Intruder vs. Orca Cloud Security Platform vs. SailPoint Identity Security Cloud

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Intruder
Score 8.1 out of 10
N/A
Intruder, from Intruder Systems in London, is a cloud-based vulnerability scanner that finds cyber security weaknesses in digital infrastructure, to avoid costly data breaches.
$127
per month 1 infrastructure target
Orca Cloud Security Platform
Score 8.0 out of 10
N/A
Orca's Cloud Security Platform is an agentless cloud-native security and compliance platform that allows users to gain complete visibility and coverage into their existing AWS, Azure, and GCP setups. Orca's platform features four main components which are: SideScanning Technology, Context-Aware Security, Built-in Compliance, Automation & Customization.N/A
SailPoint Identity Security Cloud
Score 6.8 out of 10
N/A
SailPoint Identity Security for the cloud enterprise manages risk from the explosion of technology access. The solution gives businesses visibility while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services.N/A
Pricing
IntruderOrca Cloud Security PlatformSailPoint Identity Security Cloud
Editions & Modules
No answers on this topic
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
IntruderOrca Cloud Security PlatformSailPoint Identity Security Cloud
Free Trial
YesNoNo
Free/Freemium Version
NoNoNo
Premium Consulting/Integration Services
YesNoNo
Entry-level Setup FeeNo setup feeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
IntruderOrca Cloud Security PlatformSailPoint Identity Security Cloud
Features
IntruderOrca Cloud Security PlatformSailPoint Identity Security Cloud
Identity Management
Comparison of Identity Management features of Product A and Product B
Intruder
-
Ratings
Orca Cloud Security Platform
-
Ratings
SailPoint Identity Security Cloud
7.5
8 Ratings
9% below category average
ID-Management Access Control00 Ratings00 Ratings7.78 Ratings
ID Management Single-Sign On (SSO)00 Ratings00 Ratings7.65 Ratings
Multi-Factor Authentication00 Ratings00 Ratings7.03 Ratings
Password Management00 Ratings00 Ratings7.65 Ratings
Account Provisioning and De-provisioning00 Ratings00 Ratings7.78 Ratings
ID Management Workflow Automation00 Ratings00 Ratings7.88 Ratings
ID Risk Management00 Ratings00 Ratings6.86 Ratings
Best Alternatives
IntruderOrca Cloud Security PlatformSailPoint Identity Security Cloud
Small Businesses
Action1
Action1
Score 9.5 out of 10

No answers on this topic

WatchGuard AuthPoint
WatchGuard AuthPoint
Score 9.0 out of 10
Medium-sized Companies
Action1
Action1
Score 9.5 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
OneLogin by One Identity
OneLogin by One Identity
Score 9.7 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
OneLogin by One Identity
OneLogin by One Identity
Score 9.7 out of 10
All AlternativesView all alternativesView all alternativesView all alternatives
User Ratings
IntruderOrca Cloud Security PlatformSailPoint Identity Security Cloud
Likelihood to Recommend
9.0
(1 ratings)
4.0
(1 ratings)
8.2
(15 ratings)
Likelihood to Renew
-
(0 ratings)
-
(0 ratings)
8.2
(1 ratings)
Usability
-
(0 ratings)
-
(0 ratings)
8.2
(1 ratings)
Support Rating
-
(0 ratings)
-
(0 ratings)
4.5
(1 ratings)
Implementation Rating
-
(0 ratings)
-
(0 ratings)
8.2
(1 ratings)
User Testimonials
IntruderOrca Cloud Security PlatformSailPoint Identity Security Cloud
Likelihood to Recommend
Intruder Systems
When the infrastructure landscape and risk profile is not well known and is legacy, Intruder can scan and automate reporting on open security risks, as well as coordinate responses.
Read full review
Orca Security
It's good for finding issues in SSH, ec2 instances, and so on. But it's not good at finding stuff for Serverless lambdas, for containers and some more.
Read full review
SailPoint
We are happy with the management of the Id, accounts where the user can request any access easily. Also the many connector which Sailpoint is offering in order to onboard lots of applications is quite helpful. The access review module has also have been improve so that large campaigns can we work out easily.

Where we see some improvement is on the UI as here it is not so intuitive for the end user, so that we need to make lots of communications and training so that the user is able to understand how to use it.

For the administration and creation of roles it also would be great to have some improvements here to make it more easily its management.
Read full review
Pros
Intruder Systems
  • Auto scanning.
  • New vulnerability detection.
  • Alert levels.
Read full review
Orca Security
  • Scanning
  • CSPM
  • IAM Roles
Read full review
SailPoint
  • Brings users access, profiles and accounts all into one place
  • Manages the Life Cycle Management process across ALL identities, permanent and Temporary
  • Secures and manages access to critical applications and resources across the group
  • Enables Info. Security to customise, share and delegate authority across the group
  • Single version of the truth across our technology platform
Read full review
Cons
Intruder Systems
  • Reports could contain more detail.
Read full review
Orca Security
  • Kubernetes
  • Docker containers
  • Serverless
Read full review
SailPoint
  • The user interface is not very intuitive. It is hard for the occasional user to navigate through the request process. There are no instructions on the screen to help the user to know what to do. It is left up to the user to figure out what to click on and how to navigate through the process.
Read full review
Usability
Intruder Systems
No answers on this topic
Orca Security
No answers on this topic
SailPoint
Overall usablity is excellent. The product is capable of performing all the expected tasks for a IAM solution.
Read full review
Support Rating
Intruder Systems
No answers on this topic
Orca Security
No answers on this topic
SailPoint
Support for Customizations is very limited.
Read full review
Implementation Rating
Intruder Systems
No answers on this topic
Orca Security
No answers on this topic
SailPoint
Implementation was done correctly and all the requirements were met.
Read full review
Alternatives Considered
Intruder Systems
Intruder focuses on scanning network blocks for your servers even if you don't know which services or hostnames are running on them, unlike Detectify which requires a domain or hostname to scan. The network port scanning of Intruder is also broader than many competitors.
Read full review
Orca Security
Wiz and aqua are pretty good but Orca has better UI.
Read full review
SailPoint
The on-prem SailPoint IdentityIQ platform provides the necessary customization that is required in our dynamic environment. Although we may look at a cloud-based Identity Management service again in the future, (there are many advantages), our identity management, authentication, and application assignment processes cannot be quickly consolidated to a single cloud-based service at this time.
Read full review
Return on Investment
Intruder Systems
  • Improved security profile.
  • Better reporting to stakeholders and clients of the current security risks.
Read full review
Orca Security
  • less need of security team
  • easy to use
  • it's not costly
Read full review
SailPoint
  • Over 300,000 password change/reset calls avoided to the helpdesk annually.
  • 1,000 plus accounts with proper accesses provisioned via automated birthright processes weekly versus 1-2 days of manual provisioning and approvals. With a call center population that churns many people per week, this brings many dollars of efficiency to the operations teams.
  • Flexibility on terminations to manage accounts and access for target applications based on regulatory or business rules to ensure compliance and avoid fines for non-compliance.
Read full review
ScreenShots

Intruder Screenshots

Screenshot of The Intruder dashboardScreenshot of Cloud connectorsScreenshot of Network viewScreenshot of Issues pageScreenshot of Targets page