Alert Logic Essentials is the company's core service package providing asset discovery and vulnerability scanning and alerting, and now also integrates endpoint protection, cloud vulnerability scanning, and container security. Barkly antivirus and endpoint security software was acquired by Alert...
Container Security Software
Container Security Software Overview
What is Container Security Software?Because of their relative number of abstraction layers, containers pose a relatively large number of vulnerability issues. Container security (or Kubernetes security) software scans containers for vulnerabilites and policy-violations, and provide remediation. Container security applications provide policy-based orchestration, starting with scanning and discovery for containers and images.
Features of Container Security SoftwareContainer security software provide the following features:
- Full container stack scanning
- View metadata for container and images
- Image vulnerability detection
- Container application performance tracking
- Centralized policy management
Container Security Products
Listings (1-15 of 15)
Aptible Deploy (formerly Aptible Enclave) is a container orchestration platform built for developers that automates security best practices and controls needed for deploying and scaling Dockerized apps in regulated industries. Aptible Deploy is ISO 27001-certified and can be used to support requi...
Threat Stack is a cloud security option from the company of the same name in Boston, Massachusetts, providing vulnerability assessments of cloud assets, container security, and other features.
Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Symantec was founded in 1982 by visionary...
Snyke is a software composition analysis tool designed to find vulnerabilities in source code stored in repositories like GitHub, or to provide container security and vulnerability protection.
IBM Cloud™ Data Shield enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes host, providing data-in-use protection.
StackRox, headquartered in Mountain View, offers their containerized, cloud-app security platform for monitoring container access and privileges, and locating and eliminating potential vulnerabilities in containerized app infrastructure.
Twistlock headquartered in Portland offers container application security platform, providing container vulnerability management, runtime management, access control, and other features.
Aqua Security headquartered in Tel Aviv offers the Aqua Cloud Native Security Platform, providing full lifecycle security for server-less containerized applications.
Sysdig headquartered in San Francisco offers the Sysdig Platform, providing end-to-end container vulnerability management, threat blocking, and container application security.
Cloud security company Qualys offers the Qualys Countainer Security (CS) application.
The Aporeto Security Platform is a network and microservices application, from Aporeto in San Jose, providing enterprise network and container security.
The Trend Micro Deep Security Smart Check for container security helps DevOps teams adopt frictionless security with immediate, continuous scanning for threats, vulnerabilities, and secrets, as well as provides dashboard visibility, notifications, and scanning logs for compliance assistance.
Encryption and data protection specialist Thales eSecurity headquartered in San Jose offers Vormetric Container Security, encrypting and securing access to containerized applications and data.
Designed for the cloud, in the cloud, BMC Helix Cloud Security (formerly TrueSight Cloud Security) is designed to take the pain out of security and compliance for cloud resources and containers. The product provides cloud security scoring and remediation for public cloud services from Amazon Web ...