Fidelis Halo

Fidelis Halo

Fidelis Security
+
+

Related Products

  • Wiz
    1,446 Ratings
    Visit Website
  • Orca Security
    531 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • Carbide
    88 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • AdRem NetCrunch
    156 Ratings
    Visit Website
  • Chainguard
    49 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    516 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    208 Ratings
    Visit Website
  • Blumira
    150 Ratings
    Visit Website

About

Fidelis Halo is a unified, SaaS-based cloud security platform that automates cloud computing security controls and compliance across servers, containers, and IaaS in any public, private, hybrid, and multi-cloud environment. With over 20,000 pre-configured rules and more than 150 policy templates that cover standards such as PCI, CIS, HIPAA, SOC, and DISA STIGs for IaaS services, Halo’s extensive automation capabilities streamline and accelerate workflows between InfoSec and DevOps. The comprehensive, bi-directional Halo API, developer SDK, and toolkit automate your security and compliance controls into your DevOps toolchain to identify critical vulnerabilities so they can be remediated prior to production. The free edition of Halo Cloud Secure includes full access to the Halo Cloud Secure CSPM service for up to 10 cloud service accounts across any mix of AWS, Azure, and GCP, at no cost to you, ever. Sign up now and start your journey to fully automated cloud security!

About

Qualys CS features a vulnerability analysis plug-in for CI/CD tool Jenkins, and soon for other CI/CD tools including Bamboo, TeamCity, and CircleCI. You can download the plugins directly from within the container security module. With Qualys CS, security teams can participate in the DevOps process to gate vulnerable images entering the system, while developers get actionable data to remediate vulnerabilities. Configure policies for preventing vulnerable images from entering the repositories. Set policies based on criteria such as vulnerability severity, and specific QIDs. Review from within the plug-in a summary of the build with its vulnerabilities, information on patchable software and fixed versions, and image layers where it is present. Container infrastructure is immutable in nature, which means containers need to be identical to the images they are baked from.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Any organization using public, private, hybrid, or multi-cloud environments.

Audience

Companies searching for a Container Security platform

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Free
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Fidelis Security
Founded: 2002
United States
fidelissecurity.com/platforms/fidelis-halo/

Company Information

Qualys
Founded: 1999
United States
www.qualys.com/apps/container-security/

Alternatives

DisruptOps

DisruptOps

FireMon

Alternatives

Runecast

Runecast

Runecast Solutions
Aqua

Aqua

Aqua Security

Categories

Categories

Container Security Features

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Application Security Features

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Audit Features

Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Integrations

Docker
Jenkins
Kubernetes
Amazon EC2
Bamboo
C1Risk
CircleCI
Complyance
Git
Google Cloud Platform
Google Compute Engine
IBM Apptio
KernelCare Enterprise
Kroll Cyber Risk
OctoXLabs
OpenText Enterprise Security Manager
Oracle Cloud Infrastructure
Polarity
Stream Security
ThreatAdvisor

Integrations

Docker
Jenkins
Kubernetes
Amazon EC2
Bamboo
C1Risk
CircleCI
Complyance
Git
Google Cloud Platform
Google Compute Engine
IBM Apptio
KernelCare Enterprise
Kroll Cyber Risk
OctoXLabs
OpenText Enterprise Security Manager
Oracle Cloud Infrastructure
Polarity
Stream Security
ThreatAdvisor
Claim Fidelis Halo and update features and information
Claim Fidelis Halo and update features and information
Claim Qualys Container Security and update features and information
Claim Qualys Container Security and update features and information