Vulnerability Management for Containers
How does it work?
Scan
Continuously scan images to identify known vulnerabilities based on databases such as NIST and NVD
Deploy
Automatically allow or block deployment of images based on security policies. Create exceptions for select images.
View
Monitor workload communication and vulnerabilities together for security risk assessment and creation of mitigating policies.
Product Tour
Active Build, Deploy, and Runtime Security