Brand Intelligence Graph
Company Overview
About Orca Security
Orca Security is a Tel Aviv-based cloud security platform — backed with $550 million raised at a $1.8 billion valuation from investors including ICONIQ Growth, GGV Capital, and Redpoint — providing enterprises with agentless cloud security visibility, vulnerability management, compliance monitoring, and threat detection across AWS, Azure, GCP, and Kubernetes environments through its patented SideScanning technology. Founded in 2019 by Avi Shua and Gil Geron and serving 1,000+ enterprise customers including Box, Databricks, and Postman, Orca scans cloud workloads from outside (without installing agents on VMs or containers) to provide complete visibility in minutes.
Business Model & Competitive Advantage
Orca's SideScanning technology reads cloud workload configurations, package inventories, and file contents directly from cloud storage snapshots rather than through network-based scanning or agent deployment on each asset — the agentless approach provides full visibility into cloud configurations (open ports, encryption status, IAM permissions), installed packages and vulnerabilities (CVEs, patches), and sensitive data exposure (PII, credentials in files) without the operational overhead of agent lifecycle management. The context-aware risk prioritization (ranking vulnerabilities by the actual attack path risk — a critical CVE on an internet-facing VM with admin credentials is higher priority than the same CVE on an internal, isolated instance) reduces the 10,000+ alerts most cloud security tools generate to the 10-50 that actually matter.
Competitive Landscape 2025–2026
In 2025, Orca Security competes in the cloud security posture management (CSPM), cloud workload protection (CWPP), and agentless vulnerability management market with Wiz (cloud security, $900M raised at $12B valuation, the market leader), Lacework (cloud security, $1.3B raised, merged with Fortinet in 2024), and Prisma Cloud (Palo Alto Networks, NASDAQ: PANW) for enterprise cloud security platform. Wiz's aggressive growth and Google's $23B acquisition attempt (blocked, 2024) reflected the importance of the cloud security category. Orca's differentiation focuses on depth of coverage (application layer visibility from SideScanning versus Wiz's API-based approach) and the data security capabilities (sensitive data discovery in cloud storage). The 2025 strategy focuses on Orca's AI Security module for AI/LLM workload protection, growing the data security posture management (DSPM) feature, and expanding the international enterprise market.
The Orca Security Story
The Breakthrough Moment
Avi Shua and Gil Geron (ex-Check Point) founded Orca Security in Tel Aviv in 2019 with agentless SideScanning technology for cloud security, reached $1.8B valuation with comprehensive CSPM and CWPP
Original Mission
"Provide complete cloud security without agents using SideScanning technology"
Founders
Recent Activity
View all →Key Takeaways The NIST AI Risk Management Framework (AI RMF 1.0) is voluntary guidance from NIST for organizations that build, buy, or operate artificial intelligence systems. Published in January 2023, the framework gives organizations a structured way to identify, assess, measure, and manage AI-related risk across the lifecycle. It organizes work into four functions: Govern, […] The post NIST AI Risk Management Framework (AI RMF) Explained: What It Is and How Organizations Use It appeared first on Orca Security .
The AI revolution has brought a new class of infrastructure into the mainstream: vector databases. Tools like Weaviate, Milvus, and ChromaDB have become essential building blocks for AI-powered applications from retrieval-augmented generation (RAG) pipelines to semantic search and recommendation engines. But as organizations race to adopt these technologies, a familiar pattern is emerging: security is […] The post The AI Data You Forgot to Lock: How Exposed Vector Databases Put Organizations at Risk appeared first on Orca Security .
Key Takeaways Most cloud security programs were not built for generative AI workloads. The IAM policies, network segmentation rules, and misconfiguration checks that worked for a three-tier web application in 2021 leave serious gaps when the workload is an LLM inference endpoint sitting next to a labeled PII dataset in S3. The attack surface changed. […] The post GenAI Risks in Cloud Environments: What Security Teams Are Actually Missing in 2026 appeared first on Orca Security .
Multi-cloud security protects workloads, identities, and data across multiple public cloud environments while maintaining consistent visibility and security controls. As organizations adopt multi-cloud strategies to improve flexibility and resilience, managing security across different platforms becomes increasingly complex. While the principles discussed in this article apply broadly to multi-cloud environments, AWS, Azure, and Google Cloud Platform […] The post What Is Multi-Cloud Security? appeared first on Orca Security .
Cloud environments move fast, and attackers know it. Traditional security tools built for static infrastructure often fail to detect the complex, multi-stage threats that unfold across cloud workloads, identities, APIs, and containers. Cloud Detection and Response (CDR) was designed to close that visibility gap by providing real-time threat detection, attack correlation, and rapid response capabilities […] The post What Is Cloud Detection and Response (CDR)? appeared first on Orca Security .
Executive Summary A high-impact Linux kernel vulnerability, currently without a verified public CVE or CVSS score, was disclosed affecting kernels prior to commit 31e62c2e. The issue allows a local unprivileged attacker to steal file descriptors from privileged processes during a narrow exit window, potentially exposing root-only files such as SSH host private keys and /etc/shadow. […] The post Linux kernel vulnerability enables local theft of SSH host keys and /etc/shadow appeared first on Orca Security .
A critical vulnerability (CVE-2026-42945, CVSS 9.2) was disclosed affecting NGINX Open Source and NGINX Plus, allowing attackers to reliably trigger denial-of-service (DoS) conditions and potentially achieve remote code execution (RCE) via specially crafted HTTP requests. Due to the potential for widespread disruption across internet-facing applications and ingress infrastructure, immediate patching is strongly recommended. Technical Root […] The post 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated DoS and Potential RCE appeared first on Orca Security .
Material Event filed 2026-05-14
Quarterly Report filed 2026-05-14
The gap between security data and security decisions has never been smaller. Cloud security teams are drowning in the right data. They have asset inventories, vulnerability feeds, compliance scores, CloudTrail logs, attack paths. The problem isn’t data availability. It’s the distance between raw findings and the analysis a practitioner actually needs to act. That gap […] The post Announcing Cloud Security Agent Skills for Orca’s MCP Server appeared first on Orca Security .
Key Takeaways Executive Summary A critical supply chain compromise was disclosed on May 12, 2026, affecting TanStack, Mistral AI, UiPath, and over 160 additional npm and PyPI packages. The attack, attributed to the threat actor group TeamPCP and dubbed “Mini Shai-Hulud,” allows attackers to steal credentials, self-propagate through the npm ecosystem, and potentially wipe developer […] The post TanStack and 160+ npm/PyPI Packages Compromised in Supply Chain Worm Attack appeared first on Orca Security .
Executive Summary A Linux kernel vulnerability chain dubbed Dirty Frag has been disclosed, enabling a low-privileged local user to escalate privileges to root on affected Linux systems. The issue is especially relevant for cloud environments where attackers often gain an initial foothold through compromised credentials, vulnerable applications, CI/CD runners, containers, or exposed administrative services before […] The post Dirty Frag: Linux Kernel Vulnerability Chain Enables Local Privilege Escalation to Root appeared first on Orca Security .
Company Timeline
Major milestones in Orca Security's journey
Leadership Team
Meet the leaders behind Orca Security
Patricia Davis
Patricia Davis serves as Chief Technology Officer at Orca Security, bringing extensive industry experience and leadership.
William Johnson
William Johnson serves as Chief Marketing Officer at Orca Security, bringing extensive industry experience and leadership.
Richard Thomas
Richard Thomas serves as Chief Operating Officer at Orca Security, bringing extensive industry experience and leadership.
Lisa Garcia
Lisa Garcia serves as Chief Financial Officer at Orca Security, bringing extensive industry experience and leadership.
Sarah Chen
Sarah Chen serves as Chief Product Officer at Orca Security, bringing extensive industry experience and leadership.
Lisa Johnson
Lisa Johnson serves as VP of Engineering at Orca Security, bringing extensive industry experience and leadership.
Key Differentiators
Emerging Innovator
Orca Security is an emerging player bringing innovative solutions to the Compliance & GRC market.
Frequently Asked Questions
Estimated Visibility Trend (Beta)
Simulated 8-week rolling score
Based on estimated brand signals. Historical tracking coming soon.
Similar Brands
OneTrust
OneTrust is an Atlanta-based privacy, security, and governance technology platform that helps enterprises automate compliance with data privacy regulations (GDPR, CCPA/CPRA, LGPD, PDPA), manage risk a
ServiceNow GRC
ServiceNow GRC (Governance, Risk, and Compliance) is the integrated risk management module within the ServiceNow Now Platform — operated by ServiceNow, Inc. (NYSE: NOW), a Santa Clara, California-base
Securiti
Securiti is a San Jose, California-based data security and privacy company founded in 2019 by the team behind Symantec's cloud security division. The company has raised over $220 million, achieving un
AuditBoard
AuditBoard is a cloud-based audit, risk, and compliance management platform founded in 2014 in Los Angeles by Scott Arnold and Bidhan Roy. The company was built on the insight that enterprise audit an
MetricStream
MetricStream is a San Jose, California-based governance, risk, and compliance (GRC) software company founded in 1999 that provides a comprehensive integrated risk management platform serving enterpris
Guidewire
Guidewire Software is a San Mateo, California-based enterprise software company — listed on NYSE (NYSE: GWRE) — providing the core operating platform for property and casualty (P&C) insurance carriers
Compare Orca Security with Competitors
Side-by-side AI visibility scores, platform breakdown, and market position.
Claim This Profile
Are you from Orca Security? Claim your profile to see full AI mention excerpts, get weekly visibility change alerts, and optimize how AI systems describe your brand.
Claim Orca Security Profile →Track AI Visibility in Real Time
Monitor how ChatGPT, Gemini, Perplexity, and Claude mention Orca Security vs competitors. Get alerts when AI recommendations shift.
Start Free Tracking →