Orca Security provides full-stack security visibility to compromises, vulnerabilities, risky configuration and asset discovery of your entire IAAS and PAAS services without installing any agent
Pricing Overview
Orca’s pricing model is based on the average number and type of workloads.
Workload type and calculation method are described below
Workloads Type and counting method tableĀ | ||
Metric | Examples | Count |
Virtual Machines | Linux or Windows hosts, examples include Amazon EC2, Azure VMs, or Google Cloud Compute Engine | 1 Workload per VM |
Container Hosts | Container hosts, the technology stack used to run containers, such as Amazon ECS or EKS, Azure Kubernetes Service, or Google Kubernetes Engine | 1 Workload per Container Host |
Serverless Containers | Serverless, also called PaaS or on-demand container platforms, such as AWS Fargate, Google Cloud Cloud Run, or Microsoft ACI | 1 Workload per 10 Containers |
Serverless Functions | Serverless functions include AWS Lambda, Azure Functions, or Google Cloud Functions | 1 Workload per 50 Functions |
Machine Images | Amazon Machine Images (AMIs), Azure machine images, or Google machine images | 1 Workload per Machine Image |
Container Images in Registry | Linux or Windows images stored in container registries, such as ACR, ECR, GCR, etc. | 1 Workload per 10 Container Images |
Downloads
Reviews
There are no reviews yet.