View
Sorting
From A to Z
Products found: 1
NeuVector Complete Run-Time Security
Visibility and Security: The NeuVector 'Kubernetes Container Security Platform'
NeuVector provides a highly automated complete run-time container security solution that adapts easily to your changing environment and secures containers at their most vulnerable point – during run-time. The declarative security policy ensures that applications scale up or scale down quickly without manual intervention. The NeuVector solution is a Red Hat and Docker Certified container itself which deploys easily on each host, providing a container firewall, container process/file system monitoring, security auditing with CIS benchmarks, and vulnerability scanning. Protect sensitive data with Container DLP and secure service mesh workloads with NeuVector.
Discover Application Behavior and Detect Violations
NeuVector discovers the normal behavior of container processes, file system, and network activity and automatically builds a security policy to protect container based services. Using Layer 7 network inspection, unauthorized connections between containers or from external networks can be blocked without disrupting normal container sessions.
- Behavioral learning discovers behavior of applications and services to isolate them from attacks
- Creates a declarative security policy based on built-in support for applications & protocols, even custom ones
- Prevents unauthorized connections without disrupting running containers using network firewall technology
- Protects containers against attacks from internal and external networks
- Prevent data stealing attacks which use DNS and ICMP tunneling techniques
- Automatically captures packet used in an attack
- Run-time vulnerability scanning for containers, hosts, and orchestration platforms
- Auto-container scanning triggered upon any changes in container file system
- Audits host and container security with Docker Bench and Kubernetes CIS Benchmark for security tests
- Review overall and individual risk scores for vulnerability exploits and network attacks, complete with advice on how to improve score
- Generate pdf risk reports, security incident details, and vulnerability scanning
- Evaluate all application protocols including network usage for each protocol in gigabytes
- Prevent vulnerable images from being deployed with admission control integration
- Supports SYSLOG and webhooks for notifications into SIEM, Slack and other alerting systems
- Map user roles with LDAP integration and single sign-on (SSO) with SAML support
-
-
ROI-
-
16
20