Find products trusted by professionals in your network
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Software used to protect containerized applications from vulnerabilities and policy violations. - Scan container stack for image vulnerabilities and monitor container networks and pipelines - Enforce access and security policies with automatic detection and centralized reporting - Use DevOps integration to manage access and security at all stages of development - Enhance visibility with runtime features and container performance tracking
28 results
Secure-by-default container images Build software better with minimal, zero-CVE container images guarded under our industry-leading remediation SLA. Secure container images for modern applications *Reduce costly engineering toil Adopt inherently secure software so engineers can spend more time shipping products and less time patching CVEs. 4 hrs/month per developer saved on vulnerability management. *Secure your open source foundation Rely on trusted open source to improve your security posture and reduce the attack surface for bad actors. 97.6% reduction in CVEs compared to OSS equivalents *Simplify continuous compliance Solve critical compliance controls by default to reduce overhead costs and get products to market faster. 400+ FIPS Images with OS-level STIG hardening.
A security solution that covers every stage of a containerized app's lifecycle, from development to operation. It protects your organization's business processes in line with security standards and regulations and supports implementation of the DevSecOps approach. It's developed specifically for on‑premise and cloud containerized environments, ensuring protection at different levels from container image to host OS.
Calico Cloud is a fully-managed SaaS platform that provides unified network security and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is built on Calico Open Source, the most widely adopted container networking and security solution.
Mend Container scans your container images and registries at scale. It uncovers vulnerabilities, license risks, and even exposed secrets before deployment. Mend Container includes: -Reachability analysis that works without installing runtime agents to identify which vulnerable files and methods are being called at runtime, allowing you to safely deprioritize more vulnerabilities that are not reachable than if you were using reachability in Mend SCA alone. - Comprehensive container security starting with scanning a static image in your pipeline using Mend SCA and moving all the way to analyzing your container’s behavior for security risks in runtime with Mend Container. - Secrets detection that identifies in an image any credentials, passwords, keys, and certificates being exposed or handled inappropriately. - Scanning of all your running container images within your Kubernetes clusters, letting you easily find and label containers that are actually in use and deployed.
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Calico Enterprise is a self-managed platform for unified network security and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is built on Calico Open Source, the most widely adopted container networking and security solution.
One platform, all your cloud security needs, zero alert fatigue. ThreatMapper, Deepfence’s enterprise-grade open-source cloud-native application protection platform, helps organizations build a ThreatGraph of their cloud environment to reduce 97% of the noise from security scan results. 100% open source, cloud-native application protection platform (CNAPP) for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories.
Payment HSM as a Service API’s para funções criptográficas usando Payment HSM’s payShield (Host Security Module da Thales e-Security). Características Ideal para entidades que querem tirar ao máximo o potencial do seu hardware de segurança HSM em forma eficiente. Pode ser utilizado como sistema: - Gestor para serviços aaS de Criptografia. - Para transformar a interface TCP/IP do(s) HSM(s) em uma interface JSON HTTP Rest mais amigável e fácil de implementar. Roda em Sistemas Operacionais Unix / Linux / Windows.
Monitorea una amplia variedad de fuentes y capas de Internet, plantea desafíos difíciles, pero la tecnología autónoma rastrea, analiza e interpreta con precisión datos de muchas fuentes para identificar credenciales filtradas y otros datos confidenciales. La plataforma basada en la nube proporciona información en tiempo real lista para API sobre una amplia gama de amenazas cibernéticas, lo que brinda a los clientes el poder de prepararse para respuestas tácticas y estratégicas de manera proactiva. - Cobertura global de la web oscura - Blackmarkets, darknet y red TOR - Integración precisa de API - Para soluciones de ticketing, SIEM y SOAR - Un COI oportuno y enriquecido - COI rápidas, relevantes y enriquecidas y - Análisis de amenazas en profundidad
Protect your data, systems and networks against cyber threats with our specialized solutions: ✅ Security Consulting and Management – Risk assessment, compliance (LGPD, ISO 27001) and development of security policies. ✅ Incident Monitoring and Response – 24/7 SOC, threat detection, vulnerability analysis and rapid incident response. ✅ Network and Infrastructure Protection – Firewall, IDS/IPS, secure VPN, network segmentation and security for hybrid environments. ✅ Data and Identity Security – Encryption, DLP, IAM, SSO, MFA and protection against information leaks. ✅ Security Testing and Pentest – Attack simulation, secure code analysis and identification of critical vulnerabilities. ✅ Training and Awareness – Phishing simulations, security training for employees and IT team training. 🔐 Tailor-made solutions for companies of all sizes. Contact us and strengthen your digital security!