Audience

IT teams and IT security professionals

About Sysdig Secure

Cloud, container, and Kubernetes security that closes the loop from source to run. Find and prioritize vulnerabilities; detect and respond to threats and anomalies; and manage configurations, permissions, and compliance. See all activity across clouds, containers, and hosts. Use runtime intelligence to prioritize security alerts and remove guesswork. Shorten time to resolution using guided remediation through a simple pull request at the source. See any activity within any app or service by any user across clouds, containers, and hosts. Reduce vulnerability noise by up to 95% using runtime context with Risk Spotlight. Prioritize fixes that remediate the greatest number of security violations using ToDo. Map misconfigurations and excessive permissions in production to infrastructure as code (IaC) manifest. Save time with a guided remediation workflow that opens a pull request directly at the source.

Pricing

Free Trial:
Free Trial available.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Sysdig
Founded: 2013
United States
sysdig.com/products/secure/

Videos and Screen Captures

You Might Also Like
Red Hat Ansible Automation Platform on Microsoft Azure Icon
Red Hat Ansible Automation Platform on Microsoft Azure

Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.

Product Details

Platforms Supported
SaaS
Training
Documentation
Live Online
Webinars
In Person
Support
Phone Support
24/7 Live Support

Sysdig Secure Frequently Asked Questions

Q: What kinds of users and organization types does Sysdig Secure work with?
Q: What languages does Sysdig Secure support in their product?
Q: What kind of support options does Sysdig Secure offer?
Q: What other applications or services does Sysdig Secure integrate with?
Q: What type of training does Sysdig Secure provide?
Q: Does Sysdig Secure offer a free trial?

Sysdig Secure Product Features

Cloud Security

Intrusion Detection System
Endpoint Management
Threat Intelligence
Application Security
Encryption
Behavioral Analytics
Antivirus
Vulnerability Management
Incident Management
Two-Factor Authentication

Cloud Workload Protection

Cloud Gap Analysis
Cloud Registry
Asset Discovery
Governance
Logging & Reporting
Data Security
Data Loss Prevention (DLP)
Security Audit
Anomaly Detection
Workload Diversity
Machine Learning

Container Security

Container Stack Scanning
View Container Metadata
Image Vulnerability Detection
Application Performance Tracking
Centralized Policy Management
Access Roles / Permissions
Testing
Reporting

IT Security

Intrusion Detection System
Two-Factor Authentication
Anti Virus
Event Tracking
IP Protection
Web Traffic Reporting
Internet Usage Monitoring
Web Threat Management
Anti Spam
Email Attachment Protection
Vulnerability Scanning
Spyware Removal

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners

Network Mapping
Web Inspection
Defect Tracking
Interactive Scanning
Perimeter Scanning
Black Box Scanning
Continuous Monitoring
Compliance Monitoring
Asset Discovery
Logging and Reporting
Threat Intelligence
Risk Analysis

Sysdig Secure Additional Categories