Gives a full picture of your assets, including containers, images, image repositories, and servers.
Scans images and repositories for vulnerabilities, trojans and viruses. You can also set up allowlists for trusted images.
Identifies intrusion events and container escapes in real-time to protect container runtime security. Process blocklist/allowlist and file access control policies are supported.
Checks assets according to baseline items for Docker and Kubernetes based on CIS Benchmarks, and provides professional solutions.
Connects to the service with a lightweight agent that well compatible with popular operating systems.
Scan images in repositories, and generate reports and trigger alerts when malicious images are detected.
Configure access policies to trigger alerts when malicious access requests are detected.