ThreatMapper

ThreatMapper

Deepfence
+
+

Related Products

  • RunPod
    205 Ratings
    Visit Website
  • Iru
    1,488 Ratings
    Visit Website
  • GW Apps
    37 Ratings
    Visit Website
  • Google Cloud BigQuery
    1,983 Ratings
    Visit Website
  • Gearset
    249 Ratings
    Visit Website
  • WebCatalog Desktop
    1 Rating
    Visit Website
  • CMW Platform
    681 Ratings
    Visit Website
  • Planview Digital Product Development
    Visit Website
  • DialedIn
    584 Ratings
    Visit Website
  • Pipefy
    591 Ratings
    Visit Website

About

Stackery is a serverless platform to design, develop and deliver modern applications. Stackery is built for teams that want to do more serverless, without slowing down. From design through deliver, you get a complete platform that delivers enterprise-grade security and scale, without the enterprise drag. The Stackery CLI enables you to build out your application architecture, deploy, invoke, and manage quickly and securely. The Stackery visualization tooling using the VS Code IDE helps your team better understand the relationships between different AWS resources to bridge the gaps between elements of your architecture. With Stackery, you’ll gain critical architecture visualization, CloudLocal testing, and the ability to iterate with just a few clicks. Want to understand how to connect cloud resources with event handlers? That’s an instant benefit when using Stackery.

About

Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories. ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. What you cannot see, you cannot secure. ThreatMapper auto-discovers your production infrastructure. It identifies and interrogates cloud instances, Kubernetes nodes, and serverless resources, discovering the applications and containers and mapping their topology in real-time. Use ThreatMapper to discover and visualize the external and internal attack surface for your applications and infrastructure. Exploiting known vulnerabilities in common dependencies is one of the easiest ways for bad actors to gain a foothold within your infrastructure. ThreatMapper scans hosts, containers, and applications for known vulnerable dependencies, taking threat feeds from over 50 different sources.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Developers and professionals seeking a solution to design, develop and deliver modern applications

Audience

Developers seeking a solution to scan and manage system vulnerabilities in running containers

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Stackery
Founded: 2016
United States
www.stackery.io

Company Information

Deepfence
United States
deepfence.io/threatmapper/

Alternatives

Alternatives

ThreatStryker

ThreatStryker

Deepfence
Kinvey

Kinvey

Progress Software
Bytesafe

Bytesafe

Bitfront

Categories

Categories

Integrations

Amazon Web Services (AWS)
AWS Fargate
Amazon EKS
Amazon Elastic Container Registry (ECR)
CircleCI
Docker
Elasticsearch
GitHub
GitLab
Google Cloud Platform
Google Security Operations (SecOps)
Jira
Kubernetes
Lumigo
OpenShift Cloud Functions
Oracle Cloud Infrastructure
PagerDuty
Slack
Splunk Cloud Platform
VMware Tanzu

Integrations

Amazon Web Services (AWS)
AWS Fargate
Amazon EKS
Amazon Elastic Container Registry (ECR)
CircleCI
Docker
Elasticsearch
GitHub
GitLab
Google Cloud Platform
Google Security Operations (SecOps)
Jira
Kubernetes
Lumigo
OpenShift Cloud Functions
Oracle Cloud Infrastructure
PagerDuty
Slack
Splunk Cloud Platform
VMware Tanzu
Claim Stackery and update features and information
Claim Stackery and update features and information
Claim ThreatMapper and update features and information
Claim ThreatMapper and update features and information