+
+

Related Products

  • SOCRadar Extended Threat Intelligence
    104 Ratings
    Visit Website
  • Chainguard
    49 Ratings
    Visit Website
  • Aikido Security
    226 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,263 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Blumira
    150 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • Guardz
    117 Ratings
    Visit Website
  • Wiz
    1,446 Ratings
    Visit Website

About

Protect cloud-native applications and reduce the attack surface by detecting vulnerabilities, hidden malware, secrets/keys, compliance violations and more — from build to runtime — ensuring only compliant containers run in production.Integrate frictionless security early into the continuous integration/continuous delivery (CI/CD) pipeline, and automate protection that empowers DevSecOps to deliver production-ready applications without impacting build cycles.Build and run applications knowing they are protected. Get access to automated discovery, runtime protection, continuous threat detection and response for cloud workloads and containers, and managed cloud threat hunting in a single platform. Find hidden malware, embedded secrets, configuration issues and more in your images to help reduce the attack surface.

About

Cloud, container, and Kubernetes security that closes the loop from source to run. Find and prioritize vulnerabilities; detect and respond to threats and anomalies; and manage configurations, permissions, and compliance. See all activity across clouds, containers, and hosts. Use runtime intelligence to prioritize security alerts and remove guesswork. Shorten time to resolution using guided remediation through a simple pull request at the source. See any activity within any app or service by any user across clouds, containers, and hosts. Reduce vulnerability noise by up to 95% using runtime context with Risk Spotlight. Prioritize fixes that remediate the greatest number of security violations using ToDo. Map misconfigurations and excessive permissions in production to infrastructure as code (IaC) manifest. Save time with a guided remediation workflow that opens a pull request directly at the source.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams in need of a Container Security solution

Audience

IT teams and IT security professionals

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CrowdStrike
Founded: 2011
United States
www.crowdstrike.com/products/cloud-security/falcon-cloud-workload-protection/container-security/

Company Information

Sysdig
Founded: 2013
United States
sysdig.com/products/secure/

Alternatives

Alternatives

Lacework

Lacework

Fortinet
Aqua

Aqua

Aqua Security
Aqua

Aqua

Aqua Security

Categories

Categories

Integrations

Kubernetes
Amplifier Security
Avalor
Bedrock Security
Chainguard
D2iQ
HPE Ezmeral
JupiterOne
Kustomize.io
Open Container Initiative (OCI)
Ozone
PC Matic
Prophet Security
Squadcast
Stratodesk NoTouch
Stream Security
StrikeReady
Veriti
Zip Security

Integrations

Kubernetes
Amplifier Security
Avalor
Bedrock Security
Chainguard
D2iQ
HPE Ezmeral
JupiterOne
Kustomize.io
Open Container Initiative (OCI)
Ozone
PC Matic
Prophet Security
Squadcast
Stratodesk NoTouch
Stream Security
StrikeReady
Veriti
Zip Security
Claim CrowdStrike Container Security and update features and information
Claim CrowdStrike Container Security and update features and information
Claim Sysdig Secure and update features and information
Claim Sysdig Secure and update features and information