CrowdStrike Container Security Description

Protect cloud-native applications and reduce the attack surface by detecting vulnerabilities, hidden malware, secrets/keys, compliance violations and more -- from build to runtime -- ensuring only compliant containers run in production.Integrate frictionless security early into the continuous integration/continuous delivery (CI/CD) pipeline, and automate protection that empowers DevSecOps to deliver production-ready applications without impacting build cycles.Build and run applications knowing they are protected. Automated discovery, runtime protection and continuous threat detection and response for containers and cloud workloads are all available from one platform. Hidden malware, embedded secrets, configuration problems, and other issues can be found in your images to reduce the attack surface.

Pricing

Free Trial:
Yes

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
CrowdStrike
Year Founded:
2011
Headquarters:
United States
Website:
www.crowdstrike.com/products/cloud-security/falcon-cloud-workload-protection/container-security/

Media

You Might Also Like
CDPs: Build, Buy.. or Both? Icon
CDPs: Build, Buy.. or Both?

Collect, Unify & Connect Data Real-Time, Real Fast

Explore how a customer data platform can help to enhance your engineering team's efficiency and supercharge application performance.

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
Videos
Customer Support
Phone Support
24/7 Live Support
Online

CrowdStrike Container Security Features and Options

Container Security Software

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

CrowdStrike Container Security Lists