+
+

Related Products

  • SOCRadar Extended Threat Intelligence
    104 Ratings
    Visit Website
  • Chainguard
    49 Ratings
    Visit Website
  • Aikido Security
    226 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,263 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Blumira
    150 Ratings
    Visit Website
  • Guardz
    117 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • Wiz
    1,446 Ratings
    Visit Website

About

Protect cloud-native applications and reduce the attack surface by detecting vulnerabilities, hidden malware, secrets/keys, compliance violations and more — from build to runtime — ensuring only compliant containers run in production.Integrate frictionless security early into the continuous integration/continuous delivery (CI/CD) pipeline, and automate protection that empowers DevSecOps to deliver production-ready applications without impacting build cycles.Build and run applications knowing they are protected. Get access to automated discovery, runtime protection, continuous threat detection and response for cloud workloads and containers, and managed cloud threat hunting in a single platform. Find hidden malware, embedded secrets, configuration issues and more in your images to help reduce the attack surface.

About

Qualys CS features a vulnerability analysis plug-in for CI/CD tool Jenkins, and soon for other CI/CD tools including Bamboo, TeamCity, and CircleCI. You can download the plugins directly from within the container security module. With Qualys CS, security teams can participate in the DevOps process to gate vulnerable images entering the system, while developers get actionable data to remediate vulnerabilities. Configure policies for preventing vulnerable images from entering the repositories. Set policies based on criteria such as vulnerability severity, and specific QIDs. Review from within the plug-in a summary of the build with its vulnerabilities, information on patchable software and fixed versions, and image layers where it is present. Container infrastructure is immutable in nature, which means containers need to be identical to the images they are baked from.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams in need of a Container Security solution

Audience

Companies searching for a Container Security platform

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CrowdStrike
Founded: 2011
United States
www.crowdstrike.com/products/cloud-security/falcon-cloud-workload-protection/container-security/

Company Information

Qualys
Founded: 1999
United States
www.qualys.com/apps/container-security/

Alternatives

Alternatives

Aqua

Aqua

Aqua Security
Aqua

Aqua

Aqua Security

Categories

Categories

Integrations

Compyl
Cyclops
KernelCare Enterprise
Kubernetes
ThreatAware
Veriti
Akitra Andromeda
Amplifier Security
Bedrock Security
Blink
CircleCI
ContraForce
Epiphany Intelligence Platform
Polarity
Prophet Security
Seconize DeRisk Center
Silk Security
Stream Security
anecdotes

Integrations

Compyl
Cyclops
KernelCare Enterprise
Kubernetes
ThreatAware
Veriti
Akitra Andromeda
Amplifier Security
Bedrock Security
Blink
CircleCI
ContraForce
Epiphany Intelligence Platform
Polarity
Prophet Security
Seconize DeRisk Center
Silk Security
Stream Security
anecdotes
Claim CrowdStrike Container Security and update features and information
Claim CrowdStrike Container Security and update features and information
Claim Qualys Container Security and update features and information
Claim Qualys Container Security and update features and information