Detect, alert, and block advanced persistent threats
and active attacks against your Kubernetes applications
Tigera integrates with threat feeds and enables you to automatically block traffic to known botnet servers and other bad actors.
Common attack patterns such as a running Domain Generation Algorithm are automatically detected, and custom attack patterns can be added by your security researchers or ours.
Network flows are evaluated using machine learning to identify anomalous traffic.
Often legitimate traffic can be malicious, and Calico Enterprise helps you identify these potential threats.
Alerts can be generated and sent to your SOC or SIEM platform.
Integration with Your SIEM
Calico Enterprise provides network visibility and monitors the network for potentially malicious traffic.
Calico Enterprise integrates with most security incident and event management (SIEM) solutions and can send alerts with details of the suspicious traffic.
Network Flow and Audit Logs simplify troubleshooting and provide the data required for PCI, HIPAA, GDPR, and internal compliance frameworks.
Learn More Use Cases
Ready to get started?
Seeing is believing! Get a free demo of Calico Enterprise.