Cloudxray

Cloudxray

Cloudnosys
ThreatMapper

ThreatMapper

Deepfence
+
+

Related Products

  • Wiz
    1,101 Ratings
    Visit Website
  • Orca Security
    493 Ratings
    Visit Website
  • Aikido Security
    128 Ratings
    Visit Website
  • Google Chrome Enterprise
    2,034 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website
  • Astra Pentest
    222 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,195 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website
  • SpamTitan
    815 Ratings
    Visit Website

About

CloudXray is a cloud workload scanning solution that operates in two deployment modes; basic for misconfiguration detection and advanced for full malware, OS vulnerability, and misconfiguration scanning. The architecture consists of an orchestrator deployed in a single region and distributed scanners covering all discovered regions, making it fully compatible with both AWS and GCP environments. It uses an agentless approach to inspect workloads and volumes across your cloud account for malware, CVEs, and policy deviations. The solution provisions scanning instances on demand, integrates via roles and APIs, and provides continuous coverage of cloud resources without requiring persistent agents. CloudXray supports rapid deployment and is optimized for scalable, multi-region cloud workloads. It is designed to help organizations maintain a secure posture across compute instances, storage volumes, and OS layers by combining configuration assessment, vulnerability detection, and more.

About

Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories. ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. What you cannot see, you cannot secure. ThreatMapper auto-discovers your production infrastructure. It identifies and interrogates cloud instances, Kubernetes nodes, and serverless resources, discovering the applications and containers and mapping their topology in real-time. Use ThreatMapper to discover and visualize the external and internal attack surface for your applications and infrastructure. Exploiting known vulnerabilities in common dependencies is one of the easiest ways for bad actors to gain a foothold within your infrastructure. ThreatMapper scans hosts, containers, and applications for known vulnerable dependencies, taking threat feeds from over 50 different sources.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Cloud security teams searching for a tool to perform agentless scanning of workloads across their cloud accounts in order to detect misconfigurations, malware and vulnerabilities with minimal operational overhead

Audience

Developers seeking a solution to scan and manage system vulnerabilities in running containers

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cloudnosys
Founded: 2016
United States
cloudnosys.com/cloudxray

Company Information

Deepfence
United States
deepfence.io/threatmapper/

Alternatives

Alternatives

ThreatStryker

ThreatStryker

Deepfence
Bytesafe

Bytesafe

Bitfront
Palo Alto Networks WildFire

Palo Alto Networks WildFire

Palo Alto Networks

Categories

Categories

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
AWS Fargate
Amazon EKS
Amazon Elastic Container Registry (ECR)
CircleCI
Cloudnosys
Docker
Elasticsearch
GitHub
Google Security Operations (SecOps)
IBM Cloud Private
Jira
Kubernetes
Microsoft 365
OpenShift Cloud Functions
Oracle Cloud Infrastructure
Slack
Splunk Cloud Platform

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
AWS Fargate
Amazon EKS
Amazon Elastic Container Registry (ECR)
CircleCI
Cloudnosys
Docker
Elasticsearch
GitHub
Google Security Operations (SecOps)
IBM Cloud Private
Jira
Kubernetes
Microsoft 365
OpenShift Cloud Functions
Oracle Cloud Infrastructure
Slack
Splunk Cloud Platform
Claim Cloudxray and update features and information
Claim Cloudxray and update features and information
Claim ThreatMapper and update features and information
Claim ThreatMapper and update features and information