Average Ratings 0 Ratings
Average Ratings 0 Ratings
API Access
Has API
API Access
Has API
Integrations
ArmorCode
Blink
CycloneDX
Kriptos
Lens Autopilot
Mandiant Digital Risk Protection
Maverix
Medigate
Opsera
Oracle Container Engine for Kubernetes
Integrations
ArmorCode
Blink
CycloneDX
Kriptos
Lens Autopilot
Mandiant Digital Risk Protection
Maverix
Medigate
Opsera
Oracle Container Engine for Kubernetes
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
SaaS
iPhone
iPad
Android
Windows
Mac
Linux
Deployment
SaaS
iPhone
iPad
Android
Windows
Mac
Linux
Support
Phone Support
24/7 Live Support
Online
Support
Phone Support
24/7 Live Support
Online
Training
Documentation
Webinars
Live Online
In Person
Training
Documentation
Webinars
Live Online
In Person
Vendor Details
Company Name
Aqua Security
Founded
2015
Country
United States
Website
aquasec.com
Vendor Details
Company Name
Sophos
Founded
1985
Country
United States
Website
www.sophos.com/en-us/products/cloud-native-security
Product Features
Application Performance Monitoring (APM)
Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cloud Workload Protection
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity
Container Security
Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata
Product Features
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Container Security
Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata
Incident Management
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management