Vulnerability Management for Containers

How does it work?

Scan

Continuously scan images to identify known vulnerabilities based on databases such as NIST and NVD

Deploy

Automatically allow or block deployment of images based on security policies. Create exceptions for select images.

View

Monitor workload communication and vulnerabilities together for security risk assessment and creation of mitigating policies.

Product Tour

Active Build, Deploy, and Runtime Security

 
Copyright © Tigera, Inc.