Container SecurityAptible Deploy1https://media.trustradius.com/vendor-logos/BP/NR/TSX67S3FU115-180x180.PNGThreat Stack2https://media.trustradius.com/product-logos/If/V5/FTADF28DHPLZ.pngSnyk3https://media.trustradius.com/vendor-logos/sj/ci/PTENTD35HSIM-180x180.JPEGStackRox4https://media.trustradius.com/vendor-logos/7T/s1/GH8B1GJRU63B-180x180.PNGTwistlock5https://media.trustradius.com/vendor-logos/kX/Gu/QP53TV6PKD57-180x180.JPEGAqua Cloud Native Security Platform6https://media.trustradius.com/vendor-logos/NT/yp/RHTE58VLTNZ2-180x180.JPEGQualys Container Security (CS)7https://media.trustradius.com/vendor-logos/Kr/jJ/32G0095MQS8X-180x180.JPEGAporeto Security Platform8https://media.trustradius.com/vendor-logos/KK/6x/1OI0GCU5OGVE-180x180.PNGVormetric Container Security9https://media.trustradius.com/vendor-logos/Vp/gD/D0ORNQNAOLNC-180x180.JPEGBMC Helix Cloud Security (formerly TrueSight Cloud Security)10https://media.trustradius.com/vendor-logos/I8/AI/M1BJKI1M3C52-180x180.PNGSysdig Secure DevOps Platform11https://media.trustradius.com/product-logos/JV/x9/USTS12QH7VVG-180x180.PNGIBM Cloud Data Shield12https://media.trustradius.com/product-logos/BH/DH/28K1WW3CLGL4-180x180.JPEGTrend Micro Deep Security Smart Check13https://media.trustradius.com/vendor-logos/ad/Vt/9I9JZSMX7IHN-180x180.PNGSymantec Data Center Security14https://media.trustradius.com/product-logos/fW/iK/20F9GV2JWLVG-180x180.PNG

Container Security Software

Container Security Software Overview

What is Container Security Software?

Because of their relative number of abstraction layers, containers pose a relatively large number of vulnerability issues. Container security (or Kubernetes security) software scans containers for vulnerabilites and policy-violations, and provide remediation. Container security applications provide policy-based orchestration, starting with scanning and discovery for containers and images.

Features of Container Security Software

Container security software provide the following features:
  • Full container stack scanning
  • View metadata for container and images
  • Image vulnerability detection
  • Container application performance tracking
  • Centralized policy management

Container Security Products

Listings (1-14 of 14)

We don't have enough ratings and reviews to provide an overall score.

Aptible Deploy (formerly Aptible Enclave) is a container orchestration platform built for developers that automates security best practices and controls needed for deploying and scaling Dockerized apps in regulated industries. Aptible Deploy is ISO 27001-certified and can be used to support requirem…

We don't have enough ratings and reviews to provide an overall score.

Threat Stack is a cloud security option from the company of the same name in Boston, Massachusetts, providing vulnerability assessments of cloud assets, container security, and other features.

We don't have enough ratings and reviews to provide an overall score.

Snyke is a software composition analysis tool designed to find vulnerabilities in source code stored in repositories like GitHub, or to provide container security and vulnerability protection.

We don't have enough ratings and reviews to provide an overall score.

StackRox, headquartered in Mountain View, offers their containerized, cloud-app security platform for monitoring container access and privileges, and locating and eliminating potential vulnerabilities in containerized app infrastructure.

We don't have enough ratings and reviews to provide an overall score.

Twistlock headquartered in Portland offers container application security platform, providing container vulnerability management, runtime management, access control, and other features.

We don't have enough ratings and reviews to provide an overall score.

Designed for the cloud, in the cloud, BMC Helix Cloud Security (formerly TrueSight Cloud Security) is designed to take the pain out of security and compliance for cloud resources and containers. The product provides cloud security scoring and remediation for public cloud services from Amazon Web Ser…

We don't have enough ratings and reviews to provide an overall score.

IBM Cloud™ Data Shield enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes host, providing data-in-use protection.

We don't have enough ratings and reviews to provide an overall score.

The Trend Micro Deep Security Smart Check for container security helps DevOps teams adopt frictionless security with immediate, continuous scanning for threats, vulnerabilities, and secrets, as well as provides dashboard visibility, notifications, and scanning logs for compliance assistance.

Docker containers make it easy to develop, deploy, and deliver applications where containers can be deployed and brought down in a matter of seconds. This flexibility makes it very useful for DevOps to automate deployment of containers. Symantec Data Center Security: Server Advanced provides agent-l…