com/categories/risk-based-vulnerability-management), [ServiceNow Marketplace Apps](https://www.g2.com/categories/servicenow-store-apps)


---
## Reviewer Demographics

### By Company Size

| Segment | Orca Security | Tenable Vulnerability Management | 
|---|---|---|
| **Small-Business** | 11.1% | 10.7% | 
| **Mid-Market** | 44.7% | 31.3% | 
| **Enterprise** | 44.3% | 58.0% | 

### By Industry

#### Orca Security

- **Information Technology and Services:** 15.4%
- **Computer Software:** 13.0%
- **Financial Services:** 8.7%
- **Computer &amp; Network Security:** 5.9%
- **Marketing and Advertising:** 5.1%
- **Hospital &amp; Health Care:** 4.7%
- **Insurance:** 4.3%
- **Retail:** 3.2%
- **Education Management:** 3.2%
- **Automotive:** 2.8%
- **Other:** 33.6%

#### Tenable Vulnerability Management

- **Information Technology and Services:** 14.3%
- **Financial Services:** 13.4%
- **Computer &amp; Network Security:** 8.9%
- **Banking:** 6.3%
- **Computer Software:** 5.4%
- **Government Administration:** 4.5%
- **Hospital &amp; Health Care:** 4.5%
- **Telecommunications:** 2.7%
- **Security and Investigations:** 2.7%
- **Pharmaceuticals:** 2.7%
- **Other:** 34.8%

---
## Alternatives

### Alternatives to Orca Security

- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (787 reviews)
- [Microsoft Defender for Cloud](https://www.g2.com/products/microsoft-defender-for-cloud/reviews) — 4.4/5 stars (308 reviews)
- [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews) — 4.4/5 stars (386 reviews)
- [Cortex Cloud](https://www.g2.com/products/cortex-cloud/reviews) — 4.1/5 stars (112 reviews)
- [Sysdig Secure](https://www.g2.com/products/sysdig-sysdig-secure/reviews) — 4.8/5 stars (112 reviews)
- [CrowdStrike Falcon Cloud Security](https://www.g2.com/products/crowdstrike-falcon-cloud-security/reviews) — 4.6/5 stars (85 reviews)
- [Tenable Nessus](https://www.g2.com/products/tenable-nessus/reviews) — 4.5/5 stars (301 reviews)
- [Vanta](https://www.g2.com/products/vanta/reviews) — 4.6/5 stars (2431 reviews)
- [Scrut Automation](https://www.g2.com/products/scrut-automation/reviews) — 4.9/5 stars (1300 reviews)
- [Drata](https://www.g2.com/products/drata/reviews) — 4.7/5 stars (1159 reviews)

### Alternatives to Tenable Vulnerability Management

- [InsightVM (Nexpose)](https://www.g2.com/products/insightvm-nexpose/reviews) — 4.4/5 stars (78 reviews)
- [Wiz](https://www.g2.com/products/wiz-wiz/reviews) — 4.7/5 stars (787 reviews)
- [Qualys VMDR](https://www.g2.com/products/qualys-vmdr/reviews) — 4.4/5 stars (167 reviews)
- [Cisco Vulnerability Management (formerly Kenna.VM)](https://www.g2.com/products/cisco-vulnerability-management-formerly-kenna-vm/reviews) — 4.3/5 stars (217 reviews)
- [Intruder](https://www.g2.com/products/intruder/reviews) — 4.8/5 stars (206 reviews)
- [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews) — 4.7/5 stars (201 reviews)
- [Burp Suite](https://www.g2.com/products/burp-suite/reviews) — 4.8/5 stars (129 reviews)
- [OpenVAS](https://www.g2.com/products/openvas/reviews) — 4.4/5 stars (32 reviews)
- [Amazon Inspector](https://www.g2.com/products/amazon-inspector/reviews) — 4.4/5 stars (26 reviews)
- [Microsoft Defender Vulnerability Management](https://www.g2.com/products/microsoft-defender-vulnerability-management/reviews) — 4.4/5 stars (34 reviews)

---
## Top Discussions

### Orca Security

- Title: [Where is Orca security based?](https://www.g2.com/discussions/where-is-orca-security-based) — 2 comments
  > **Top comment:** "Orca Security is based in Los Angeles, California, United States."
- Title: [How much does Orca security cost?](https://www.g2.com/discussions/how-much-does-orca-security-cost) — 1 comment
  > **Top comment:** "$6500 per 50 workloads per year"
- Title: [What is ORCA platform?](https://www.g2.com/discussions/what-is-orca-platform) — 1 comment
  > **Top comment:** "SIEM tool for hunting threats, outdated oackages, overpowerful permissions, expired certificates. Mainly for AWS services"
- Title: [What does Orca Security do?](https://www.g2.com/discussions/what-does-orca-security-do) — 1 comment *(includes official response)*
  > **Top comment:** "Orca Security is a leader in CNAPP innovation (Cloud Native Application Protection Platform) for workload and data protection, cloud security posture..."

### Tenable Vulnerability Management

- Title: [What is your primary use case for Tenable Vulnerability Management, and how has it impacted your security posture?](https://www.g2.com/discussions/what-is-your-primary-use-case-for-tenable-vulnerability-management-and-how-has-it-impacted-your-security-posture) — 1 comment
  > **Top comment:** "Hello, good morning!
Well, our first impression was of the completely vulnerable and exposed environment. This was a view we didn&#39;t have before Tenable VM...."
- Title: [What is Tenable.io used for?](https://www.g2.com/discussions/what-is-tenable-io-used-for) — 1 comment
  > **Top comment:** "vulnerability and security management."
- Title: [What is tenable io?](https://www.g2.com/discussions/what-is-tenable-io) — 1 comment
  > **Top comment:** "Tenable.io is user-friendly front end for Nessus scanners that provides a digestible view of all of the data the scanner is picking up. It allows you to..."
- Title: [Please advice on best practices for utilizing API to tie to visualization dashboards such as Power BI, Qlick, or Tableau](https://www.g2.com/discussions/34558-please-advice-on-best-practices-for-utilizing-api-to-tie-to-visualization-dashboards-such-as-power-bi-qlick-or-tableau) — 1 comment, 1 upvote
  > **Top comment:** "Table"

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/orca-security-vs-tenable-vulnerability-management)

