GetApp offers free software discovery and selection resources for professionals like you. Our service is free because software vendors pay us when they generate web traffic and sales leads from GetApp users. Because we’re committed to help you find the right solution for your business needs, we list all software vendors on our website, and give them the opportunity to feature their solutions and collect user reviews. At GetApp, our comprehensive software listings, verified user reviews, software evaluation scorecards, product comparison pages and articles will empower you to make confident and well-informed purchase decisions.
Here's our list of apps for Container Security. Filters help you narrow down the results to find exactly what you’re looking for.
Heroku is a cloud platform as a service (PaaS) designed for developers and teams to build, deliver, monitor, and scale modern apps. Heroku offers integrated tools, services, and workflows to help organizations of all sizes to maximize individual and team productivity, and deliver apps more quickly.
Read more about Heroku
Got more than 100 cloud assets? Orca Security provides workload-level security for Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP) WITHOUT AGENTS. Detect and identify vulnerabilities, malware, misconfigurations, leaked passwords, lateral movement risk, and unsecured high-risk data.
Read more about Orca Security
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.
Read more about Qualys Cloud Platform
OpenShift helps build applications and host apps on the OpenShift server with the ability to modify and deploy. It is a cloud-based platform designed to simplify application development and hosting by providing complete control over your applications and coding in the language of your choice.
Read more about OpenShift
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.
Read more about Falcon
Snyk is a cloud-based application security and testing platform, which helps enterprises discover and fix vulnerabilities across open source libraries, containers, or codes throughout the development process. Features include runtime monitoring, reporting, exploitability indicators, alerts, and prioritization.
Read more about Snyk
WhiteSource is the leading solution for agile open source security and license compliance management.
It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time.
Read more about WhiteSource
Confidently secure containers, Kubernetes and cloud with the Sysdig Secure DevOps Platform. Scan images, detect and respond to threats, validate cloud posture and compliance, monitor and troubleshoot.
Read more about Sysdig
Lacework is a cloud security and compliance software which provides automated intrusion detection, threat defence, one-click investigation, and compliance across AWS, Azure, GCP, and private clouds, giving users a comprehensive view of risks across their cloud workloads and containers.
Read more about Lacework
Argon connects to development environments and tools. It protects the entire CI/CD pipeline from code manipulation misconfigurations, code leaks, and vulnerabilities. This solution enables smooth AppSec orchestration by providing a unified view, full visibility, security, and code integrity.
Read more about Argon
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.
Read more about StackRox
Threat Stack is a cloud-based platform that helps businesses identify and respond to threats in real-time while ensuring security and compliance across applications. It facilitates visibility across cloud management console, host, containers and serverless layers.
Read more about Threat Stack
Anchore is a container security platform designed to help development, security and operations teams in federal and corporate organizations scan, analyze, secure and troubleshoot containerized applications. It allows administrators to conduct deep inspection of container images and report on software components including packages, artifacts,...
Read more about Anchore
Tenable.io is a container security software that helps businesses assess vulnerabilities, prioritize remediation actions, monitor assets, and more on a centralized platform. The automated inspection module enables staff members to detect malware, handle hierarchy intelligence, and assess container images by layer.
Read more about Tenable.io
CloudGuard is a container security software designed to help businesses streamline vulnerability assessment, workload protection, and compliance management operations via a unified platform. It enables IT professionals to automatically scan containers and provide protection against external threats using custom rules and analysis.
Read more about CloudGuard
ThreatWatch is a cloud-based cybersecurity software that provides businesses with tools to conduct risk assessments, identify vulnerabilities, and secure third-party assets. Supervisors can utilize artificial intelligence (AI)-enabled threat intelligence tool to perform security scans and self-certify codes, images, and artifacts.
Read more about ThreatWatch
Google Container Security is a cloud-based software that provides businesses with tools to secure container environments across Google Kubernetes Engine (GKE), Anthos, and Google Cloud Platform (GCP). Supervisors can deploy patches on image containers and secure workloads using application-layer encryption.
Read more about Google Container Security
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest. Vendors who bid for placement can be identified by the blue “Visit Website” button on their listing.
Sorts listings by overall star rating, based on user reviews, highest to lowest.
Sorts listings by number of user reviews, highest to lowest.