(35)
4.8 out of 5
Visit Website
Sponsored
Risk Scoring | Provides risk scoring for suspicious activity, vulnerabilities, and other threats. | Not enough data | |
Secrets Management | Provides tools for managing authentication credentials such as keys and passwords. | Not enough data | |
Security Auditing | Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. | Not enough data | |
Configuration Management | As reported in 10 Google Container Security reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | 87% (Based on 10 reviews) |
Continuous Image Assurance | Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats. This feature was mentioned in 10 Google Container Security reviews. | 83% (Based on 10 reviews) | |
Behavior Monitoring | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. This feature was mentioned in 10 Google Container Security reviews. | 92% (Based on 10 reviews) | |
Observability | As reported in 10 Google Container Security reviews. Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. | 85% (Based on 10 reviews) |
Dynamic Image Scanning | Scans application and image source code for security flaws without executing it in a live environment This feature was mentioned in 10 Google Container Security reviews. | 90% (Based on 10 reviews) | |
Runtime Protection | Based on 10 Google Container Security reviews. Monitors container activities and detects threats across containers, networks, and cloud service providers. | 90% (Based on 10 reviews) | |
Workload Protection | As reported in 10 Google Container Security reviews. Protects compute resources across a networks and cloud service providers. Serves as Firewall and prompts additional authentication for suspicious users. | 87% (Based on 10 reviews) | |
Network Segmentation | Based on 10 Google Container Security reviews. Allows administrative control over network components, mapping, and segmentation. | 95% (Based on 10 reviews) |