Orca Security logo

Orca Security

Emerging#11 in Insurance & Risk

Tel Aviv agentless cloud security with SideScanning technology for AWS/Azure/GCP workload visibility; $550M raised at $1.8B valuation serving 1,000+ enterprises competing with Wiz for CSPM and cloud vulnerability management.

Best for: Cloud Compliance AutomationEmerging, rapid growth
19
AI Score
Grade D↑ Trending
AI Visibility Score (Beta)
Insurance & RiskCloud Compliance AutomationWebsiteUpdated March 2026

Brand Intelligence Graph

Capabilities
Cloud Compliance Automation

Company Overview

About Orca Security

Orca Security is a Tel Aviv-based cloud security platform — backed with $550 million raised at a $1.8 billion valuation from investors including ICONIQ Growth, GGV Capital, and Redpoint — providing enterprises with agentless cloud security visibility, vulnerability management, compliance monitoring, and threat detection across AWS, Azure, GCP, and Kubernetes environments through its patented SideScanning technology. Founded in 2019 by Avi Shua and Gil Geron and serving 1,000+ enterprise customers including Box, Databricks, and Postman, Orca scans cloud workloads from outside (without installing agents on VMs or containers) to provide complete visibility in minutes.

Business Model & Competitive Advantage

Orca's SideScanning technology reads cloud workload configurations, package inventories, and file contents directly from cloud storage snapshots rather than through network-based scanning or agent deployment on each asset — the agentless approach provides full visibility into cloud configurations (open ports, encryption status, IAM permissions), installed packages and vulnerabilities (CVEs, patches), and sensitive data exposure (PII, credentials in files) without the operational overhead of agent lifecycle management. The context-aware risk prioritization (ranking vulnerabilities by the actual attack path risk — a critical CVE on an internet-facing VM with admin credentials is higher priority than the same CVE on an internal, isolated instance) reduces the 10,000+ alerts most cloud security tools generate to the 10-50 that actually matter.

Competitive Landscape 2025–2026

In 2025, Orca Security competes in the cloud security posture management (CSPM), cloud workload protection (CWPP), and agentless vulnerability management market with Wiz (cloud security, $900M raised at $12B valuation, the market leader), Lacework (cloud security, $1.3B raised, merged with Fortinet in 2024), and Prisma Cloud (Palo Alto Networks, NASDAQ: PANW) for enterprise cloud security platform. Wiz's aggressive growth and Google's $23B acquisition attempt (blocked, 2024) reflected the importance of the cloud security category. Orca's differentiation focuses on depth of coverage (application layer visibility from SideScanning versus Wiz's API-based approach) and the data security capabilities (sensitive data discovery in cloud storage). The 2025 strategy focuses on Orca's AI Security module for AI/LLM workload protection, growing the data security posture management (DSPM) feature, and expanding the international enterprise market.

Founded
2019
Headquarters
Tel Aviv, Israel
Curated content • Fact-checked and verified

The Orca Security Story

Tel Aviv, Israel
Founded by Avi Shua, Gil Geron (2019 Tel Aviv Check Point agentless)

The Breakthrough Moment

Avi Shua and Gil Geron (ex-Check Point) founded Orca Security in Tel Aviv in 2019 with agentless SideScanning technology for cloud security, reached $1.8B valuation with comprehensive CSPM and CWPP

Original Mission

"Provide complete cloud security without agents using SideScanning technology"

Founders

Avi Shua, Gil Geron (2019 Tel Aviv Check Point agentless)

Recent Activity

View all →
blog_post
NIST AI Risk Management Framework (AI RMF) Explained: What It Is and How Organizations Use It

Key Takeaways The NIST AI Risk Management Framework (AI RMF 1.0) is voluntary guidance from NIST for organizations that build, buy, or operate artificial intelligence systems. Published in January 2023, the framework gives organizations a structured way to identify, assess, measure, and manage AI-related risk across the lifecycle. It organizes work into four functions: Govern, […] The post NIST AI Risk Management Framework (AI RMF) Explained: What It Is and How Organizations Use It appeared first on Orca Security .

blog_post
The AI Data You Forgot to Lock: How Exposed Vector Databases Put Organizations at Risk

The AI revolution has brought a new class of infrastructure into the mainstream: vector databases. Tools like Weaviate, Milvus, and ChromaDB have become essential building blocks for AI-powered applications from retrieval-augmented generation (RAG) pipelines to semantic search and recommendation engines. But as organizations race to adopt these technologies, a familiar pattern is emerging: security is […] The post The AI Data You Forgot to Lock: How Exposed Vector Databases Put Organizations at Risk appeared first on Orca Security .

blog_post
GenAI Risks in Cloud Environments: What Security Teams Are Actually Missing in 2026

Key Takeaways Most cloud security programs were not built for generative AI workloads. The IAM policies, network segmentation rules, and misconfiguration checks that worked for a three-tier web application in 2021 leave serious gaps when the workload is an LLM inference endpoint sitting next to a labeled PII dataset in S3. The attack surface changed. […] The post GenAI Risks in Cloud Environments: What Security Teams Are Actually Missing in 2026 appeared first on Orca Security .

blog_post
What Is Multi-Cloud Security?

Multi-cloud security protects workloads, identities, and data across multiple public cloud environments while maintaining consistent visibility and security controls. As organizations adopt multi-cloud strategies to improve flexibility and resilience, managing security across different platforms becomes increasingly complex. While the principles discussed in this article apply broadly to multi-cloud environments, AWS, Azure, and Google Cloud Platform […] The post What Is Multi-Cloud Security? appeared first on Orca Security .

blog_post
What Is Cloud Detection and Response (CDR)?

Cloud environments move fast, and attackers know it. Traditional security tools built for static infrastructure often fail to detect the complex, multi-stage threats that unfold across cloud workloads, identities, APIs, and containers. Cloud Detection and Response (CDR) was designed to close that visibility gap by providing real-time threat detection, attack correlation, and rapid response capabilities […] The post What Is Cloud Detection and Response (CDR)? appeared first on Orca Security .

blog_post
Linux kernel vulnerability enables local theft of SSH host keys and /etc/shadow

Executive Summary A high-impact Linux kernel vulnerability, currently without a verified public CVE or CVSS score, was disclosed affecting kernels prior to commit 31e62c2e. The issue allows a local unprivileged attacker to steal file descriptors from privileged processes during a narrow exit window, potentially exposing root-only files such as SSH host private keys and /etc/shadow. […] The post Linux kernel vulnerability enables local theft of SSH host keys and /etc/shadow appeared first on Orca Security .

blog_post
18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated DoS and Potential RCE

A critical vulnerability (CVE-2026-42945, CVSS 9.2) was disclosed affecting NGINX Open Source and NGINX Plus, allowing attackers to reliably trigger denial-of-service (DoS) conditions and potentially achieve remote code execution (RCE) via specially crafted HTTP requests. Due to the potential for widespread disruption across internet-facing applications and ingress infrastructure, immediate patching is strongly recommended. Technical Root […] The post 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated DoS and Potential RCE appeared first on Orca Security .

8-K
8-K — 8-K

Material Event filed 2026-05-14

10-Q
10-Q — 10-Q

Quarterly Report filed 2026-05-14

blog_post
Announcing Cloud Security Agent Skills for Orca’s MCP Server

The gap between security data and security decisions has never been smaller. Cloud security teams are drowning in the right data. They have asset inventories, vulnerability feeds, compliance scores, CloudTrail logs, attack paths. The problem isn’t data availability. It’s the distance between raw findings and the analysis a practitioner actually needs to act. That gap […] The post Announcing Cloud Security Agent Skills for Orca’s MCP Server appeared first on Orca Security .

blog_post
TanStack and 160+ npm/PyPI Packages Compromised in Supply Chain Worm Attack

Key Takeaways Executive Summary A critical supply chain compromise was disclosed on May 12, 2026, affecting TanStack, Mistral AI, UiPath, and over 160 additional npm and PyPI packages. The attack, attributed to the threat actor group TeamPCP and dubbed “Mini Shai-Hulud,” allows attackers to steal credentials, self-propagate through the npm ecosystem, and potentially wipe developer […] The post TanStack and 160+ npm/PyPI Packages Compromised in Supply Chain Worm Attack appeared first on Orca Security .

blog_post
Dirty Frag: Linux Kernel Vulnerability Chain Enables Local Privilege Escalation to Root

Executive Summary A Linux kernel vulnerability chain dubbed Dirty Frag has been disclosed, enabling a low-privileged local user to escalate privileges to root on affected Linux systems. The issue is especially relevant for cloud environments where attackers often gain an initial foothold through compromised credentials, vulnerable applications, CI/CD runners, containers, or exposed administrative services before […] The post Dirty Frag: Linux Kernel Vulnerability Chain Enables Local Privilege Escalation to Root appeared first on Orca Security .

Company Timeline

Major milestones in Orca Security's journey

5
Total Events
3
Funding Rounds

Leadership Team

Meet the leaders behind Orca Security

Patricia Davis

Chief Technology Officer

Patricia Davis serves as Chief Technology Officer at Orca Security, bringing extensive industry experience and leadership.

William Johnson

Chief Marketing Officer

William Johnson serves as Chief Marketing Officer at Orca Security, bringing extensive industry experience and leadership.

Richard Thomas

Chief Operating Officer

Richard Thomas serves as Chief Operating Officer at Orca Security, bringing extensive industry experience and leadership.

Lisa Garcia

Chief Financial Officer

Lisa Garcia serves as Chief Financial Officer at Orca Security, bringing extensive industry experience and leadership.

Sarah Chen

Chief Product Officer

Sarah Chen serves as Chief Product Officer at Orca Security, bringing extensive industry experience and leadership.

Lisa Johnson

VP of Engineering

Lisa Johnson serves as VP of Engineering at Orca Security, bringing extensive industry experience and leadership.

Key Differentiators

Emerging Innovator

Orca Security is an emerging player bringing innovative solutions to the Compliance & GRC market.

Frequently Asked Questions

Estimated Visibility Trend (Beta)

Simulated 8-week rolling score

19
↑ Trending

Based on estimated brand signals. Historical tracking coming soon.

Similar Brands

OneTrust logo

OneTrust

Compliance & GRC
B2bEnterpriseFortune500GlobalSaasSecurityInsuranceFintech

OneTrust is an Atlanta-based privacy, security, and governance technology platform that helps enterprises automate compliance with data privacy regulations (GDPR, CCPA/CPRA, LGPD, PDPA), manage risk a

ServiceNow GRC logo

ServiceNow GRC

Compliance & GRC
B2bEnterprisePlatformSaasSecurityPublicInsuranceFintech

ServiceNow GRC (Governance, Risk, and Compliance) is the integrated risk management module within the ServiceNow Now Platform — operated by ServiceNow, Inc. (NYSE: NOW), a Santa Clara, California-base

Securiti logo

Securiti

RegTech
Ai PoweredB2bEnterpriseFintechGlobalPlatformSaasSecurityUnicornInsurance

Securiti is a San Jose, California-based data security and privacy company founded in 2019 by the team behind Symantec's cloud security division. The company has raised over $220 million, achieving un

AuditBoard logo

AuditBoard

Compliance & GRC
B2bEnterpriseFortune500SaasSecurityInsuranceFintech

AuditBoard is a cloud-based audit, risk, and compliance management platform founded in 2014 in Los Angeles by Scott Arnold and Bidhan Roy. The company was built on the insight that enterprise audit an

MetricStream logo

MetricStream

RegTech
AnalyticsB2bEnterpriseFintechGlobalPlatformSaasSecurityTechnologyInsurance

MetricStream is a San Jose, California-based governance, risk, and compliance (GRC) software company founded in 1999 that provides a comprehensive integrated risk management platform serving enterpris

Guidewire logo

Guidewire

Insurance Tech
B2bSaasInsurancePlatformEnterprisePublicCloud NativeFintech

Guidewire Software is a San Mateo, California-based enterprise software company — listed on NYSE (NYSE: GWRE) — providing the core operating platform for property and casualty (P&C) insurance carriers

Compare Orca Security with Competitors

Side-by-side AI visibility scores, platform breakdown, and market position.

For Orca Security

Claim This Profile

Are you from Orca Security? Claim your profile to see full AI mention excerpts, get weekly visibility change alerts, and optimize how AI systems describe your brand.

Claim Orca Security Profile →
For competitors & analysts

Track AI Visibility in Real Time

Monitor how ChatGPT, Gemini, Perplexity, and Claude mention Orca Security vs competitors. Get alerts when AI recommendations shift.

Start Free Tracking →