+
+

Related Products

  • SOCRadar Extended Threat Intelligence
    90 Ratings
    Visit Website
  • Chainguard
    46 Ratings
    Visit Website
  • Aikido Security
    127 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,195 Ratings
    Visit Website
  • SpamTitan
    815 Ratings
    Visit Website
  • Criminal IP ASM
    16 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • Blumira
    145 Ratings
    Visit Website
  • Jscrambler
    33 Ratings
    Visit Website
  • Guardz
    105 Ratings
    Visit Website

About

Protect cloud-native applications and reduce the attack surface by detecting vulnerabilities, hidden malware, secrets/keys, compliance violations and more — from build to runtime — ensuring only compliant containers run in production.Integrate frictionless security early into the continuous integration/continuous delivery (CI/CD) pipeline, and automate protection that empowers DevSecOps to deliver production-ready applications without impacting build cycles.Build and run applications knowing they are protected. Get access to automated discovery, runtime protection, continuous threat detection and response for cloud workloads and containers, and managed cloud threat hunting in a single platform. Find hidden malware, embedded secrets, configuration issues and more in your images to help reduce the attack surface.

About

Stop ransomware. Isolate cyberattacks. Segment across any cloud, data center, or endpoint in minutes. Accelerate your Zero Trust journey and protect your organization with automated security enforcement, intelligent visibility, and unprecedented scale. Illumio Core stops attacks and ransomware from spreading with intelligent visibility and micro-segmentation. Get a map of workload communications, quickly build policy, and automate enforcement with micro-segmentation that is easy to deploy across any application, cloud, container, data center, and endpoint. Illumio Edge extends Zero Trust to the edge to contain malware and ransomware to a single laptop instead of thousands. Turn laptops into Zero Trust endpoints, contain an infection to a single machine, and give endpoint security tools like EDR more time to detect and responds to threats.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams in need of a Container Security solution

Audience

IT security teams in need of a powerful Cloud Workload Protection solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CrowdStrike
Founded: 2011
United States
www.crowdstrike.com/products/cloud-security/falcon-cloud-workload-protection/container-security/

Company Information

Illumio
Founded: 2013
United States
www.illumio.com

Alternatives

Alternatives

Fidelis Halo

Fidelis Halo

Fidelis Security
Aqua

Aqua

Aqua Security

Categories

Categories

Integrations

Axonius
ThreatAware
AQtive Guard
Azure Marketplace
CloudNuro
Code42 Incydr
Compyl
ContraForce
Cyclops
Epiphany Intelligence Platform
IPQS Device Fingerprinting
KernelCare Enterprise
Kubernetes
OpenText Static Application Security Testing
PC Matic
Proofpoint Insider Threat Management
Stratodesk NoTouch
Veriti
Webvar
Zip Security

Integrations

Axonius
ThreatAware
AQtive Guard
Azure Marketplace
CloudNuro
Code42 Incydr
Compyl
ContraForce
Cyclops
Epiphany Intelligence Platform
IPQS Device Fingerprinting
KernelCare Enterprise
Kubernetes
OpenText Static Application Security Testing
PC Matic
Proofpoint Insider Threat Management
Stratodesk NoTouch
Veriti
Webvar
Zip Security
Claim CrowdStrike Container Security and update features and information
Claim CrowdStrike Container Security and update features and information
Claim Illumio and update features and information
Claim Illumio and update features and information