Introducing G2.ai, the future of software buying.Try now

Compare Orca Security and Veracode Application Security Platform

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Orca Security
Orca Security
Star Rating
(223)4.6 out of 5
Market Segments
Mid-Market (50.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Learn more about Orca Security
Veracode Application Security Platform
Veracode Application Security Platform
Star Rating
(25)3.8 out of 5
Market Segments
Enterprise (52.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Veracode Application Security Platform
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Reviews say that Orca Security excels in ease of setup, scoring 9.3 compared to Veracode's 5.7. Users report that Orca's streamlined onboarding process allows teams to get started quickly without extensive configuration.
  • Users on G2 mention that Orca Security's quality of support is outstanding, with a score of 9.2, while Veracode's support is rated at 8.0. Reviewers highlight Orca's responsive customer service and helpful documentation as key strengths.
  • Reviewers mention that Orca Security has a higher ease of use rating at 9.0 compared to Veracode's 7.3. Users report that Orca's intuitive interface and user-friendly features make it accessible for teams of all skill levels.
  • Users say that Orca Security has a significantly better product direction score of 9.8 versus Veracode's 6.3. Reviewers appreciate Orca's commitment to continuous improvement and innovation, which aligns with evolving security needs.
  • G2 users report that Orca Security meets requirements more effectively, scoring 9.1 compared to Veracode's 8.1. Reviewers mention that Orca's comprehensive security coverage and integration capabilities are particularly beneficial for mid-market companies.
  • Users report that while Veracode Application Security Platform is favored in the enterprise segment (52.2% of reviews), Orca Security shines in the mid-market space (50.7% of reviews), indicating that Orca is tailored to meet the specific needs of smaller organizations.
Pricing
Entry-Level Pricing
Orca Security
By Compute Asset
Contact Us
Learn more about Orca Security
Veracode Application Security Platform
No pricing available
Free Trial
Orca Security
Free Trial is available
Veracode Application Security Platform
No trial information available
Ratings
Meets Requirements
9.1
190
8.1
19
Ease of Use
9.0
195
7.3
19
Ease of Setup
9.3
171
5.7
7
Ease of Admin
9.0
151
7.4
7
Quality of Support
9.2
185
8.0
18
Has the product been a good partner in doing business?
9.4
150
7.9
7
Product Direction (% positive)
9.8
179
6.3
19
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
8.5
61
Not enough data
Management
8.5
56
Not enough data
8.0
51
Not enough data
9.0
54
Not enough data
Operations
8.5
51
Not enough data
8.5
55
Not enough data
8.7
55
Not enough data
Security Controls
8.7
56
Not enough data
7.7
53
Not enough data
8.9
59
Not enough data
8.7
57
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Testing
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Static Application Security Testing (SAST)Hide 14 FeaturesShow 14 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Testing
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Static Application Security Testing (SAST)
Not enough data
Not enough data
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
Not enough data
8.5
7
Administration
Not enough data
7.9
7
Not enough data
9.2
6
Analysis
Not enough data
8.3
7
Not enough data
8.3
5
Not enough data
9.3
7
Not enough data
8.8
7
Not enough data
8.6
6
Testing
Not enough data
Not enough data
Not enough data
9.0
5
Not enough data
Not enough data
Not enough data
8.3
5
Not enough data
8.0
5
Not enough data
7.8
6
8.2
60
Not enough data
Administration
8.6
59
Not enough data
8.0
51
Not enough data
8.9
58
Not enough data
8.6
56
Not enough data
Monitoring
8.4
50
Not enough data
7.8
48
Not enough data
8.5
52
Not enough data
Protection
8.1
52
Not enough data
7.5
48
Not enough data
7.8
51
Not enough data
7.7
47
Not enough data
8.4
118
Not enough data
Security
8.9
114
Not enough data
8.0
110
Not enough data
7.7
101
Not enough data
8.5
108
Not enough data
Compliance
8.8
106
Not enough data
8.3
100
Not enough data
8.5
105
Not enough data
Administration
8.3
105
Not enough data
8.6
109
Not enough data
7.9
102
Not enough data
7.9
122
Not enough data
Performance
8.6
109
Not enough data
8.8
116
Not enough data
7.5
117
Not enough data
9.2
119
Not enough data
Network
8.5
111
Not enough data
8.6
106
Not enough data
8.8
111
Not enough data
Application
6.2
87
Not enough data
6.5
84
Not enough data
6.3
83
Not enough data
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
Software Composition AnalysisHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Functionality - Software Composition Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Effectiveness - Software Composition Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.1
33
Not enough data
API Management
8.6
33
Not enough data
8.5
31
Not enough data
8.4
33
Not enough data
8.1
30
Not enough data
Security Testing
8.8
30
Not enough data
7.9
29
Not enough data
7.5
29
Not enough data
Security Management
8.5
29
Not enough data
8.2
31
Not enough data
6.0
29
Not enough data
Not enough data
Not enough data
Documentation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
8.5
98
Not enough data
Configuration
6.8
81
Not enough data
8.5
92
Not enough data
8.1
81
Not enough data
7.6
83
Not enough data
8.4
87
Not enough data
Visibility
9.1
92
Not enough data
9.3
94
Not enough data
Vulnerability Management
8.3
89
Not enough data
9.1
96
Not enough data
8.9
94
Not enough data
8.9
95
Not enough data
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
8.4
31
Not enough data
Access control - Cloud Infrastructure Entitlement Management (CIEM)
8.9
31
Not enough data
8.4
30
Not enough data
8.3
30
Not enough data
7.6
30
Not enough data
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
8.4
31
Not enough data
7.5
30
Not enough data
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
9.2
31
Not enough data
8.8
31
Not enough data
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Static Code AnalysisHide 3 FeaturesShow 3 Features
Not enough data
Not enough data
Agentic AI - Static Code Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
AI AppSec AssistantsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Performance - AI AppSec Assistants
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Integration - AI AppSec Assistants
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Interactive Application Security Testing (IAST)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Agentic AI - Interactive Application Security Testing (IAST)
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Agentic AI - Cloud Detection and Response (CDR)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Cloud Detection and Response (CDR)
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Orca Security
Orca Security
Small-Business(50 or fewer emp.)
11.7%
Mid-Market(51-1000 emp.)
50.5%
Enterprise(> 1000 emp.)
37.8%
Veracode Application Security Platform
Veracode Application Security Platform
Small-Business(50 or fewer emp.)
17.4%
Mid-Market(51-1000 emp.)
30.4%
Enterprise(> 1000 emp.)
52.2%
Reviewers' Industry
Orca Security
Orca Security
Computer Software
14.9%
Information Technology and Services
13.1%
Financial Services
9.5%
Computer & Network Security
6.8%
Hospital & Health Care
5.4%
Other
50.5%
Veracode Application Security Platform
Veracode Application Security Platform
Information Technology and Services
30.4%
Hospital & Health Care
13.0%
Consumer Goods
8.7%
Computer Software
8.7%
Telecommunications
4.3%
Other
34.8%
Alternatives
Orca Security
Orca Security Alternatives
Wiz
Wiz
Add Wiz
Cortex Cloud
Cortex Cloud
Add Cortex Cloud
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Veracode Application Security Platform
Veracode Application Security Platform Alternatives
Checkmarx
Checkmarx
Add Checkmarx
SonarQube
SonarQube
Add SonarQube
GitHub
GitHub
Add GitHub
GitLab
GitLab
Add GitLab
Discussions
Orca Security
Orca Security Discussions
What does Orca Security do?
1 Comment
Official Response from Orca Security
Orca Security is a leader in CNAPP innovation (Cloud Native Application Protection Platform) for workload and data protection, cloud security posture...Read more
What is ORCA platform?
1 Comment
Yevhen R.
YR
SIEM tool for hunting threats, outdated oackages, overpowerful permissions, expired certificates. Mainly for AWS servicesRead more
How much does Orca security cost?
1 Comment
MS
$6500 per 50 workloads per yearRead more
Veracode Application Security Platform
Veracode Application Security Platform Discussions
Monty the Mongoose crying
Veracode Application Security Platform has no discussions with answers