TCSS provides rich security features such as container asset management, image security, and runtime intrusion detection. It safeguards containers through their entire lifecycle from image generation and storage to runtime and helps you set up a container security protection system.
A variety of risks are involved throughout the lifecycle of a container, including:
TCSS can safeguard containers against the above risks throughout their lifecycle.
TCSS leverages the automatic asset inventory feature to visualize key assets, such as containers, images, image repositories, and servers.
TCSS scans images and image repositories for vulnerabilities, trojans, viruses, sensitive information, and more.
TCSS identifies hacker attacks adaptively, monitors and protects container runtime security in real time, and utilizes diversified security features, including container escape, process blocklist/allowlist, and file access control.
TCSS supports CIS Benchmarks for containers, images, servers, and other container environment configurations, displays multidimensional baseline compliance of container assets, and helps set up baseline configurations in the container running environment.
TCSS supports scanning clusters for vulnerabilities and configuration risks automatically or manually and aggregates the data of risky clusters in the business environment and risks in each cluster.
Was this page helpful?