Deepfence is a Cloud-Native Application Protection Platform (CNAPP) that combines multiple security functionalities: It provides vulnerability management capabilities with contextual analysis to reduce false positives in security scanning. The platform includes container security features and cloud workload protection, focusing on identifying vulnerabilities, exposed secrets, cloud misconfigurations, and malware. It utilizes eBPF technology for runtime monitoring and context gathering across cloud environments. The solution is available in two versions: - ThreatMapper: An open-source version for vulnerability scanning and management - ThreatStryker: An enterprise version with additional security features The platform integrates with various cloud environments and container platforms, offering security monitoring for Kubernetes, virtual machines, and serverless architectures.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool for spinning up insecure AWS infrastructure with Terraform for training and security assessment purposes.
CloudFox helps gain situational awareness in unfamiliar cloud environments for penetration testers and offensive security professionals.
Exploring the transition towards real sandbox containers and the differences in privileges compared to traditional sandboxes like Chrome.
Cloud security platform that provides configuration monitoring, compliance management, and security analysis across multi-cloud environments.
Exploit that launches a process on the host from within a Docker container run with the --privileged flag by abusing the Linux cgroup v1 “notification on release” feature.
Tool for assessing compliance and running vulnerability scans on Docker images.
AWS serverless cloud security tool for parsing and alerting on CloudTrail logs using EQL.
An open-sourced framework for managing resources across hundreds of AWS Accounts
Cloud Custodian (c7n) is a rules engine for managing public cloud accounts and resources with a focus on security, compliance, and cost optimization.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.