ThreatMapper

ThreatMapper

Deepfence
+
+

Related Products

  • Google Cloud Run
    274 Ratings
    Visit Website
  • Google Cloud Platform
    60,418 Ratings
    Visit Website
  • Amazon Web Services (AWS)
    4,307 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • Grafana
    538 Ratings
    Visit Website
  • groundcover
    32 Ratings
    Visit Website
  • RunPod
    167 Ratings
    Visit Website
  • Wiz
    1,059 Ratings
    Visit Website
  • Kamatera
    151 Ratings
    Visit Website
  • JS7 JobScheduler
    1 Rating
    Visit Website

About

The Kubernetes platform for big ideas. Empower developers to innovate and ship faster with the leading hybrid cloud, enterprise container platform. Red Hat OpenShift offers automated installation, upgrades, and lifecycle management throughout the container stack—the operating system, Kubernetes and cluster services, and applications—on any cloud. Red Hat OpenShift helps teams build with speed, agility, confidence, and choice. Code in production mode anywhere you choose to build. Get back to doing work that matters. Red Hat OpenShift is focused on security at every level of the container stack and throughout the application lifecycle. It includes long-term, enterprise support from one of the leading Kubernetes contributors and open source software companies. Support the most demanding workloads including AI/ML, Java, data analytics, databases, and more. Automate deployment and life-cycle management with our vast ecosystem of technology partners.

About

Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories. ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. What you cannot see, you cannot secure. ThreatMapper auto-discovers your production infrastructure. It identifies and interrogates cloud instances, Kubernetes nodes, and serverless resources, discovering the applications and containers and mapping their topology in real-time. Use ThreatMapper to discover and visualize the external and internal attack surface for your applications and infrastructure. Exploiting known vulnerabilities in common dependencies is one of the easiest ways for bad actors to gain a foothold within your infrastructure. ThreatMapper scans hosts, containers, and applications for known vulnerable dependencies, taking threat feeds from over 50 different sources.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations interested in an enterprise-grade and open source Kubernetes platform

Audience

Developers seeking a solution to scan and manage system vulnerabilities in running containers

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$50.00/month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Red Hat
Founded: 1993
United States
www.openshift.com

Company Information

Deepfence
United States
deepfence.io/threatmapper/

Alternatives

Alternatives

ThreatStryker

ThreatStryker

Deepfence
Bytesafe

Bytesafe

Bitfront
Telepresence

Telepresence

Ambassador Labs
VulScan

VulScan

RapidFire Tools, a Kaseya Company

Categories

Categories

Application Development Features

Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development

Container Management Features

Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization

Infrastructure-as-a-Service (IaaS) Features

Analytics / Reporting
Configuration Management
Data Migration
Data Security
Load Balancing
Log Access
Network Monitoring
Performance Monitoring
SLA Monitoring

Integrations

PagerDuty
AWS Fargate
Airlock
Azure Container Registry
Densify
Elasticsearch
F5 Distributed Cloud WAF
Harness
IBM Cloud Pak for Applications
IBM Wazi for Dev Spaces
IBM z/OS Cloud Broker
JHipster
Keen
Kong Konnect
Panoptica
Red Hat Advanced Cluster Management
Red Hat CloudForms
SAS Viya
vFunction

Integrations

PagerDuty
AWS Fargate
Airlock
Azure Container Registry
Densify
Elasticsearch
F5 Distributed Cloud WAF
Harness
IBM Cloud Pak for Applications
IBM Wazi for Dev Spaces
IBM z/OS Cloud Broker
JHipster
Keen
Kong Konnect
Panoptica
Red Hat Advanced Cluster Management
Red Hat CloudForms
SAS Viya
vFunction
Claim Red Hat OpenShift and update features and information
Claim Red Hat OpenShift and update features and information
Claim ThreatMapper and update features and information
Claim ThreatMapper and update features and information