Competitive Flashcards

1
Q

AWS Differentiators

A

Better Together Positioning
1. Continuous compliance monitoring of 100+ AWS services
2. Vulnerability management and risk prioritization for all workloads
3. Attack path analysis and deep threat detection built on top of AWS services
4. Dedicated dashboard for Shift Left security (misconfigs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Best selling points of Orca

A
  1. Easy integration and UI
  2. Attack path feature is easy to understand
  3. Dashboards can be split per Business unit (helpful for multi-DevOps teams)
  4. Compliance guidance and readiness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Aqua Differentiators

A

Aqua is Container Security evolving to address CNAPP cases
1. Aqua agentless can only support Linux VMs on AWS, limiting visibility
2. Aqua visibility and coverage is fragmented
3. Aqua compliance less mature with fewer frameworks and less telemetry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CrowdStrike Differentiators

A

CrowdStrike is the best EDR solution out there in my opinion:
1. CrowdStrike requires agents and studies show almost over 50% of environment can’t have an agent on it
2. Orca has more advanced query capabilities with ability to look at every layer of the cloud tech stack
3. Orca compliance more mature with over 65 pre-built compliance frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CheckPoint CloudGuard Differentiators

A

CheckPoint is stitched together from acquisitions with little to no improvements to the tech
1. No agentless capabilities
2. Automation requires lots of manual efforts to enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Datadog Cloud Differentiators

A

Datadog is an observability platform for applications expanding into SCPM and CWPP with minimal additional engineering
1. No vulnerability scanning
2. No Attack Path analysis
3. No Shift Left security for CI/CD infrastructure and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ermetic Differentiators

A

Ermetic is a cloud identity security company expanding to CSPM and adjacent use cases
1. Focused on cloud identity
2. Orca has wider and deeper data covering misconfigs, vulnerabilities and other key risks
3. Orca compliance more mature with over 65 pre-built compliance frameworks
4. Agent based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lacework Differentiators

A

Lacework is a CSPM and WEPP that has combined capabilities into a loose UI.
1. Agent-based
2. Lacework is more siloed and fragmented lacking unified onboarding, compliance and other features based on architecture
3. Orca compliance more mature with over 65 pre-built compliance frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lightspin Differentiators

A

Lightspin is a Cloud security startup following Orca’s approach
1. Lacks agentless coverage for Kubernetes
2. Gaps in cloud estate coverage, CDR is misssing
3. Orca compliance more mature with over 65 pre-built compliance frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Prisma Cloud Differentiators

A

Prisma is an acquisition by Palo from 6 different tools
1. Agent-based but working towards agentless approach
2. Prisma has separate data siloes due to loose integrations meaning difficult onboarding because you need to configure integrations multiple times
3. Orca compliance more mature with over 65 pre-built compliance frameworks
4. Can’t query all of the data across the “Suite”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rapid7 Differentiators

A

Rapid7 is a suite of products that provide different security controls across cloud infrastructure, VM’s and containers
1. Agent-based protection for workloads and Vuln management and compliance scanning ONLY available if you deploy agent or scanners
2. Data is spread across user interfaces with limited ability to access all cloud telemetry
3. Orca compliance more mature with over 65 pre-built compliance frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tenable Differentiators

A

Tenable focuses on vulnerability assessment
1. Relies on network scanning - for “agentless”
2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly