orca.security
Open in
urlscan Pro
192.0.66.102
Public Scan
Submitted URL: https://pod.orca.security/Nzk2LVBCVy01NTkAAAGQmOlmQgERnh7mIu7kQoiUjWHLDY_2fP2r2GsPVnJpsjB6yLZHtk94mm8frGPAFbVM_KxNg_g=
Effective URL: https://orca.security/resources/blog/cnapp-is-about-solving-problems-not-lists-of-features/?utm_source=orca&utm_medium...
Submission: On January 11 via manual from US — Scanned from DE
Effective URL: https://orca.security/resources/blog/cnapp-is-about-solving-problems-not-lists-of-features/?utm_source=orca&utm_medium...
Submission: On January 11 via manual from US — Scanned from DE
Form analysis
5 forms found in the DOM<form class="ais-SearchBox-form" novalidate="">
<input class="ais-SearchBox-input ais-SearchBox-input-v2" autofocus="true" autocomplete="off" autocorrect="off" autocapitalize="off" placeholder="What are you looking for?" spellcheck="false" maxlength="512" type="search" value="">
<button class="ais-SearchBox-submit" type="submit" title="Submit the search query."></button>
<div class="ais-SearchBox-close">
<span class="push-enter-text">Press enter to search</span>
<button class="ais-SearchBox-reset-inner" aria-label="Close Search">
<svg focusable="false" aria-hidden="true" width="14" height="15" viewBox="0 0 14 15" fill="none" xmlns="http://www.w3.org/2000/svg">
<path fill-rule="evenodd" clip-rule="evenodd"
d="M2.28818 1.11612C1.80002 0.627961 1.00857 0.627961 0.520413 1.11612C0.032258 1.60427 0.032258 2.39573 0.520413 2.88388L5.13653 7.5L0.520413 12.1161C0.032258 12.6043 0.032258 13.3957 0.520413 13.8839C1.00857 14.372 1.80002 14.372 2.28818 13.8839L6.9043 9.26777L11.5204 13.8839C12.0086 14.372 12.8 14.372 13.2882 13.8839C13.7763 13.3957 13.7763 12.6043 13.2882 12.1161L8.67206 7.5L13.2882 2.88388C13.7763 2.39573 13.7763 1.60427 13.2882 1.11612C12.8 0.627962 12.0086 0.627962 11.5204 1.11612L6.9043 5.73223L2.28818 1.11612Z"
fill="white"></path>
</svg>
</button>
</div>
</form>
<form id="mktoForm_1486" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutAbove" style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); width: 1591px;">
<style type="text/css"></style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
<div class="mktoOffset" style="width: 5px;"></div>
<div class="mktoFieldWrap mktoRequiredField" data-for-type="email"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 100px;" data-for-type="email">
<div class="mktoAsterix">*</div>Email Address
</label>
<div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
aria-required="true" style="width: 150px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_campaign__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="nur-prac" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_content__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="v2" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="email" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="orca" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_term__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<script src="https://www.google.com/recaptcha/api.js?onload=captchaCallback" type="text/javascript" async="async" defer="defer"></script>
<div>
<script type="text/javascript">
var formId = 1486;
var captchaCallback = function(a) {
var b = document.getElementsByClassName("grecaptcha-badge");
if (b.length > 0)
for (var c = 0; c < b.length; c++) b[c].style.visibility = "hidden";
if (a) {
var d = this.MktoForms2.getForm(formId);
d && d.setCaptchaValue(a)
}
};
</script>
</div>
<div id="captcha" class="g-recaptcha" data-callback="captchaCallback" data-expired-callback="captchaExpired" data-sitekey="6LeINjUoAAAAADqSvQdrUey-8BtEh34CPuyHeIXp" data-size="invisible">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden; visibility: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-1a47zi1fnnul" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LeINjUoAAAAADqSvQdrUey-8BtEh34CPuyHeIXp&co=aHR0cHM6Ly9vcmNhLnNlY3VyaXR5OjQ0Mw..&hl=de&v=Ya-Cd6PbRI5ktAHEhm9JuKEu&size=invisible&cb=4aszdjx4xb88"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div>
</div>
<div class="mktoCaptchaDisclaimer">This site is protected by reCAPTCHA and the Google <a href="https://policies.google.com/privacy" target="_blank">Privacy Policy</a> and
<a href="https://policies.google.com/terms" target="_blank">Terms of Service</a> apply.</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoNative" style="margin-left: 110px;"><button type="submit" class="mktoButton">Submit</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="1486"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="796-PBW-559">
</form>
<form id="mktoForm_1047" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutAbove" style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); width: 1591px;">
<style type="text/css"></style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
<div class="mktoOffset" style="width: 5px;"></div>
<div class="mktoFieldWrap mktoRequiredField" data-for-type="email"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 100px;" data-for-type="email">
<div class="mktoAsterix">*</div>Email Address
</label>
<div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
aria-required="true" style="width: 150px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_campaign__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="nur-prac" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_content__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="v2" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_medium__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="email" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="orca" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow"><input type="hidden" name="utm_term__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="" style="margin-bottom: 5px;">
<div class="mktoClear"></div>
</div>
<script src="https://www.google.com/recaptcha/api.js?onload=captchaCallback" type="text/javascript" async="async" defer="defer"></script>
<div>
<script type="text/javascript">
var formId = 1047;
var captchaCallback = function(a) {
var b = document.getElementsByClassName("grecaptcha-badge");
if (b.length > 0)
for (var c = 0; c < b.length; c++) b[c].style.visibility = "hidden";
if (a) {
var d = this.MktoForms2.getForm(formId);
d && d.setCaptchaValue(a)
}
};
</script>
</div>
<div id="captcha" class="g-recaptcha" data-callback="captchaCallback" data-expired-callback="captchaExpired" data-sitekey="6LeINjUoAAAAADqSvQdrUey-8BtEh34CPuyHeIXp" data-size="invisible">
<div class="grecaptcha-badge" data-style="none" style="width: 256px; height: 60px; position: fixed; visibility: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-rihmbyjny9lm" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LeINjUoAAAAADqSvQdrUey-8BtEh34CPuyHeIXp&co=aHR0cHM6Ly9vcmNhLnNlY3VyaXR5OjQ0Mw..&hl=de&v=Ya-Cd6PbRI5ktAHEhm9JuKEu&size=invisible&cb=e2l5icvwfxru"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response-1" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
<div class="mktoCaptchaDisclaimer">This site is protected by reCAPTCHA and the Google <a href="https://policies.google.com/privacy" target="_blank">Privacy Policy</a> and
<a href="https://policies.google.com/terms" target="_blank">Terms of Service</a> apply.</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoNative" style="margin-left: 110px;"><button type="submit" class="mktoButton">Submit</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="1047"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="796-PBW-559">
</form>
<form novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutAbove" style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>
<form novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutAbove" style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>
Text Content
___ * Search * Contact * Login * Login * USA * Europe * Australia * US-Gov * Platform Platform The Orca Platform Agentless-first, AI-driven Cloud Security Platform that deploys in minutes and protects every layer of your cloud estate. * Platform Overview * AI-Driven * Cloud Security Posture Management Identify and remediate misconfigurations across clouds * Cloud Workload Protection Protect VMs, containers, and serverless functions * Container and Kubernetes Security Scalable security for containers and Kubernetes for every cloud layer * Cloud Detection & Response 24x7 monitoring and response across the entire cloud attack surface * Vulnerability Management Agentless vulnerability management that prioritizes your most critical risks * Cloud Infrastructure Entitlement Management Secure cloud identities and entitlements * Multi-Cloud Compliance Achieve regulatory compliance with frameworks, benchmarks, and custom checks * Shift Left Security Secure cloud-native apps across the SDLC * SideScanning™ Technology Our innovative approach provides complete cloud coverage * API Security Complete API discovery, security posture management, and drift detection * Data Security and Posture Management Reduce the risk of data breaches and protect sensitive PII * Why Orca Why Orca Case Studies Our customers worldwide trust Orca to secure their Cloud. * View Case Studies Why Orca * Why Orca Learn all about our purpose-built cloud security platform * Our Company Learn about our company, culture and team * Ratings & Reviews See what our users say about us * Security Research The latest discoveries from the Research Pod Compare Orca * Prisma Cloud Many acquisitions and little integration * Qualys TotalCloud Not nearly as total as you want * Lacework More complexity, less visibility * Aqua End up underwater with alert fatigue * Rapid7 Work a lot harder for less * Tenable Fragmented coverage makes this untenable * CloudGuard Doesn’t check all the boxes Industries * Financial Services * Technology * Government * Retail * Healthcare * Media & Entertainment * Partners Partners Our Partners Our team is extended and strengthened by our strong partnerships across the Cloud Security ecosystem. * Partner Overview * Amazon Web Services * Microsoft Azure * Google Cloud * Alibaba Cloud * Oracle Cloud * Research Research Orca Research Pod Our expert security research team discovers and analyzes cloud risks and vulnerabilities to strengthen the Orca platform. * See Our Latest Discoveries Orca Research Bad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Two XSS Vulnerabilities in Azure with Embedded postMessage IFrames The Top 5 Cloud Security Risks of 2023 (so far) * Resources Resources Resource Library Download and view eBooks, whitepapers, videos and more in our packed Resource Library. * Browse Resources Blog Read Cloud Security thought leadership, how-to's, and insightful posts from Orca Security experts. * Browse Blogs Featured Resources Orca Events & Webinars 2023 Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPP) TAG Cyber Report Shows 207% ROI on the Orca Cloud Security Platform * About About Careers Join the Orca team, and help secure the cloud for the world's most innovative companies. * See Open Roles * Why Orca * Newsroom * Media & Press * About Us * Ratings & Reviews * Contact Us * Search * Contact * Login * Login * USA * Europe * Australia * US-Gov * Get Demo Press enter to search * Blog 4 Cloud Security Considerations for Financial Services Companies * Blog Q2 Update: How the Cloud Risk Encyclopedia Enhances DevOps Production Checklists * On-Demand Webinar The Challenges of Securing & Monitoring Multi-Cloud Applications * Case Studies Clearco Enhances Comprehensive Security on Google Cloud Platform with Orca Security * Press Release Orca Security Appoints Raf Chiodo as Chief Revenue Officer * Blog 4 Cloud Security Considerations for Financial Services Companies View more results * Blog Published: Jul 25, 2023 CNAPP IS ABOUT SOLVING PROBLEMS, NOT LONG LISTS OF FEATURES Ashley Ward Reading time: 6 Minutes * * * * As they move into the cloud, security teams continue to be concerned with confidentiality, integrity, and availability of information. Only now they just have to do it across a wider spectrum of technologies, new processes and methodologies, and new teams with different operating practices across their organizations. CHALLENGES SECURITY TEAMS FACE IN THE CLOUD Cloud native technologies and cloud computing bring a vast range of benefits to our business units and our organizations. This cuts across the people, processes and technology. Security teams now have to address: 1. People 1. New support matrices in the shared responsibility model 2. Infrastructure management now delegated to different teams via Infrastructure as Code or DevOps/SRE teams 3. Separated service-oriented teams; no longer specialist teams but multi-disciplined 2. Processes 1. Automated deployments 2. Service consumption now single-click, not onboarding through multiple teams 3. Immutable infrastructure 3. Technology 1. Virtual Machine OS shifts (Amazon Linux, Containerd) 2. Containers 3. Kubernetes 4. Serverless Organizations looking to replicate their data center setup in a public cloud misunderstand how to achieve the greatest benefits of public cloud, such as scalability, speed to market, and more. For example, AWS places emphasis on this in their modernization piece of the migration strategy: assess, mobilize, migrate and modernize. This modernization work refactors your applications to be cloud native as opposed to “lifted and shifted” into a public cloud. The security boundaries are redefined with account segregation, which offers blast radius protections. However, this also leads to the need for more complex best practices that security teams must understand and assess. For example, Azure landing zones provide an excellent example of how platform re-architecture, not just solution/application re-architecture, is necessary in the cloud. You can learn more about Azure landing zones here. The threats have changed, too; bad actors are no longer just looking for financial or intellectual property opportunities but cloud account takeover. Not only are organizations targeted because of who they are but also the democratization of phishing and hacking toolsets have created cottage industries where access to networks is sold and persistent threat access is a commodity. Cybercrime-as-a-Service, where criminals can rent or purchase ready-made hacking tools, exploit kits, or botnets, enables them to launch attacks without significant technical expertise. This underground marketplace has created a thriving ecosystem for malicious activities. Democratized hacking tools often come with automation capabilities as well, allowing bad actors to launch attacks quickly and efficiently. Automated tools can scan for vulnerabilities, perform brute-force attacks, or execute malicious activities at a much faster pace than manual methods. Our threat research team’s recent work on honeypots provides some excellent real world evidence. INITIAL SECURITY VENDORS BROUGHT A LEGACY APPROACH TO THE CLOUD Legacy security vendors had a hammer and viewed all these issues as nails. They have taken these new challenges and looked at them through the lens of their existing products. I’ll discuss the cloud first approach in a moment, first let’s dive into how legacy vendors approached cloud security: Legacy Security Vendor approach: Break cloud security down into component parts (listed below) and evaluate your product against these siloes. Where there is a gap, acquire a company to fill it. This leads to what I like to call “checkbox security,” – it’s great for an RFP but, in reality, creates pain points for security and remediation teams. 1. Cloud Workload Protection Platform (CWPP) 2. Cloud Security Posture Management (CSPM) 3. Kubernetes Security Posture Management (KSPM) 4. Data Security Posture Management (DSPM) 5. Cloud Identity and Entitlement Management (CIEM) 6. Shift Left Security 7. Application Programming Interface (API) Security 8. Cloud Detection and Response (CDR) CLOUD NATIVE SECURITY DESERVES A PURPOSE-BUILT CNAPP Public cloud and cloud native present new opportunities and ways of working. Vendors willing to innovate and embrace these new technologies and processes have an opportunity to secure all aspects of the cloud in one solution, featuring: 1. Coverage: Cloud security requires 100% visibility and coverage of the entire cloud estate. 2. Comprehensive: The cloud must be secured holistically in one solution to detect all security risks. 3. Context: Cloud security findings are best understood as attack vectors, rather than siloed alerts. 4. Consumable: Ingest loads of data and make it consumable and actionable so that teams can use it to support decision making. Building a checkbox security platform is more convenient for legacy security vendors, as they can maintain customer focus on their core products such as firewalls, monitoring software, VPN solutions, or proxies. They can then assert that their products are future-proofed by listing numerous features within each category. It’s not about technology–it’s about how technology can be an enabler for the people and the process. HOW PURPOSE-BUILT PLATFORMS SOLVE REAL WORLD PROBLEMS As the first cybersecurity vendor to deliver agentless SideScanning technology, the Orca Security founders identified the ways cloud native gave us an opportunity to do security better. By developing a purpose-built product that leverages data and utilizes tools provided by cloud service providers (CSPs), a comprehensive overview of all services across accounts and public cloud providers can be created. Such a purpose-built platform has the capability to unify previously siloed areas (CSPM, CWPP, etc.) into a single, universal solution. Gartner refers to this as a Cloud Native Application Protection Platform. This differs from the acquisition and feature-driven approach used by those legacy security vendors. A Cloud Native Application Protection Platform (CNAPP) is a unified and tightly integrated set of capabilities which exists to enable CISOs to understand risks across their existing estate, their development pipelines, and data spread to provide actionable insights and remediation steps. It is impossible to build a fully-integrated CNAPP from a Frankenstein’s monster of acquired companies with separate datasets, schemas, and compliance configurations. Relying on traditional techniques (Configuration Management Databases (CMDBs), or deploying agents to assets) in an ephemeral, cloud native environment is, at best, naive. Instead, by creating a purpose-built platform which is data driven, we can grow and adapt to new technology, new cloud providers, and new cloud services with ease. I challenge you to see how customers like Lemonade get value from a true Cloud Native Application Protection Platform within minutes and how functionality is crucial, not a checkbox of individual features. And if you’re curious to learn more about what it means to be a true CNAPP, get your copy of the Gartner® Market Guide for Cloud-Native Application Protection Platforms (CNAPP). * * * * RELATED ARTICLES STAY IN THE LOOP Keep up to date with everything you need to know about cloud security and our latest research * Email Address This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Submit By submitting my email address I agree to the use of my personal data in accordance with Orca Security Privacy Policy. Blog NOW WHAT?: KEEPING AHEAD OF THE SEC’S INCIDENT AND RISK MANAGEMENT REPORTING REQUIREMENTS Neil Carpenter Jan 09, 2024 Blog THE BIGGEST CLOUD SECURITY THREATS TO WATCH OUT FOR IN 2024 Bar Kaduri Dec 27, 2023 Eyebrow option DEMO THE ORCA PLATFORM In just 10 minutes, you’ll see how Orca Security can revolutionize your cloud security strategy. Watch a recorded demo from a cloud security expert now. Get a Demo * PLATFORM * CLOUD SECURITY PLATFORM * Platform * SideScanning™ Technology * Context-Aware Security * Built-in Compliance * Automation & Customization * TECHNOLOGY ECOSYSTEM * Amazon Web Services * Microsoft Azure * Google Cloud Platform * SOLUTIONS * BY SOLUTION * Malware Detection * Vulnerability Management * Sensitive Data Detection * Container and Kubernetes Security * Multi-Cloud Compliance and Security * Cloud Security Posture Management (CSPM) * CIEM * Cloud Workload Protection Platform (CWPP) * Cloud Detection and Response (CDR) * Shift Left Security * API Security * Data Security and Posture Management (DSPM) * BY INDUSTRY * Financial Services * Technology Services * Media & Entertainment * Healthcare * Retail * RESOURCES * * Library * Product Info * Podcast * Case Studies * Blog * Events * COMPARISONS * Prisma Cloud Security * Qualys Cloud Agent * Twistlock Container Security * Redlock Palo Alto * Rapid7 InsightVM * Check Point CloudGuard Dome9 * COMPANY * * About * Partners * Reviews * Orca Research Pod * Careers * Newsroom * Media Kit * Contact * Support * Security Portal * Login * STAY IN TOUCH Get cloud security insights and the latest Orca news * Email Address This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Submit AWARDS & CERTIFICATIONS * AWS Advanced Technology Partner Security Competency * ISO/EC 27001 Information * ISO/EC 27017 Information * ISO/EC 27018 Information * SOC 2 TYPE II Certified * 2022 AWS Global Security Partner of the Year * Star Level One: Self-Assessment Cloud Security Alliance * CSA Trusted Cloud Provider Cloud Security Alliance -------------------------------------------------------------------------------- ©2024 Orca Security. All rights reserved. * Privacy Policy * Terms of Use * Cookies Settings * Virtual Patent Marking * * * * By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookie Policy Accept All Cookies Reject All Cookies Settings PRIVACY PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * FUNCTIONAL COOKIES * TARGETING COOKIES * SOCIAL MEDIA COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. SOCIAL MEDIA COOKIES Social Media Cookies These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools. Back Button COOKIE LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Reject All Allow All