Related Products
|
||||||
About
Secure your container environment on GCP, GKE, or Anthos. Containerization allows development teams to move fast, deploy software efficiently, and operate at an unprecedented scale. As enterprises create more containerized workloads, security must be integrated at each stage of the build-and-deploy life cycle. Infrastructure security means that your container management platform provides the right security features. Kubernetes includes security features to protect your identities, secrets, and network, and Google Kubernetes Engine uses native GCP functionality—like Cloud IAM, Cloud Audit Logging, and Virtual Private Clouds—and GKE-specific features like application layer secrets encryption and workload identity to bring the best of Google security to your workloads. Securing the software supply chain means that container images are safe to deploy. This is how you make sure your container images are vulnerability free and that the images you build aren't modified.
|
About
Mend.io offers the first AI native application security platform, empowering organizations to build and run a proactive AppSec program tuned for AI powered development. The unified platform secures AI generated code and embedded AI components, drives risk reduction through AI powered remediation, automates compliance, and provides a holistic enterprise scale view of risks and clear actions for developers across your entire codebase.
|
About
Cloud, container, and Kubernetes security that closes the loop from source to run. Find and prioritize vulnerabilities; detect and respond to threats and anomalies; and manage configurations, permissions, and compliance. See all activity across clouds, containers, and hosts. Use runtime intelligence to prioritize security alerts and remove guesswork. Shorten time to resolution using guided remediation through a simple pull request at the source. See any activity within any app or service by any user across clouds, containers, and hosts. Reduce vulnerability noise by up to 95% using runtime context with Risk Spotlight. Prioritize fixes that remediate the greatest number of security violations using ToDo. Map misconfigurations and excessive permissions in production to infrastructure as code (IaC) manifest. Save time with a guided remediation workflow that opens a pull request directly at the source.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Companies that want to container environment on GCP, GKE, or Anthos
|
Audience
Software development, security and DevOps teams
|
Audience
IT teams and IT security professionals
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$1,000 per developer, per year
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationGoogle
Founded: 1998
United States
cloud.google.com/containers/security/
|
Company InformationMend.io
Founded: 2011
United States
www.mend.io
|
Company InformationSysdig
Founded: 2013
United States
sysdig.com/products/secure/
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
Categories |
||||
Application Security Features
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
DevOps Features
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
License Management Features
Automatic SKU Recognition
Central LM Server
Copy Protection
History Tracking
Node Management
Online Activation
Portable License
Sarbanes-Oxley Compliance
Timing Rights
Trial License
PCI Compliance Features
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
Patch Management
PCI Assessment
Policy Management
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
||||||
Integrations
.NET
Azure DevOps Server
C#
CodeShip
D2iQ
Falco
Federator.ai
GitHub
Google Kubernetes Engine (GKE)
Humanitec
|
Integrations
.NET
Azure DevOps Server
C#
CodeShip
D2iQ
Falco
Federator.ai
GitHub
Google Kubernetes Engine (GKE)
Humanitec
|
Integrations
.NET
Azure DevOps Server
C#
CodeShip
D2iQ
Falco
Federator.ai
GitHub
Google Kubernetes Engine (GKE)
Humanitec
|
||||
|
|
|
|