Alert Logic Essentials is the company's core service package providing asset discovery and vulnerability scanning and alerting, and now also integrates endpoint protection, cloud vulnerability scanning, and container security. Barkly antivirus and endpoint security software was acquired by Alert...
Container Security Software
Container Security Software Overview
What is Container Security Software?Because of their relative number of abstraction layers, containers pose a relatively large number of vulnerability issues. Container security (or Kubernetes security) software scans containers for vulnerabilites and policy-violations, and provide remediation. Container security applications provide policy-based orchestration, starting with scanning and discovery for containers and images.
Features of Container Security SoftwareContainer security software provide the following features:
- Full container stack scanning
- View metadata for container and images
- Image vulnerability detection
- Container application performance tracking
- Centralized policy management
Container Security Products
Listings (1-14 of 14)
Aptible Deploy (formerly Aptible Enclave) is a container orchestration platform built for developers that automates security best practices and controls needed for deploying and scaling Dockerized apps in regulated industries. Aptible Deploy is ISO 27001-certified and can be used to support requi...
Threat Stack is a cloud security option from the company of the same name in Boston, Massachusetts, providing vulnerability assessments of cloud assets, container security, and other features.
Docker containers make it easy to develop, deploy, and deliver applications where containers can be deployed and brought down in a matter of seconds. This flexibility makes it very useful for DevOps to automate deployment of containers. Symantec Data Center Security: Server Advanced provides agen...
Snyke is a software composition analysis tool designed to find vulnerabilities in source code stored in repositories like GitHub, or to provide container security and vulnerability protection.
IBM Cloud™ Data Shield enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes host, providing data-in-use protection.
StackRox, headquartered in Mountain View, offers their containerized, cloud-app security platform for monitoring container access and privileges, and locating and eliminating potential vulnerabilities in containerized app infrastructure.
Twistlock headquartered in Portland offers container application security platform, providing container vulnerability management, runtime management, access control, and other features.
Aqua Security headquartered in Tel Aviv offers the Aqua Cloud Native Security Platform, providing full lifecycle security for server-less containerized applications.
Sysdig headquartered in San Francisco offers the Sysdig Platform, providing end-to-end container vulnerability management, threat blocking, and container application security.
Cloud security company Qualys offers the Qualys Countainer Security (CS) application.
The Aporeto Security Platform is a network and microservices application, from Aporeto in San Jose, providing enterprise network and container security.
The Trend Micro Deep Security Smart Check for container security helps DevOps teams adopt frictionless security with immediate, continuous scanning for threats, vulnerabilities, and secrets, as well as provides dashboard visibility, notifications, and scanning logs for compliance assistance.
Encryption and data protection specialist Thales eSecurity headquartered in San Jose offers Vormetric Container Security, encrypting and securing access to containerized applications and data.