To address the protection of container environments and solve the pain point where traditional protections are only effective against host-based threats, the container security monitoring platform provides real-time monitoring and detection of vulnerabilities and viruses carried by container images, helping container images stay away from hacker infiltration and destruction threats. It allows for the setting of isolation between the host and containers, providing isolation based on layers such as containers, PODs, controllers, services, and namespaces to respond to east-west traffic security within the container. The platform also provides an asset visualization platform that synchronizes assets in real time and enables policies to take effect immediately, addressing the issue of asset management in the context of short container lif spans. It actively detects vulnerabilities to address the problem of frequent vulnerabilities in the container ecosystem.
Host Image Scanning
Container Invasion Monitoring
Compliance Check
Microservices Security Scanning
Container Network Security Monitoring
Repository Image Scanning
Provide container image security capabilities such as image threat detection, trusted image identification, and image runtime control
Address ecosystem security issues through host vulnerability detection and establishment of secure baseline configurations for the host and container environments
Provide proactive defense capabilities before intrusion, including the production and update of virtual patches to help patch vulnerabilities and mitigate 0-day exploits
Provide post-intrusion behavior detection and response capabilities, including real-time antivirus and WebShell detection, and defining a container access control behavior model
Provide a visualization platform that helps customers visualize their assets, identify security threats in real time through network and threat radar capabilities, and generate comprehensive security reports that facilitate better operation and traceability
Rule configurations require comprehensive understanding of system operations and can consume a lot of time. We can learn corresponding access models based on existing behaviors, fine-tune these strategies based on the self-adaptive behavior model, and save a lot of effort configuring policies
Directly kill ransomware, protect asset security in real time, block external network invasion packets, and audit attack operations, block escape actions, and audit escape actions
A single product to address host-container security, achieve unified management and unified solution, save resources, reduce conflicts, coordinate and collaborate to safeguard security, provide more comprehensive security protection, and be more suitable for hybrid cloud environments
In the face of security events, complete pre-analysis, in-process defense, post-event response, post-event audit, and ensure the security of the container system throughout its entire lifecycle
Supports both host agent deployment and containerized deployment methods, which can fully respond to complex scenarios such as distributed systems, hybrid clouds, and other container security scenarios