Tigera Description

Kubernetes-native security, observability. Security and observability code for cloud-native apps. Cloud-native security code for hosts, Kubernetes containers, Kubernetes components and workloads. This code secures north-south traffic and enables enterprise security controls. It also ensures continuous compliance. Kubernetes native observability is code that collects real-time Telemetry. This data is enriched with Kubernetes context for a topographical view of the interactions between components, from hosts to services. Rapid troubleshooting using machine-learning powered anomaly detection and performance hotspot identification. One framework to centrally secure, monitor, troubleshoot, and manage multi-cloud, multi-cloud, hybrid-cloud and hybrid-cloud environments that run Linux or Window containers. To enforce security and compliance, or to resolve issues, update and deploy policies in seconds.

Pricing

Free Version:
Yes

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Tigera
Headquarters:
United States
Website:
www.tigera.io

Media

Tigera Screenshot 1
You Might Also Like
It's not magic, it's real-time data with Twilio Segment Icon
Activate your data warehouse to all the tools you use with a CDP that’s fast, powerful and flexible. We'll show you how with Twilio Segment.

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
Webinars
In Person
Customer Support
Phone Support

Tigera Features and Options

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Container Security Software

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Cloud Workload Protection Platform

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity