orca.security Open in urlscan Pro
192.0.66.46  Public Scan

Submitted URL: https://go.orca.security/e/898611/22-august-newsletter-prospects/4js95/288518014?h=kaox19zog9m2efAQVtsBJ7oSRdr6GrwAgQpu3_...
Effective URL: https://orca.security/resources/events/?utm_source=orcaemail&utm_medium=newsletter&utm_campaign=22-august-newsletter-p...
Submission: On January 17 via api from DE — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="ais-SearchBox-form" novalidate="">
  <input class="ais-SearchBox-input ais-SearchBox-input-v2" autofocus="true" autocomplete="off" autocorrect="off" autocapitalize="off" placeholder="What are you looking for?" spellcheck="false" maxlength="512" type="search" value="">
  <button class="ais-SearchBox-submit" type="submit" title="Submit the search query."></button>
  <div class="ais-SearchBox-close">
    <span class="push-enter-text">Press enter to search</span>
    <button class="ais-SearchBox-reset-inner" aria-label="Close Search">
      <svg focusable="false" aria-hidden="true" width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M2.28818 1.11612C1.80002 0.627961 1.00857 0.627961 0.520413 1.11612C0.032258 1.60427 0.032258 2.39573 0.520413 2.88388L5.13653 7.5L0.520413 12.1161C0.032258 12.6043 0.032258 13.3957 0.520413 13.8839C1.00857 14.372 1.80002 14.372 2.28818 13.8839L6.9043 9.26777L11.5204 13.8839C12.0086 14.372 12.8 14.372 13.2882 13.8839C13.7763 13.3957 13.7763 12.6043 13.2882 12.1161L8.67206 7.5L13.2882 2.88388C13.7763 2.39573 13.7763 1.60427 13.2882 1.11612C12.8 0.627962 12.0086 0.627962 11.5204 1.11612L6.9043 5.73223L2.28818 1.11612Z"
          fill="white"></path>
      </svg>
    </button>
  </div>
</form>

GET https://orca.security/

<form class="navbar-form" role="search" method="get" action="https://orca.security/">
  <div class="form-group">
    <div class="autoComplete_wrapper" role="combobox" aria-owns="autoComplete_list_1" aria-haspopup="true" aria-expanded="false">
      <div class="autoComplete_wrapper" role="combobox" aria-owns="autoComplete_list_1" aria-haspopup="true" aria-expanded="false"><input id="autoComplete" type="search" dir="ltr" spellcheck="false" autocorrect="off" autocomplete="off"
          autocapitalize="off" name="s" class="form-control search-autocomplete" placeholder="Search Events" aria-controls="autoComplete_list_1" aria-autocomplete="both" aria-activedescendant="">
        <ul id="autoComplete_list_1" role="listbox" hidden="" class="results_list"></ul>
      </div>
      <ul id="autoComplete_list_1" role="listbox" class="results_list"></ul>
    </div>
    <div class="close-btn"></div>
  </div>
  <button type="submit" class="open-search-form"><i class="icon-magnifier search-button"></i></button>
</form>

Text Content

 * English
 * Search
 * Contact
 * Support
 * Login
   * Login
   * USA
   * Europe
   * Australia
   * US-Gov

 * Platform
   Platform
   
   The Orca Platform
   
   Secure cloud infrastructure, workloads, data and identities with our
   industry-leading agentless platform.
   
    * Platform Overview
   
    * Cloud Security Posture Management
      Identify and remediate misconfigurations across clouds
    * Cloud Workload Protection
      Protect VMs, containers, and serverless functions
    * Container and Kubernetes Security
      Scalable security for containers and Kubernetes for every cloud layer
    * Cloud Detection & Response
      24x7 monitoring and response across the entire cloud attack surface
   
    * Vulnerability Management
      Agentless vulnerability management that prioritizes your most critical
      risks
    * Cloud Infrastructure Entitlement Management
      Secure cloud identities and entitlements
    * Multi-Cloud Compliance
      Achieve regulatory compliance with frameworks, benchmarks, and custom
      checks
    * Shift Left Security
      Secure cloud-native apps across the SDLC
   
    * SideScanning™ Technology
      Our innovative approach provides complete cloud coverage
    * API Security
      Complete API discovery, security posture management, and drift detection

 * Use Cases
   Use Cases
   
   Case Studies
   
   Orca Security is trusted by the most innovative companies across the globe.
   
    * Browse Case Studies
   
   Industries
   
    * Financial Services
    * Technology
    * Government
    * Retail
    * Healthcare
    * Media & Entertainment
   
   User Roles
   
    * CISO
    * Security Architect
    * DevOps
   
   Orca Delivers Near Real-Time Cloud Security Visibility to FourKites.
   
   Read Case Study
   
   Insurance Innovator Lemonade Goes from 0 to 100% Cloud Visibility with Orca
   Security.
   
   Read Case Study

 * Partners
   Partners
   
   Our Partners
   
   Our team is extended and strengthened by our strong partnerships across the
   Cloud Security ecosystem.
   
    * Partner Overview
    * Join the Program
   
    * Amazon Web Services
    * Microsoft Azure
    * Google Cloud
    * Alibaba Cloud

 * Research
   Research
   
   Orca Research Pod
   
   Our expert security research team discovers and analyzes cloud risks and
   vulnerabilities to strengthen the Orca platform.
   
    * See Our Latest Discoveries
   
   Orca Research
   
   How Orca Found SSRF Vulnerabilities in Four Different Azure Services
   
   CosMiss: Azure Cosmos DB Notebook Remote Code Execution Vulnerability
   
   Cloud Risk Encyclopedia - Browse Thousands of Cloud Risks

 * Resources
   Resources
   
   Resource Library
   
   Download and view eBooks, whitepapers, videos and more in our packed Resource
   Library.
   
    * Browse Resources
   
   Blog
   
   Read Cloud Security thought leadership, how-to's, and insightful posts from
   Orca Security experts.
   
    * Browse Blogs
   
    * Cloud Risk Encyclopedia
    * Product Articles & Videos
    * Comparisons
    * Events
    * Podcasts
    * Customer Support

 * About
   About
   
   Our Customers
   
   Orca Security is trusted by the most innovative companies across the globe.
   
    * Browse Case Studies
   
    * Why Orca
    * About Us
    * Newsroom
    * Ratings & Reviews
    * Media & Press
    * Careers
    * FAQs
    * Contact Us

 * English
 * Search
 * Contact
 * Support
 * Login
   * Login
   * USA
   * Europe
   * Australia
   * US-Gov

 * Free Trial
 * Get Demo



Press enter to search
 * Cloud Risk
   Superglue: A remediated zero-day vulnerability in AWS Glue
 * Cloud Risk
   BreakingFormation: Vulnerability in AWS CloudFormation
 * Blog
   Q2 Update: How the Cloud Risk Encyclopedia Enhances DevOps Production
   Checklists
 * Event
   Virtual Cloud Security Camp
 * Case Studies
   Clearco Enhances Comprehensive Security on Google Cloud Platform with Orca
   Security

 * Cloud Risk
   Superglue: A remediated zero-day vulnerability in AWS Glue

View more results


ORCA EVENTS & WEBINARS

Register for upcoming webinars and events where industry experts provide top
insights on a variety of cloud security topics.


event

ORCA SECURITY FEATURE HIGHLIGHT: CSPM & CWPP



 * January 25
 * Virtual

Register Now

Filter Events



Event Type

All AllEvent
 * All
 * Event

Month

All AllFebruaryJanuaryOctober
 * All
 * February
 * January
 * October

Topic

All AllCloud security
 * All
 * Cloud security

Region

All AllEMEANorth America
 * All
 * EMEA
 * North America

Event

VIRTUAL CLOUD SECURITY CAMP

 * January 19
 * Virtual

Register Now

Event

BUDGETING FOR CLOUD SECURITY IN 2023: TIPS FOR A TOUGH ECONOMY

 * January 24
 * Virtual

Register Now

ON-DEMAND WEBINARS

Explore our library of on-demand webinars, covering the latest in cloud
security.

View on-demand webinars

Event

NEW YEAR, NEW BOOTS

 * January 24
 * Plano, TX

Register Now

Event

CYBERTECH TEL AVIV

 * January 30-February 1
 * Tel Aviv, IL

Register Now

Event

CISO ROUNDTABLE: STATE OF PUBLIC CLOUD SECURITY

 * February 21
 * Virtual

Register Now

Event

LAZY DOG DINE AND DASH

 * February 21
 * Plano, TX

Register Now
Load more
See Orca in action-> View a 10 minute recorded demo or sign up for a
personalized one-on-one walk-through.


 * PLATFORM
   
   
   * CLOUD SECURITY PLATFORM
     
     * Platform
     * SideScanning™ Technology
     * Context-Aware Security
     * Built-in Compliance
     * Automation & Customization
   
   
   * TECHNOLOGY ECOSYSTEM
     
     * Amazon Web Services
     * Microsoft Azure
     * Google Cloud Platform


 * SOLUTIONS
   
   
   * BY SOLUTION
     
     * Malware Detection
     * Vulnerability Management
     * Sensitive Data Detection
     * Container and Kubernetes Security
     * Multi-Cloud Compliance and Security
     * Cloud Security Posture Management (CSPM)
     * CIEM
     * Cloud Workload Protection Platform (CWPP)
     * Cloud Detection and Response (CDR)
     * Shift Left Security
     * API Security
   
   
   * BY INDUSTRY
     
     * Financial Services
     * Technology Services
     * Media & Entertainment
     * Healthcare
     * Retail


 * RESOURCES
   
   * * Library
     * Product Info
     * Podcast
     * Case Studies
     * Cloud Risk Encyclopedia
     * Blog
     * Events
   
   
   * COMPARISONS
     
     * Cloud Security Posture Managers (CSPM)
     * Prisma Cloud Security 2021
     * Prisma Cloud Security 2022
     * Qualys Cloud Agent
     * Twistlock Container Security
     * Redlock Palo Alto
     * Rapid7 InsightVM
     * Check Point CloudGuard Dome9


 * COMPANY
   
   * * About
     * Partners
     * Reviews
     * Orca Research Pod
     * Careers
     * Newsroom
     * Media Kit
     * FAQs
   * Contact
     * Support
     * Login


 * STAY IN TOUCH
   
   Get cloud security insights
   and the latest Orca news
   
   
   * 
   * 
   * 
   * 

--------------------------------------------------------------------------------

©2023 Orca Security. All rights reserved.

 * Privacy Policy
 * Terms of Use

 * 
 * 
 * 
 * 


word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1

COOKIES & PRIVACY

We use cookies to personalize your experience. More information

SELECT COOKIES TO ACCEPT

 * Necessary
 * Site Preferences
 * Analytics
 * Marketing

Accept CookiesCustomise Cookies