As enterprises adopt to micro-services and cloud based architecture, they are slowly moving from a single cloud deployment to a multicloud deployment involving a mixture of private and public cloud platforms. Multicloud deployments will accelerate in the future due to... Read More >
August 8, 2020
In the last few posts, we described how to install the Deepfence community edition i.e., ThreatMapper, and use it for run-time threat mapping for containers and hosts. In this article, we will use ThreatMapper to scan Windows container images hosted... Read More >
July 23, 2020
You can use Deepfence ThreatMapper to visualize and scan unlimited number of hosts, containers and pods at runtime as well as container images out of container registries, as part of CI/CD pipelines. In last few articles, we had described how to install... Read More >
July 16, 2020
Last month we had described how to install Deepfence community edition i.e. ThreatMapper on AWS ECS, and use it for vulnerability scanning of hosts and containers. Last week, we also removed all node and usage restrictions from Deepfence ThreatMapper; now you can visualize and... Read More >
July 6, 2020
Modern cloud native applications are complex and have a lot of dependencies on external libraries including open source components with many known vulnerabilities. Managing and fixing a large number of vulnerabilities in multiple components is a tedious job. Adoption of... Read More >
June 16, 2020